endpoint www.egosecure.com Antivirus Application Control Removable Device Encryption enjoy Data protection



Similar documents
EGOSECURE DATA PROTECTION

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Secure your data. Security Made in Germany

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Secure Your Mobile Workplace

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

SecureAge SecureDs Data Breach Prevention Solution

Cyber Security. John Leek Chief Strategist

Proven LANDesk Solutions

Brainloop Cloud Security

Vs Encryption Suites

Endpoint protection for physical and virtual desktops

AVeS Cloud Security powered by SYMANTEC TM

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

EndUser Protection. Peter Skondro. Sophos

Endpoint Protection Small Business Edition 2013?

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

10 easy steps to secure your retail network

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Small businesses: What you need to know about cyber security

Protecting personally identifiable information: What data is at risk and what you can do about it

Securing Corporate on Personal Mobile Devices

Securing the endpoint and your data

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Injazat s Managed Services Portfolio

Security Practices for Online Collaboration and Social Media

Best Practices for Secure Mobile Access

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Kaspersky Security 10 for Mobile Implementation Guide

Endpoint Security: Moving Beyond AV

Encryption Buyers Guide

Securing the mobile enterprise with IBM Security solutions

Protecting Your Roaming Workforce With Cloud-Based Security

End-user Security Analytics Strengthens Protection with ArcSight

Small businesses: What you need to know about cyber security

Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only

Top five strategies for combating modern threats Is anti-virus dead?

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Endpoint protection for physical and virtual desktops

Hands on, field experiences with BYOD. BYOD Seminar

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

INFORMATION PROTECTED

2012 Endpoint Security Best Practices Survey

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

HIPAA Security Training Manual

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

CA Host-Based Intrusion Prevention System r8.1

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Cloud Based Secure Web Gateway

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

A Bring-Your-Own-Device (BYOD) Solution Brief

Guideline on Safe BYOD Management

How To Monitor The Internet In Idaho

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Ovation Security Center Data Sheet

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

/Endpoint Security and More Rondi Jamison

The virtual safe: A user-focused approach to data encryption

Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist

Building a Business Case:

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Kaspersky Security for Mobile

Top Four Considerations for Securing Microsoft SharePoint

Transcription:

Egosecure endpoint Access Control Antivirus Content Analysis & Filter Application Control Removable Device Encryption Folder ENCRyPTION Mobile Device Management Power Management enjoy Data protection

Facts Risk: Data losses Any company, independent of its size and industry, is exposed to data losses through intentional theft or the negligent handling of data and risks know-how losses, competitive disadvantages, penalties and also major image damages in case of notifiable data losses ( 42 a BDSG). Risk: Malware Malware is malicious code that can be infiltrated into the company through a variety of data paths. Malware may destroy data (traditional viruses), but also transfer data elsewhere (Trojans) again, this results in data losses. Often, malware is used for industrial espionage purposes. While most people think that antivirus software or a firewall is able to protect them against malware, this approach does not go far enough, since infected devices (mobile media, USB sticks, smartphones etc.) may also infiltrate malware into the company. Risk: Liability The Data Act provides for high penalties in case certain kinds of data are lost and no company can ignore the related risks. However, companies do not only face liability risks based on data protection regulations, but also through copyright infringements or incompliance with licensing regulations, if the corporate IT is used by their employees for private purposes. Risk: Productivity losses Employees who use corporate IT devices, for instance, to play PC games, edit their holiday pictures, download music or movie files or chat in social networks, do not only expose the company to liability risks, but also cause higher costs due to productivity losses, a factor that is often highly underestimated. Endpoints and Data Paths Within the Corporate Network Another problem arises through the large number of devices used to store data or play and execute software and files laptops, tablets, smartphones, external hard disks, USB sticks and even digital cameras can be used to store data. Increasingly, employees do not only use company-owned devices, but also their private devices within the corporate network this bring your own device (BYOD) phenomenon is a rather hot topic at the moment. While the high flexibility and variety of devices is very convenient for the users, this situation is a nightmare for any IT security officer. Companies are not only faced with a great variety of devices, but also must deal with all kinds of data paths they transport mobile media, transmit data through the Internet, use cloud services or communicate via today s modern communications platforms, such as Skype. Protecting all of these data paths poses great challenges. The C.A.F.E. management principle developed by EgoSecure accounts for all devices and data paths. INTERNET MY ENDPOINT COMMUNICATION SERVER STORAGE MEDIA NETWORK MOBILE DEVICES 02 CLOUD

C.A.F.E. Management Comprehensive Security and Efficient Systems Operations The C.A.F.E. management principle developed by EgoSecure solves these problems through the intelligent combination of the following functionality Control Defines which user is authorized to use which data paths. Only those employees who need sensitive data for their work have access to these data. Logs provide evidence if users violate laws and regulations to ensure that they handle data with care an important requirement to ensure IT compliance. Filter Separates critical data types from uncritical data types and blocks data types that are not wanted within the company. Encrypt The C., A. and F. components ensure that only authorized employees have only access to data and applications which are relevant for their work. 100-percent all-round protection is provided by encrypting authorized data, since encryption also protects against intentional data theft or the negligent loss of data. Management The intelligent and central management ensures the easy installation and administration of functionality and a high degree of usability. This integrated and efficient security principle is complemented by antivirus software, mobile device management functionality, the integration of ios and Android devices, secure cloud applications and power management for devices. Egosecure endpoint Enjoy Data YOUR DATA EgoSecure Endpoint provides a portfolio of modular solutions to cover all functionality of the C.A.F.E. management principle. Various security layers protect devices within the corporate IT network. The devices are within the protected core; an intelligent management ensures their secure and efficient operations. FOLDER ENCRYPTION REMOVABLE DEVICE ENCRYPTION APPLICATION CONTROL CONTENT ANALYSIS & FILTER ANTIVIRUS ACCESS CONTROL PROTECTION LAYERS MALWARE LIABILITY PRODUCTIVITY LOSS DATA LOSS Devices are protected against anonymous attackers from the Internet and also against internal attackers, for instance industrial spies, frustrated employees or employees that are negligent or unaware of related risks. MANAGEMENT LEVEL MANAGEMENT AUDIT MOBILE DEVICE MANAGEMENT POWER MANAGEMENT 03

Functional Modules The Layers Access Control Access control protects companies against internal attackers by controlling which persons within the company need access to which data. Antivirus An antivirus solution provides proven protection against anonymous attackers from the Internet. It is important to ensure a high detection rate to be able to respond very quickly to new viruses and Trojans. EgoSecure Endpoint integrates a leading-edge solution with an acknowledged high detection rate. Content Analysis & Filter An integrated, overall security concept must also provide options to analyze content, filter sensitive information from data that leave the company and block damaged information within incoming data. Content Analysis & Filter provides granular and reliable protection of corporate data communications without affecting users workflows and desired data transfers. Application Control Application Control controls which user is allowed to start which programs, for instance, to prevent that games or unlicensed software products are used to avoid liability risks and economic damage. It is also possible to block most viruses, even before antivirus solutions have detected them. The Management Level ensures the transparency of all protection measures and allows you to capture forensic data. This optional auditability of EgoSecure Endpoint is an important contribution to ensure IT compliance. As a matter of course, compliance with your employees personality rights and labor laws is also ensured (4-6-eye principle). Mobile Device Management The increasing degree of adoption of mobile devices such as tablets or smartphone must also be reflected in corporate security architectures. Mobile Device Management ensures the intelligent integration of mobile devices, including support of the Android and ios operating systems. Power Management Intelligent power management ensures efficient device operations by ensuring that energy is only consumed when the computer is actually used. Power Management helps reduce IT operational costs while also contributing to the company s environmental balance and ensuring a fast ROI for the EgoSecure Endpoint implementation. Removable Device Encryption Mobile media such as USB sticks are important means to support increasingly flexible business and working environments. While devices are shrinking in size and increasing in performance, they are also lost or stolen more easily. Removable Device Encryption ensures that the data cannot be used by unauthorized parties. Password-based encryption and decryption can be achieved on any Windows computer, with full transparency for authorized users. Encryption is file-based, and various encryption types are available (for the whole company, for individual users or for certain user groups). It is possible to use multiple encryption types for one medium. Folder Encryption Folder Encryption protects data on lost notebooks or hard drives and also secures individually defined sensitive data on systems that can be accessed by multiple users. For instance, highly sensitive management data can be protected against access through employees with many privileges, such as IT staff. 04

Your benefits of Egosecure Endpoint productivity loss data LOSS malware liability Easy Installation Implementing EgoSecure Endpoint is not a project that consumes a lot of IT resources over a long time or causes high costs for external consultants. Basic protection is already ensured after just 20 minutes of installation. The security standard can be refined incrementally, without the need to involve external consultants. Fast Easy Administration All functionality is controlled and monitored through the central, highly intuitive management console. The EgoSecure client on the users computers provides clear on-demand information on the individual security status without the need to contact the administrator. intuitive Ease of Use While most security functions run in the background, without requiring users to change their familiar workflows, the EgoSecure client provides users full transparency of all their actions on demand; this ensures full acceptance of the security system; users have no excuse and no reason whatsoever to try to bypass certain functionality. After all, a high degree of user acceptance contributes greatly to a high security standard. transparent customerreviews EgoSecure does not only provide comprehensive functionality, but has also worked closely with us in a way that exceeded normal support services by far. State Office of Criminal Investigation of the German federal state of Saarland For us, EgoSecure is clearly the leading endpoint security expert. base-camp IT Security & Solutions GmbH Due to its high degree of compatibility, EgoSecure was the first solution to meet our demands. City of Baden-Baden With EgoSecure, we have found a professional security product that will protect our client landscape against unauthorized data transfers without disrupting our users work. UniVersa Lebensversicherung a.g. Data security is a very important issue, and we are very grateful to have found a reliable as well as creative partner such as EgoSecure. TAP Desktop Solutions GmbH 05 Pforzheimer Str. 134 76275 Ettlingen/Germany Phone +49(0)7243.354.95-0 Mail contact@egosecure.com