Credant Technologies, the market leader in endpoint data protection solutions, announced today the launch of Credant Protector, its endpoint data leakage prevention solution that offers government and corporates comprehensive device and wireless port control, as well as extensive optical media (CD/DVD) encryption capabilities.
Credant Protector provides an unprecedented level of protection for their sensitive data, allowing authorised employees to utilise removable media while eliminating the risk that sensitive data may be lost, stolen, or corrupted.
“Sensitive data is a precious asset that must be protected,” said Sean Glansbeek, MD of Seven Days Technologies. “The continuous publicised malicious attacks to both government and corporate networks using USB drives, demonstrates that removable media can increase the vulnerability of sensitive data.
“At the same time, removable media also enhances the ability to share information - an essential tool in protecting government secret and sensitive data, corporate data such as intellectual property and customer information, and improving the efficiency and effectiveness of staff and their day-to-day processes. The Credant Protector solution helps meet these mission-critical needs, allowing IT administrators, rather than individual users, to control data ports.”
Credant Protector provides the functionality to disable AutoRun/AutoPlay features for removable media. In addition, Credant Protector offers a number of key safety measures, including:
Granular control - detects and restricts data transfers by device, device type, or serial number.
Data awareness - inspects files by type; allows, blocks, or restricts the transfer of files to and from external storage devices.
Extensive logging and reporting - intuitive management console provides unified management of policies, alerting preferences, logs, and custom reports.
Flexible/intuitive policy management - defines policies for any domain, group, computer, or user.
Built-in compliance policies - includes detailed configurations for achieving data security policies that are mapped to specific regulatory standards.
Anti-hardware keylogger - blocks both USB and PS/2 hardware keyloggers.
Credant Protector, powered by Safend, includes management features such as file shadowing, load balancing, management by domain, as well as options for large, matrixed government agencies to manage the entire deployment through a single server.
Share