Archive for January, 2010

January 18, 2010

Cyberoam End Point Data Protection

More than half of corporate data lies unprotected over endpoints in organizations. Sensitive information like customer data, trade secrets, intellectual property, and legal documents reside over endpoints for their productive use by authorized users. However, easy access by users to portable devices and applications like USBs, DVDs, MP3s, file-sharing applications, Instant Messengers, and more, make it easy for them to maliciously or accidentally leak this data. Today, the cost of lost/stolen data to an organization is massive with lost business resulting in 65% of breach costs, according to research. Hence, organizations need to protect their corporate data at endpoints from unauthorized sharing or leakage by insiders.

Besides, centralized, automated Asset Management is necessary at the endpoint due to the presence of large number of users, branch offices, rise in sophisticated attacks and the resultant bugs and vulnerabilities. Hence, securing the endpoint to protect corporate data and assets has become critical, with a rapidly rising number of organizations deploying dedicated data protection suites that offer user-level controls when handling data.

Benefits

  • Prevent endpoint data leakage
  • Extend data security beyond the network
  • Enhance employee productivity by blocking unauthorized applications
  • Streamline IT infrastructure management
  • Lower Total Cost of Ownership of IT infrastructure
  • Reduce malware penetration through patch management
  • Meet security compliance with IT asset management
  • Reduce legal liability and business losses

 

Endpoint Data Protection

Cyberoam Endpoint Data Protection protects the organization’s endpoints from data leakage through Identity and group-based policy controls, encryption, shadow copies, logging, reporting and archiving. Cyberoam offers data protection and asset management in four easy-to-deploy and use modules –

  1. Data Protection and Encryption
  2. Device Management
  3. Application Control
  4. Asset Management 

Application Control

Unrestricted application usage can result in the use of unauthorized, illegal and malware-laden applications, causing data loss, productivity loss, legal liability and network outages. The Application Control module allows organizations to prevent data loss by allowing or blocking access to specified applications. Application logs allow them to view the type and time of applications used at endpoints across the organization.

a)    Capture Instant messenger in / out communication

b)    Capture Outlook / Outlook Express in / out mail conversation with attachment

c)    Capture webmail out content with attachment

d)    Capture details even user offline

Advertisements
January 4, 2010

Technology Trends 2010

  1. Unified Communication
  2. Information Security
  3. Cloud Computing
  4. Virtualisation
  5. Mobile application
  6. Data Centre Management
  7. Mobility & GPS
  8. Business Intelligence
  9. Gaming Application & Animation
  10. Bar-coding & RFID