Stop data leakage through endpoints and removable media

 

Key features

Industry statistics consistently show that the most significant threat to the organization comes from within. With more than 70% of corporate data residing on endpoints, pure gateway security solutions and written security policies alone cannot mitigate the risks of information leakage.  

Learn More:


Datasheet
 

Growing numbers of removable storage devices, physical and wireless interfaces, and users with access to sensitive data have made information leakage via endpoints—both accidental and malicious—a real enterprise threat. It is simply too easy to connect a USB stick, digital camera or iPod to an endpoint at an organization and walk away with sensitive material. It is just as easy to use Wi-Fi, Bluetooth or a 3G modem to bridge classified internal networks to open external networks.

These are exactly the security risks that SafeGuard PortProtector is designed to manage. It controls every endpoint and every device over every interface and guarantees easy-to-use and flexible information leakage prevention. SafeGuard PortProtector monitors real-time traffic and applies customized, granular security policies for all types of interfaces and external storage devices:

  • Physical interfaces: USB, FireWire, PCMCIA, Parallel, Serial, etc.
  • Wireless interfaces: Wi-Fi, Bluetooth, Infrared (IrDA)
  • External storage devices: removable media, CDs/DVDs, floppy drives, etc.

SafeGuard PortProtector detects and allows restrictions of device type, model or even specific serial number. SafeGuard PortProtector enables administrators to block all storage devices completely, permit read-only mode or encrypt all data on devices. In addition, administrators can monitor, block and/or log files that are written to or read from these devices.

In addition to SafeGuard PortProtector, the comprehensive SafeGuard PortAuditor helps administrators visualize who is connecting to corporate endpoints. With SafeGuard PortAuditor, administrators can distinguish between secure productivity enhancers, such as authentication tokens, and potential security threats, such as mass-storage MP3 players. Using this report data, IT management can enforce granular security policies that exactly meet the business needs.

Benefits

  • Enhanced Information Security. SafeGuard PortProtector prevents data leakage and theft, enterprise penetration and introduction of malware.
  • Easy to deploy and manage. Quick and easy to deploy via Windows Installer or standard software management systemsEasy to manage. Easier administration enabled by integration with Microsoft Active Directory® and Novell® eDirectory™.
  • Easy to use. SafeGuard PortProtector runs transparently in the background: no change in users working habits and no end user training is necessary.