Endpoint Device ControlRSS

In today's age of small, portable storage devices, the risk introduced into the network by these devices is large.  Trojans and viruses can be brought in on them, defeating nearly all of the network-based anti-virus measures implemented.  At the same time these storage devices can be used to carry out sensitive data, compromising the business.  Even when used legitimately to port information, they are easily laid down and lost, making that information available to anyone who picks up the device.

 

Endpoint Security includes applications to control the use of portable storage devices on the computer, encryption of the data on those devices, and improvements in the devices themselves to secure the information on them.

SafeGuard Encryption

Sophos SafeGuard Enterprise Encryption 7, formally SafeGuard Easy, introduces the most complete data protection solution on the market today, protecting data on multiple devices and operating systems. Whether your data resides on a laptop, a mobile device ...

VendorSophos PLC
Pricing ModelCommercial
Modified
Wave Protector

Around 70 percent of security breaches and data thefts are inside jobs (Vista research). A lot of that is just carelessness or, let’s be frank, defiance: for busy people, security can feel like a headache. Protector enforces your security strategy. ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified
ZENworks Endpoint Security Management

Desktop Management (or ZDM for 'ZENworks Desktop Management') allows administrators to install software on, configure, put a hard-disk image on, inventory and remotely troubleshoot Windows-based workstations and laptops from a central location, through us ...

VendorNovell
Pricing ModelCommercial
Modified
Lumension Endpoint Management and Security Suite

Lumension® Endpoint Management and Security Suite delivers an end-to-end suite of solution capabilities across endpoint operations, security, compliance and IT risk management to reduce complexity, optimize TCO, improve visibility and deliver control ...

VendorLumension Security Inc
Pricing ModelCommercial
Modified

FrontRange DeviceWall Endpoint Security is a critical part of any organization's Data Loss Prevention (DLP) strategy, securing network endpoints against the risk of accidental or deliberate security breaches. DeviceWall locks down the unauthorized use of ...

VendorFrontRange Solutions USA
Pricing ModelCommercial
Modified
Check Point Media Encryption Software Blade

The Check Point Media Encryption Software Blade provides centrally-enforceable encryption of removable storage media such as USB flash drives, backup hard drives, CDs and DVDs, for maximum data protection. Educating users on when to share and not share co ...

VendorCheck Point Software Technologies
Pricing ModelCommercial
Modified

The ClipDrive Bio? is the solution for the user that requires an easy to use, lightweight, highly effective device for transporting sensitive data from one location to another. Utilizing state-of-the-art biometric fingerprint technology coupled with 256 b ...

VendorMXI Security
Pricing ModelCommercial
Modified
TRITON AP-ENDPOINT

TRITON AP-ENDPOINT protects roaming users against data theft while on and off the network. Secure personal data and intellectual property and meet compliance use cases quickly with custom or out-of-the-box policies, applying unique DLP capabilities to con ...

VendorWebsense, Inc.
Pricing ModelCommercial
Modified

AppSense Environment Manager provides consistent and contextual user environments across multiple application delivery mechanisms. With AppSense Environment Manager, IT can manage user profiles with minimal maintenance as well as provide users with some l ...

VendorAppSense
Pricing ModelCommercial
Modified

Connect Protect is BeCrypt's end point control solution that protects organisations against data leakage, by preventing unauthorised access to, and use of, external devices and providing centrally managed audit trails for all connection events. Connect ...

VendorBeCrypt Limited
Pricing ModelCommercial
Modified
Panda Security for Business with Exchange

Protection for workstations, file servers and MS Exchange servers: Panda Security for Business with Exchange offers all that SMBs need to protect against malware, spam and unwanted content. Simple to install through the AdminSecure centralized management ...

VendorPanda Software
Pricing ModelCommercial
Modified

Panda Security for Business is the ideal endpoint security solution. It offers complete protection for workstations and file servers. It's an easy-to-use solution that protects your computers against malware (viruses, spam, phishing, spyware, rootkits, et ...

VendorPanda Software
Pricing ModelCommercial
ModifiedNever

entegra provides powerful and effective endpoint security and network access control functionality that protect endpoints inside and outside the perimeter. The entegra endpoint security framework offers centralised policy management and distribution, ...

VendorPhion AG
Pricing ModelCommercial
Modified
DeviceLock DLP Suite

DeviceLock DLP Suite consists of five modules that protect your organization from data leak threats: DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can&rsqu ...

VendorDeviceLock, Inc.
Pricing ModelCommercial
Modified
Wave Auditor

Auditor is a lightweight, intuitive, clientless software utility that illuminates enterprise endpoint blind spots – providing organizations with the visibility they need to identify and effectively manage endpoint vulnerabilities. With Auditor, adm ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified
McAfee Device Control

Regulate the use of removable media on your network McAfee Device Control helps you monitor and restrict data copied to removable storage devices and media to keep it from leaving company control.   Features: Comprehensive device and data ...

VendorMcAfee Inc.
Pricing ModelCommercial
Modified
McAfee Host Data Protection

McAfee Host Data Loss Prevention monitors and prevents risky user behavior that can lead to a sensitive data breach. This protection works across networks, through applications, and via removable storage devices. You’re in control whether users are ...

VendorMcAfee Inc.
Pricing ModelCommercial
Modified
McAfee VirusScan USB

Automated, daily anti-virus updates install silently in the background, ensuring your USB drive is always protected from evolving and emerging virus threats. Fast scans identify and remove viruses on your USB drive, without interrupting your wo ...

VendorMcAfee Inc.
Pricing ModelCommercial
Modified
Symantec Security Check

Is your computer safe from online threats? The Security Scan performs the following tests and offers recommendations based on the results: Hacker Exposure Check Checks whether your computer allows unknown or unauthorized Internet communications. Wi ...

VendorSymantec Corporation
Pricing ModelOnline Use Only
Modified
McAfee Encrypted USB

McAfee Encrypted USB devices keep sensitive data safe and secure, wherever it goes. A variety of Encrypted Device options are available- hard disks range in storage size from 250 GB to 750 GB, while sticks range from 1 GB to 64 GB. Features: Central ...

VendorMcAfee
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2019