Endpoint Device ControlRSS

In today's age of small, portable storage devices, the risk introduced into the network by these devices is large.  Trojans and viruses can be brought in on them, defeating nearly all of the network-based anti-virus measures implemented.  At the same time these storage devices can be used to carry out sensitive data, compromising the business.  Even when used legitimately to port information, they are easily laid down and lost, making that information available to anyone who picks up the device.

 

Endpoint Security includes applications to control the use of portable storage devices on the computer, encryption of the data on those devices, and improvements in the devices themselves to secure the information on them.

Commercial
Pricing Model

McAfee Application Control software provides an effective way to block unauthorized applications and code on servers, corporate desktops, and fixed-function devices. This centrally managed whitelisting solution uses a dynamic trust model and innovative se ...

Modified
McAfee Application Control
Commercial
Pricing Model

McAfee Endpoint Protection — Advanced Suite delivers integrated, proactive security that blocks malware and zero-day threats. It protects Windows, Mac, and Linux systems on and off your network. With centralized policy-based management and auditing, Endpo ...

Modified
Endpoint Protection — Advanced Suite
Commercial
Pricing Model

With Privilege Guard, all users log on to their desktop with standard user rights and elevated privileges are assigned directly to the applications and tasks that are required to perform their role. The solution can seamlessly elevate any privileged task, ...

Modified
Privilege Guard
Commercial
Pricing Model

The next generation of highly secure USB 3.0 compliant flash drives.   SafeToGo™ from Cardwave is a fully robust, hardware encrypted USB3.0 flash drive that protects your sensitive data. SafeToGo™ can be fully managed through the SafeCo ...

Modified
SafeToGo
Commercial
Pricing Model

Discover and protect sensitive data wherever it lives - on endpoints, in the Cloud or on-premise. Secure personal data and intellectual property and meet compliance use cases quickly with custom or out-of-the-box policies, applying unique DLP capabilities ...

Modified
Wave Systems Corp.
Commercial
Pricing Model

Knowing when your data has been accessed by removable storage devices and wireless ports is important. Reporter does that. But it also gives you the analysis you need to make sense of these incidents. It lets you chunk or chop up the information in a vari ...

Modified
Wave Reporter
Wave Systems Corp.

Inspector lets you decide which people and which data need minding, and which can have more freedom. First you define which data you consider sensitive—for example, patient names or credit card numbers. Then you define how each class of information is goi ...

Modified
Wave Inspector
Commercial
Pricing Model

Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location that can be scaled to meet organisational needs. Automate regular endpoint management rout ...

Modified
ManageEngine Desktop Central

© Computer Network Defence Limited 2021