End point data protection

January 2010 Information Security

Cyberoam, a vendor of identity-based unified threat management solutions, has announced the launch of its End Point Data Protection suite to secure corporate data and manage IT assets. This suite extends Cyberoam’s security protection from the gateway to the endpoint, reinforcing its presence as a complete security provider.

The extensive use of removable storage devices and file sharing applications makes end points the most vulnerable areas with research statistics showing more than 50% of data loss incidents originating at end points. The average total cost of a corporate data breach stands at $6,3 million and lost business accounts for 65% of breach costs, according to a study by the Ponemon Institute. End point data protection is thus recognised as a critical step in cutting data losses and delivering immediate ROI.

Cyberoam’s End Point Data Protection suite fills the gap for a dedicated end point security solution, supporting up to 3000 users, Cyberoam meets the data protection requirements of SMB and enterprise segments.

Says Harish Chib, VP of new business development at Cyberoam, “Blended threats do not distinguish between the gateway and the end point to gain entry. With the launch of the end point data protection suite, Cyberoam will secure organisations at the gateway and the desktop, offering a single, complete security solution.”

Cyberoam’s End Point Data Protection suite consists of four modules: Data Protection and Encryption, Device Management, Application Control, and Asset Management. With its policy-driven data protection and asset management, the suite delivers identity and group-based policy control as well as activity logging to provide comprehensive control and visibility of data transfer over removable devices, applications, chat applications, network sharing and printers.

Even as Cyberoam offers control with role-based access to removable devices and applications, its real benefits come in the form of high granularity in defining customisable whitelists and blacklists. User identity-based control over file handling, granular controls over data transfer based on user, group, time, file name, type, size, location, extending its controls outside the network in addition to creation of shadow copies ensures that Cyberoam delivers effective data security. Encryption and decryption controls of the file or removable device prevent data leakage either through loss of device or malicious transfer of data to unauthorised end points.

The Asset Management module for Windows enables organisations to take automated hardware and software inventory in addition to automating patch management, handling bug fixes across the network irrespective of the geographic location, allowing organisations to meet securitycompliance requirements.

More information on Cyberoam Endpoint Data Protection and a 30-day free trial is available at www.cyberoam.com/endpointdataprotection.

For more information contact Cyberoam, +91 79 6606 5606, [email protected], www.cyberoam.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...