EGOSECURE DATA PROTECTION FIRST DATA SECURITY SOLUTION WITH A COMPREHENSIVE APPROACH UNDERSTAND PROTECT PROVE www.egosecure.com ENJOY DATA PROTECTION
DATA LOSS HOW GREAT IS THE THREAT? Almost all the value of a company is now available in digital form - research and development data, patents, customer lists, etc. Much of the data is so sensitive that its loss can cause an enormous disturbance or even threaten the company s existence. To offset that risk there are many laws in place to protect your company s data, such as the Federal Data Protection Act. The study Ponemon Institute Releases 2014 Cost of Data Breach estimates that the average cost of the consequences of data loss at: 3.1 MILLION Data loss can be caused not only by active attacks of data thieves and spies from the outside, but also by so called insiders. The Federal Office for Information Security (German BSI) assumes in its Guide to Information Security that most security breaches are caused by insiders. Insiders can be employees, external service providers or even visitors who already have access beyond the company s external data protection systems. The idea that external service providers would attempt to steal your data doesn t seem that absurd, but how about your employees? The BSI explicitly states that the intent to cause harm does not always take place when data is lost or stolen, often it can be a careless error by your own employee; sometimes employees make mistakes, are excessively enthusiastic, and are curious. The graph below shows that the majority of data loss was caused by unconscious misconduct of employees. LIABILITY RISKS AND COSTS OF WORKING TIME LOSS Insufficient problem awareness plays a major role when using company-owned IT-equipment for personal purposes. So you cannot know e.g. whether a PC game played on a corporate computer is properly licensed. If films, programs or music are illegally downloaded with the help of corporate hardware, the company becomes the target of the investigation and must adhere to circumstances. The private use of corporate hardware leads to losses even without liability cases, because it often happens during working time.
THE FIRST DATA SECURITY SOLUTION WITH A COMPREHENSIVE APPROACH UNDERSTAND PROTECT PROVE To set up a comprehensive data security concept, one must UNDERSTAND it first. Whereas to UNDERSTAND, one has to answer questions. It is clear for every IT-professional that uncontrolled use of USB-devices means data security problems for companies and organizations. To realize what scope of security measures one actually needs to overcome this problem, one has to answer a couple of questions first: Will devices be used for personal purposes? Do we know how many USB devices are in use and which devices they are? Do we know how much data is brought into the company and how much of it can pose a threat? Do we know how much data leaves the company and how much of it is sensitive? Are those only corporate devices orare there also private ones in use? For all questions answered "Yes", do we know "How many", "How often" and "By whom"? This question-answer game can be applied to each data path in the network, for example: Cloud, network communications, mobile devices, Internet, CD / DVD, etc. With EGOSECURE DATA PROTECTION we always begin with UNDERSTANDING.The Insight Module gives you the answers to the important questions for all data paths; as well as other important information that you will need before configuring your protective setting with our flexible module system. The reports delivered by the Insight Module, of course, do not violate the employees privacy rights, as they can be shown anonymously. An overview of single user is presented according to the agreements of the Federal Data Protection Act, so that the works council and / or the Data Protection Officer must go through additional security measures in order to gain access. This process has been proven to be successful in the EGOSECURE Audit Module for many years.
C.A.F.E EGOSECURE DATA PROTECTION PERCEIVED SECURITY IS NOT ENOUGH EFFECTIVE PROTECTION NEEDS FACTS All necessary features can be licensed via the EGOSECURE DATA PROTECTION console in the required quantity according to the answers delivered by Insight. This will insure that your company is protected from the right threats, at the right times. However, the security concept of EGOSECURE DATA PROTECTION is not complete yet, because it is not only about perceived protection. Insight also provides reports that make the effects of protective measures visible and verifiableso that the protection level is based off of facts. Safety is therefore measurable and auditable, which is important not only for your company s data security, but as well for compliance reasons. EGOSECURE solution concept guarantees that all functions are considered during the installation process. Everything accesses a database and can be controlled by a centralized management console. Only actually needed functions are licensed - but if the protection requirements are changed, further functions can be activated without extra installation. EGOSECURE DATA PROTECTION At first, EGOSECURE DATA PROTECTION determines transparent individual protection needs and puts it into the solution center. The protection functions are based on the C.A.F.E. Management principle and can be flexibly combined for all data paths. All functions are part of an integrated solution with system architecture, central management console, operating concept and database. C.A.F.E.
SAFE&SAVE MADE IN GERMANY In addition to a solution s high reliability and security, economic factors also play a major role for purchasing decisions. When it comes to security solutions, the respective ROI is, however, often difficult to demonstrate. EGOSECURE solutions are developed, based on the SAFE & SAVE concept. They provide comprehensive protection and ensure security levels required by international law and regulations, while also achieving a real ROI within less than one year. SAFE RELIABLE SECURITY Germany has the highest data security and privacy standards, and so, it is not a surprise that international corporations are increasingly looking for IT security solutions by German vendors. EGOSECURE was founded in Germany; the vendor is expanding its business activities and is still headquartered in its original location. From the beginning, the solutions were developed, based on German quality standards, and were adjusted to address international requirements. EGOSECURE s customer base includes many global corporations, with the largest installation comprising 165,000 clients. The SAFE approach describes user organizations understanding of reliable security. SECURE There is no chance whatsoever to manipulate EGOSECURE DATA PROTECTION, since there are no backdoors for intelligence services, no vendor master keys and no reasons or possibilities for users to bypass the system. FLEXIBLE The software adjusts to the respective business processes, rather than the other way round. It also integrates with existing workflows and can be flexibly connected to third-party systems. ALL-IN-ONE There is only one server, one console, one agent and one database, which makes EGOSECURE a lightweight, fast and highly functional solution. EFFICIENT Minimized implementation costs and EGOSECURE GREEN- IT help companies achieve a return on their investment within less than one year.
SAVE SUPERIOR VALUE FOR THE CUSTOMER The high total costs involved often deter companies from implementing a new security solution. These costs may not only include pure licensing costs, but also costs for external consulting, training and related productivity losses. EGOSECURE s SAVE approach ensures minimized overall implementation costs through an intelligent installation concept and user interface. The intuitive administration concept enables administrators to implement most configuration modifications with only few mouse clicks. And in case support is needed, this support is provided in English out of the German headquarters. EGOSECURE GREEN- IT, EGOSECURE s integrated power management feature, helps companies achieve a much faster return on investment (ROI), compared to other solutions. SPENDINGS Costs incurred by a data loss amount to an average of 3.1 million Euros.* EGOSECURE DATA PROTECTION has a focus on minimizied installation, administration and training costs, which reduces the overall spendings, compared to other solutions. ADMINISTRATION Time needed to install EGOSECURE DATA PROTECTION is about half a day; configuration can be done with few mouse clicks. The centralized management console is based on an intuitive user interface. VISIBILITY Most functions are performed in the background and do not interrupt users work. The agent provides transparent and clear information, and so, no user training is required. ECONOMIZE Depending on the hardware in use and regional electricity rates, EGOSECURE GREEN-IT helps companies save between 50 and 100 Euros per computer per year. Thus, EGOSECURE DATA PROTECTION pays off within less than one year. *2014 Annual Study: Cost of a Data Breach, Ponemon Institute
EGOSECURE MODULES INSIGHT INSIGHT The module Insight provides reports with which the protection requirements and the necessary combination of protection modules can be determined exactly. In addition, it provides facts that make the effects of protective measures visible. Safety is therefore measurable and auditable. In principle, the reports can be anonymous and accumulated, so no conclusions about single users are possible. More detailed reports are available, but only after the works council and/ or Data Protection Officer authorize the access. See also: the Audit module, as this module already provides a good overview of what happens in the corporate network. CONTROL ACCESS CONTROL Access control protects companies against internal attackers by controlling which persons within the company need access to which data. APPLICATION CONTROL Application Control controls which user is allowed to start which programs. This prevents, for instance, that games or unlicensed software products are used to avoid liability risks and economic damage. It is also possible to block most viruses, even before antivirus solutions have detected them. AUDIT AUDIT Audit ensures the transparency of all protection measures and allows you to capture forensic data. This optional auditability of EGOSE- CURE DATA PROTECTION is an important contribution to ensure IT compliance. As a matter of course, compliance with your employees personality rights and labor laws is also ensured (4-6-eye principle). FILTER CONTENT ANALYSIS & FILTER Analyzing content and filtering secret information from data that leave the company as well as blocking unacceptable information within incoming data are also components of an integrated, overall security concept. Content Analysis & Filter provides granular and reliable protection for corporate data communications without affecting users workflows and desired data transfers. ANTIVIRUS An antivirus solution provides proven protection against anonymous attackers from the Internet. It is important to ensure a high detection rate to be able to respond very quickly to new viruses and Trojans. EGOSECURE DATA PROTECTION provides an integrated antivirus solution which, according to many test reports, is the leading solution in the market and features an acknowledged high detection rate. ENCRYPTION MAIL ENCRYPTION Mail Encryption ensures the safe exchange of e-mails; no software needs to be installed for this purpose on the receiving or transmitting system. Encrypted e-mails with an electronic signature can be sent and read within the user s familiar environment. It is also easy to encrypt and transport very large e-mails. REMOVABLE DEVICE ENCRYPTION Mobile data media such as USB sticks get increasingly smaller and powerful; however, this also means that they can get lost or stolen much more easily. Removable Device Encryption ensures that the data cannot be used by unauthorized parties. Password-based encryption and decryption can be done on any Windows computer, with full transparency for authorized users. Encryption is file-based and multiple kinds of encryption are available and can be used simultaneously on one medium. FOLDER ENCRYPTION Folder Encryption protects data on lost notebooks or hard drives and also individually defined sensitive data on systems that can be accessed by several users. For instance, highly sensitive management data can be protected against access through employees with many privileges, such as IT staff. FULL DISK ENCRYPTION Full Disk Encryption provides comprehensive protection of all devices and encrypts the complete hard disk or partitions on the sector level. The solution also provides on-demand pre-boot authentication to authenticate users before the operating system is started. Automatic detection of new hard disks in the integrated encryption chip, lightning-fast initial encryption and the centralized management ensure the seamless integration with existing IT infrastructures. CLOUD/NETWORK ENCRYPTION Cloud and Network Encryption can be used to encrypt folders in the cloud or on any network. Encryption keys remain within the company and are never stored in the cloud a clear advantage over encryption solutions provided by cloud storage providers themselves. ANDROID/IOS ENCRYPTION The encryption for ios and Android devices offers file-based protection on internal storages and memory cards and cloud accounts of mobile devices via app. Files are decrypted by entering a password. MANAGEMENT MOBILE DEVICE MANAGEMENT The increasing degree of adoption of mobile devices such as tablets or smartphones must also be reflected in corporate security architectures. Mobile Device Management ensures the intelligent integration of mobile devices, including support of the Android and ios operating systems. GREEN-IT Intelligent power management ensures efficient device operations by only consuming energy when the computer is actually used. Green-IT helps reduce IT operational costs while also contributing to the company s environmental balance and ensuring a fast ROI for the EGOS- ECURE DATA PROTECTION implementation. SECURE ERASE Secure Erase ensures that deleted files cannot be restored, no matter if they are located on the internal hard disk or on an external storage medium. Users can choose among multiple deletion methods. They have the option to securely delete documents immediately or to destroy all deleted files irrevocably, based on a specific schedule. Secure Erase also ensures that you discard hardware only when you sell or withdraw respective hardware.
CUSTOMER STATEMENTS As we had anticipated when we tried to set up a short-list of products, the highly complex system landscape was a challenge for vendors with respective solutions. Due to its high degree of compatibility, EGOSECURE was the first solution to meet our demands. Klaus Thomas City of Baden-Baden The main reasons in favor of EGOSE- CURE Endpoint are integrated and easy performance of active directory synchronization, easy installation matrix (server environment and clients) as well as flexible and adaptable rights management. Other advantages of EGOSECURE portfolio include extensive reporting and shadow copy functionality. The EGOSECURE team supported us during the Proof of Concept and helped if questions did arise. KNEIP Communication S.A. ( KNEIP ) What we really like about EGOSECURE Endpoint is its integrated functionality within an overall concept. As opposed to key vendors offerings, where you buy multiple individual products, the EGOSECURE components are combined effectively; this means that only a minimum of resources is required to operate the solution it simply works. For us it is also important to know that the product is developed and enhanced on an ongoing basis and that the new functionality is fully integrated with the existing solution. Jürgen Munk IT Director GroupM, Düsseldorf You have a multitude of solution approaches that address our most pressing hot issues with compelling functionality such as the easy administration and a high degree of transparency for the user. The product philosophy is exactly what administrators desire. Therefore we will start to use your endpoint solution next year across our whole organization. Peter Lange State Reservoir Administration of the Free State of Saxony EGOSECURE does not only provide comprehensive functionality, but has also worked closely with us in a way that exceeded normal support services by far. Michael Kraemer State Office of Criminal Investigation of the German federal state of Saarland With EGOSECURE, we have found a professional security product that will protect our client landscape against unauthorized data transfers without disrupting our users work. UniVersa Lebensversicherung a.g. Managing open ports and devices has become easier than ever with EGOSECURE. It s never been easier to manage device permissions in a closed environment. Operating is intuitive and the support team is always ready to help no matter how difficult the problem is. We have been using EGOSE- CURE for 4 years and have never been disappointed, and we also look forward to further software enhancement. Timo Jöhnk System Administrator, Federal Waterways and Shipping Agency, Kiel FACTS 1,700 SATISFIED CUSTOMERS MORE THAN 1.1 MILLION MANAGED CLIENTS IN MORE THAN 40 COUNTRIES ALL OVER THE WORLD Pforzheimer Str. 128 A 76275 Ettlingen/Germany Phone +49(0)7243.354.95-0 Mail contact@egosecure.com GÜTESIEGEL Software EgoSecure ENDPOINT Version: 5.4 Stand 02/2014 www.egosecure.com