CYBEROAM ENDPOINT DATA PROTECTION PDF

Cyberoam, a provider of identity-based Unified Threat Management solutions, has launched its Endpoint Data Protection suite to secure corporate data and manage IT assets. This suite extends Cyberoam's security protection from the gateway to the endpoint, reinforcing its presence as a complete security provider. Harish Chib, vice president, New Business Development, Cyberoam, says, "Blended threats do not distinguish between the gateway and the endpoint to gain entry. With the launch of the Endpoint Data Protection suite, Cyberoam will secure organisations at the gateway and the desktop, offering a single security cover for organisations. With its policy-driven data protection and asset management, the suite delivers identity and group-based policy control as well as activity logging to provide control and visibility of data transfer over removable devices; applications; chat applications such as Skype, MSN and more; network sharing and printers.

Author:Juzshura Shakakus
Country:Mauritius
Language:English (Spanish)
Genre:Sex
Published (Last):13 September 2004
Pages:81
PDF File Size:17.39 Mb
ePub File Size:19.42 Mb
ISBN:494-3-94180-579-3
Downloads:33499
Price:Free* [*Free Regsitration Required]
Uploader:Shakak



Name: Endpoint Data Protection Suite Description: The Endpoint Data Protection Suite from Cyberoam is a full-feature, full-function suite that consists of four modules, which include data protection and encryption, device management, application control and asset management.

The Endpoint Data Protection Suite from Cyberoam is a full-feature, full-function suite that consists of four modules, which include data protection and encryption, device management, application control and asset management. The data encryption and protection module allows for control over document transfer and read-write access to files, as well as shadow copy protection and print controls. The device management module controls access to removable media, such as USB storage devices, as well as many other types of removable storage.

The application control module controls use of applications, such as instant messaging, peer-to-peer and FTP utilities. The final piece of the suite allows for asset management and inventory control across the enterprise network. We found this product to be a simple install and easy to manage. The installation process consists of running an executable installer on the server and providing the SQL server information for the backend database. After the installation is complete, agents can be easily deployed using the included agent deployment tool.

Once the installation is complete and the agents installed, all policy configuration and deployment is done through a management console application. We found this console to be easy to use and intuitive to navigate. Setting up policy was also quite easy. The policy engine allows for very granular or very broad policy by creating various computer and user groups.

The groups can be pulled directly from Active Directory so they can either be the same as they are in Active Directory or modified specifically for the use of the product. Documentation included two PDFs. The first was an installation guide, which provided detailed initial setup and configuration steps and instructions, including database prerequisites. The second was the administrators guide, which included instructions for how to configure policies and advance program features.

Both guides included many screen shots and step-by-step configuration examples. Cyberoam includes the first year of basic support in the purchase of the product. After the first year, users must renew a support subscription to continue using the phone and email support. Keeping your eyes on the asset management prize. Why unmanaged device discovery is critical for asset management programs. Login Register. Rating: 5. Quick Read Strengths: Easy to use with a lot of features.

Verdict: For its ease of use and strong feature set, we make this one our Recommended product this month.

Popular Emailed Recent Loading Please login or register first to view this content. Open Next hm-product-review in Endpoint Security Close. Trend Micro Data Loss Prevention.

KYOSHO KATALOG 2011 PDF

Cyberoam Launches Endpoint Data Protection

It's now turned its attention to endpoint security. Its Endpoint Data Protection EDP software is split into four modules, with the device control option handling workstation ports and devices. Application control determines what software users can run, while asset management provides full inventory and vulnerability assessments. The data protection module applies encryption to removable storage devices, runs shadow copies of data being transferred to removable devices and controls file transfers for IM and email. The Management Suite covers all modules, but you can choose any as they all run from the same console.

ANATOMIA UNUI CORP PERFECT PDF

Cyberoam Endpoint Data Protection Suite

Endpoint data protection is thus increasingly being recognized as the critical immediate step in cutting data losses and delivering immediate ROI. Supporting up to users, Cyberoam meets the data protection requirements of SMB and enterprise segments. With the launch of the endpoint data protection suite, Cyberoam will secure organizations at the gateway and the desktop, offering a single, complete security cover for organizations. With its policy-driven data protection and asset management, the suite delivers Identity and group-based policy control as well as activity logging to provide comprehensive control and visibility of data transfer over removable devices; applications; chat applications such as Skype, MSN and more; network sharing and printers. Our endpoint solution opens a whole new opportunity for channel partners for revenue generation and expanding the customer base. Even as Cyberoam offers comprehensive control with role-based access to removable devices and applications, its real benefits come in the form of high granularity in defining customizable whitelists and blacklists. User identity-based control over file handling, granular controls over data transfer based on user, group, time, file name, type, size, location, extending its controls outside the network in addition to creation of shadow copies ensures that Cyberoam delivers effective data security.

Related Articles