About
Subscribe

Manage the known and allowed, deny all else

Introducing Sanctuary from SecureWave, part of the Condyn Security Framework
Johannesburg, 24 Jul 2006

Would you like to simply:

* Stop all unwanted executables. Define what`s allowed and all other code is blocked. Spyware, unlicensed software and all executable "malware" simply could not run.
* Stop unauthorised attempts to install non-official applications (downloads from the Internet or use of I/O device such as CDROM drive or USB memory sticks to install).
* Reduce the management cost of a network by up to 60%, increasing the stability and availability of critical business applications while at the same time reducing instances of support intervention on both desktops/laptops and servers.
* Patch systems and software without stress and panic safe in the knowledge that no rogue code could ever exploit vulnerability.
* Control access to USB sticks, PDAs, cameras, CD/DVD and all other devices. Limit how much data is copied out and audit what`s taken.
* Supports BS7799/ISO7799 standards.

Enterprise security can no longer stop at the physical or IT network walls. Mobility, integration with third-party networks, wireless access, encryption and the virtual enterprise have destroyed the concept of a physical perimeter. Today organisations need to deploy a `defence in depth` strategy, addressing in layers not only firewall, anti-virus, anti-spam and other messaging and network security requirements, but they must also consider `who has access to what and when`.

"Companies of all sizes are investing significant sums in building defences for their critical networks and systems to protect themselves from malicious attacks and to prevent the leakage of confidential information. But when an employee takes a mobile device such as a laptop home, with all of that sensitive data, what stops them from downloading information onto a memory stick, or a DVD writer? When someone downloads something from the Web that has a hidden executable that can disrupt or destroy a network buried in it, what protects the organisation?" asks Stuart Winter, Sales Director of Condyn.

"Most security products today counter known threats, but do not address the vulnerability of the organisation to inside threats and to the next `unknown` threat. Risk and exposure continues to increase as these threats become more sophisticated. Sanctuary solves the business problem by making security intrinsic within the computer, every user (and by default, the organisation) is protected everywhere, all the time," he noted.

"Sanctuary is a new suite of enterprise-level end point security products that provide both centralised control and operational flexibility. Security administrators can set rules, monitor activity, even lockdown the organisation if necessary, regardless of the size or dispersion of the enterprise. With Sanctuary, you control your company`s entire desktop environment. You determine the applications and I/O devices that are allowed and who can use them. Yet at the user level, Sanctuary let desktop users specify exceptional or user-specific applications and executable files. Everything else is denied, period," stated Roger Wagner, SecureWave`s VP of Sales.

Share

Editorial contacts

Jorina van Rensburg
Condyn
(012) 665 4356
jorina@condyn.net