Safend

Safend - True Endpoint Security

Safend Data Protection Suite protects organizations from data leakage and theft with a single software product, providing granular port and device control, transparent hard disk encryption, comprehensive removable media encryption and accurate content control. It provides complete protection of sensitive data-in-use, data-at-rest and data-in-motion, without sacrificing productivity.

Port and Device Control and Removable Media Encryption

  • Protect your enterprise from data leakage and theft
  • Eliminate targeted attacks via physical and wireless interfaces
  • Enable connectivity and productivity without compromising security
  • Enable compliance with regulatory, data security, and privacy standards
  • Deploy and manage a single agent for all data protection needs
  • Allow exclusive usage of storage devices while blocking all others
  • Eliminate malware and virus outbreaks via removable storage devices

Endpoint Data Protection - Challenges and Risks

Industry statistics consistently show that the most significant security threat to theorganization comes from within. With over 60% of corporate data residing on endpoints,gateway solutions and written security policies alone can not mitigate the risk.

Growing numbers of removable storage devices, physical and wireless interfaces andusers with access to sensitive information have made data leakage via endpoints, bothaccidental and malicious, a real threat. It's simply too easy for someone to connect asmartphone, digital camera, or memory stick to an enterprise endpoint and walk awaywith sensitive data. It's just as easy to use WiFi or a 3G modem to bridge classified internalnetworks to open external networks.

Eliminate Stop Data Leakage through Physical Ports andRemovable Media

Protector is the industry's most comprehensive, secure and easy-to-use endpoint dataprotection and data leakage prevention solution – controlling every endpoint and everydevice, over every interface.

Protector monitors real-time traffic and applies customized, highly-granular securitypolicies over all physical/wireless interfaces and external storage devices.

Protector detects and allows the restriction of devices by device type, model or evenspecific device serial number. For storage devices, Protector allows security administratorsto either block all storage devices completely, permit read-only or encrypt all data. It alsomonitors, blocks and logs files that are downloaded to or read from these devices. WiFicontrols are based on MAC address, SSID, or network security level.

Comprehensive Reporting and Analysis

  • Enable compliance with regulatory, data security, and privacy standards
  • Identify common security breaches by user or organizational units
  • Analyze reports at a high level or detailed view
  • Monitor all your data protection measures with a single product
  • Endpoint Data Protection - The Demand for Comprehensive Reporting

With the regulatory compliance reporting mandates of Sarbanes Oxley, (SOX), HIPAA, PCI,FISMA, BASEL II, UK Data Protection Act (DPA) and others, the effective use of data securityintelligence has become increasingly important and the need for comprehensive reportingis more prevalent than ever.

Reporter - a Heightened Level of Visibility

Reporter is a component of the Data Protection Suite that addresses the security andoperational reporting needs of an organization's IT and security personnel. Reporterpresents information in a clear, easy-to-understand dashboard format that can benefit allviewers including non-technical and executives, through drill-down capabilities.

Reporter allows easy detection of specific employees and departments that frequentlydisregard internal security policies, while the administrative reports assist in the deployment,policy distribution and overall visibility of endpoint activity within the organization. The reportscan be scheduled and sent periodically by email to predefined recipients in order to ensurecontinuous tracking of the organization's data security status and compliance to internalsecurity policies. Coupled with Wave Protector's built-in compliance policy settings for HIPAA,PCI and SOX, Reporter provides unparalleled regulatory compliance reporting that helpsmeet the data accountability tenets of these and other compliance standards.

Content Inspection and Filtering

  • Prevent sensitive data leakage through email, web, removable storage, mobile phones, and additional data transfer channels
  • Avoid user errors and enhance security awareness
  • Enable compliance with regulatory, data security, and privacy standards
  • Deploy and manage a single agent for all data protection needs

The Need for Endpoint Content Control

Industry statistics consistently show that the most significant security threat to the organization comes from within. With over 60% of corporate data residing on endpoints, gateway solutions and written security policies alone cannot mitigate the risk.

Sensitive data can exit organizational boundaries through multiple channels; it can be carried away on a USB flash drive, burned to a CD, sent via email or posted on the web. While some data transfer channels can be partially disabled to minimize the risk, few organizations can completely disable outbound data traffic without dramatically affecting productivity. To properly balance security and compliance demands with business objectives, enforcement measures must be carefully adjusted to control only the specific data restricted by company policy, without interrupting legitimate user actions.

Eliminate Sensitive Data Leakage

IInspector enforces a data-centric security policy across multiple channels, including email, web (HTTP, HTTPS), FTP, external storage devices, CD/DVD burners, cloud storage, file repositories, print screen, local printers, and network printers, without disrupting legitimate business processes or harming end-user productivity.

User actions can be stopped, generate an "are you sure?" message, monitored, or generate an alert for the security administrator, based on the actual content of the transferred data as well as the action context and meta data. This protection is fully active regardless if the machine is connected to the organization's network, a home network or used offline. In addition, select end-users can assist in classifying information, assisting the IT department in improving the accuracy of the system and minimizing false alerts.

Security policies are highly granular, and can apply different protection measures according to channel-specific context information. For example, a security policy can prevent users from downloading confidential data to external storage devices other than company-issued, hardware-encrypted devices.

Hard Disk Encryption

  • Protect enterprise data from loss and theft
  • Achieve optimum balance between security, productivity and performance
  • Waive disclosure requirements in the event of machine loss or theft with provable encryption
  • Enable compliance with regulatory, data security, and privacy standards
  • Deploy and manage a single agent for all data protection needsWave Data Protection SuiteAuditorEncryptorProtectorReporterDiscovererInspector

The Need for Endpoint Data Protection

Laptops have become a significant part of an organization's computing fleet. The mobility and convenience that make laptops so useful to employees and organizations also make them a weak spot in enterprise data security.

While the cost of replacing software and hardware for a lost or stolen laptop is limited, the lost data may cause tremendous damage to the organization when it falls into the wrong hands. The financial implications associated with the leakage of sensitive data can be staggering, the fines for noncompliance can be astronomical, and the loss of corporate reputation immeasurable.

Encryptor – Eliminate Endpoint Data Loss

Encryptor enforces an enterprise-wide encryption policy to protect the data stored on laptop and desktop hard disks, so that sensitive data cannot be read by unauthorized users in the case of loss or theft.

Encryptor utilizes Total Data Encryption technology, that automatically encrypts data files, while avoiding unnecessary encryption of the operating system and program files. This innovative concept minimizes the risk of operating system failure, and has a negligible performance impact.

Leveraging this unique encryption technology, Encryptor provides transparent hard disk encryption. Encryptor seamlessly protects your data, without changing any of your existing end-user or helpdesk workflows.

Encryptor and Protector are components of the Data Protection Suite. Protector provides centrally enforced removable media encryption for storage devices, external hard drives, and CD/DVD, as well as comprehensive port and device control.