Powerful and flexible security solution.
Powerful and flexible security answer against data leakage. The program provides full-scale protection, distinctively combines file lifecycle tracking with portable data stores and rights management with regard to users and/or files. It allows you to track and enforce compliance with security policies and requirements (ISO/IEC 27001: 2005 (BS7799), CobIT, SOA), and provides real-time notification and post-event analysis of user actions and incidents. Supports signing and evaluating file level operations, as well because copy/paste/print actions. By producing reports, the program can not only search for and sort simple actions, but can also return precise results about actions taken on certain files, the user these actions were performed by, and the time of these actions; the results can show when, where and by whom another data storage device was mounted, and what sort of operations were completed on it. Based on the specified settings, the system can evaluate incoming info in run-time, and can send a security alert of any operation to the security team. It supports creating isolated areas (or quarantines), which help secure confidential documents even against system administrators. It helps produce a network-wide security zone, blocking the way from computers that have been added, or located away from protected zone. Through the separation of user rights, it supports not only the segregation of operating and protection tasks, but also the use of notebooks inside or outside the network; on supported operating systems, the program’s functions work on any type of file systems, applications, or hardware. The program helps prevent data loss, too. Due to their flexible structure and multilingual nature, the segments of This program Development can become installed in any mixtures within small organizations, as well as on wide networks of any size. It therefore offers a full-scale and comprehensive treatment for network operators, security experts, and organization managers.
|