Espanhol Português Inglês

 

 

 

Next-Generation Data Encryption for Fully Compliant Protection


In today's information-driven business world, data travels with employees, contractors and partners wherever they go. Business-critical data is used, shared and stored across desktops, laptops, handheld devices, smartphones, USB drives, CD-DVDs and other devices. And wherever this data resides, it has to be fully protected from theft and leaks in a flexible, non-intrusive manner.

 

 

That's why the CREDANT Mobile Guardian (CMG) family of products is centralized, unlike hard-to-manage, ineffective traditional data security systems that rely on full disk encryption. CMG delivers compliance-ready data encryption and security through a single console for all endpoint devices, including external media. In fact, CMG is the only centrally-managed solution that provides data-centered, policy-based protection across all data endpoints – all while ensuring a minimal impact on operational processes and the user experience.

 

CMG Delivers Above and Beyond Traditional System's Limitations

 

 

Traditional data security technologies such as Full Disk Encryption (FDE) are failing to keep up with the changing needs of endpoint data protection.

 

CMG offers policy-based Intelligent Data Encryption that delivers multi-level security for both data privacy and compliance – but without the management and usability problems found with FDE. CMG closes the security holes in file folder encryption, taking data encryption out of the user's hands while encrypting temporary files and folders that contain sensitive information.

 

 

Flexible, In-depth Defense

 

CMG endpoint security solutions provide complete in-depth defense. This means that companies can “dial up” or “dial down” security levels for individual accounts based on the user’s information needs, role and location.

 

CMG Provides Six Key Layers of Protection:

 

1. User data encryption, allowing IT to protect data that only an individual user needs to see and interact with such as 401k data.

2. Application data encryption, enabling IT to transparently protect output from applications without requiring the end user to do anything.

3. External media encryption, which automatically protects data as it moves to USB, iPod or other external storage.

4. Common data encryption, permitting end users to interact with a shared file while providing data protection that is transparent to the users.

5. System data encryption , enabling IT to manage and protect all data and encrypt everything except the first few files for boot-up. This eliminates the need for pre-boot while still providing maximum protection.

6. Operating system protection, pro-actively allowing operating system protection based on policies to encrypt the security accounts manager (SAM) database, protect the temp files and secure the password hash.

 

Based on experience with hundreds of successful deployments, CREDANT solutions achieve the right balance of protection and usability critical to a successful data security program deployment. The key is to manage risk with a solution that provides security and manageability. With CMG, both are included.

 

Learn more about CREDANT products and how they provide organizations with proven-effective endpoint data protection.

 

 

...........................................................................................................................................................................................................................................................................................................
© 2010 BRsec - Network and Security Solutions. All rights reserved - Phone / Fax: +55 (11) 3675-2016 - E-mail: vendas@brsec.com.br