資安常用軟體‎ > ‎加密解密‎ > ‎

Check Point Media Encryption

張貼者:2010年10月15日 上午1:12未知的使用者   [ eddie liu 已於 2012年8月7日 下午11:16 更新 ]
Check Point Media Encryption固定檢查點媒體加密敏感的公司數據和阻止傳入惡意軟件通過加密可移動媒體,如USB存儲設備,CD,DVD和控制活動(讀,寫和執行)的端口和設備。 所有設備的內容會自動加密的背景為透明的最終用戶體驗。 獨特的檢查站,用戶可以訪問加密的媒體對非託管的計算機安全,沒有客戶端安裝。 作為唯一的設備和端口控制解決方案,集成了單一端點安全代理,檢查站的媒體加密簡化合規性和降低了管理開銷。 現在支持Windows 7。







-----------------------------------------
開發商:Check Point Software Technologies Ltd.
原廠網址:http://www.checkpoint.com/products/datasecurity/protector/
更新日期:2011/05/09
採購正式版、大量授權報價、技術支援、軟體諮詢、委託採購、詢問報價請來電 02-29299388 分機16 , 
來信service@orderble.com,或點我
------------------------------------------------------------------------------






特點

加密策略管理
在設備上存儲的信息進行加密和可移動媒體 - 加密策略管理器允許用戶加密設備和可移動介質的強烈算法,包括256位AES。 與眾不同的是,加密策略管理器可以配置為允許安全加密的媒體訪問時,使用非託管計算機,商務中心等家庭或個人電腦。 另外,用戶可以安裝一個插件,使設備訪問從非託管個人電腦。

設備管理
保護企業信息和個人電腦通過控制終端設備可以訪問,哪些端口可以被用來 - 設備管理器控制對可移動設備,如USB閃存驅動器,CD / DVD驅動器,智能手機和掌上電腦。 訪問可以使用白名單管理或黑名單,或定義在粒度級別按類型,品牌,規格,或ID。 分配唯一的序列編號,以更精細的裝置管理方案。 設備管理器還可以啟用 /禁用個人 PC端口,如USB,火線,藍牙,WiFi和LPT。

Device Manager


可移動介質管理

確保所做的更改設備上存儲的信息由用戶授權 - 可移動介質管理器放置一個獨特的數字簽名的每個加密設備,設備內容被修改時,數字簽名更新。 如果內容被改變使用電腦,並沒有媒體加密安裝,用戶必須重新授權設備才能用於保護環境。 使用DataScan(見下文)和殺毒軟件,可移動媒體管理器還可以強制儀,掃描惡意軟件,授權訪問。

DataScan
防止不良的文件,如可執行文件和惡意軟件,通過港口進入終點 - DataScan可以阻止或允許轉讓的具體文件類型,所確定的擴大和內部文件的結構,並阻止訪問設備,直到危險或禁止的文件已被刪除。


程序安全衛隊

保障信息和端點,防止用戶從創建,修改或刪除特定文件類型 - 管理員可以定義受保護的文件的擴展和建立例外的文件進行修改信任的應用程序。

Program Security Guard


審計和警報

簡化合規性審計和事件通知 - 與其它的解決方案,媒體加密存儲記錄到一個中央數據庫,使輕鬆創建詳細的報告,使用結構化查詢。 管理員還可以集中監控和審計文件操作可移動設備,如哪些文件被轉移或從單個設備和時間。 電子郵件警報可以被配置為通知管理員提供的有關具體活動。

Auditing and Alerts

















Features

Encryption Policy Manager
Encrypts information stored on devices and removable media — Encryption Policy Manager allows users to encrypt devices and removable media using strong algorithms including 256-bit AES. Uniquely, Encryption Policy Manager can be configured to allow secure access to encrypted media when using unmanaged computers, such home or business center PCs. Alternatively, users may install a plug-in to enable device access from unmanaged PCs.

Device Manager
Protects corporate information and endpoint PCs by controlling which devices can be accessed and which ports can be used — Device Manager controls access to removable devices, such as USB flash drives, CD/DVD drives, Smartphones, and PDAs. Access can be managed using a whitelist or blacklist, or defined at a granular level by type, brand, size, or ID. Assign unique serial numbers to devices for more granular management options. Device Manager can also enable/ disable individual PC ports, such as USB, FireWire, Bluetooth, WiFi and LPT.

Device Manager


Removable Media Manager

Ensures that changes made to information stored on devices are authorized by the user — Removable Media Manager places a unique digital signature on each encrypted device, and whenever device contents are altered, the digital signature is updated. If the contents have been altered using a computer which does not have Media Encryption installed, the user must re-authorize the device before it can be used in the protected environment. Using DataScan (see below) and antivirus software, Removable Media Manager can also force devices to be scanned for malware before granting access.

DataScan
Prevents undesirable files, such as executables and malware, from entering endpoints through ports — DataScan can block or allow transfer of specific file types, as determined by extension and internal file structure, and block access to devices until dangerous or prohibited files have been deleted.


Program Security Guard

Safeguards information and endpoints by preventing users from creating, modifying or deleting specific file types — administrators can define protected files by extension and create exceptions for modification of files by trusted applications.

Program Security Guard


Auditing and Alerts

Simplifies compliance audits and event notification — unlike other solutions, Media Encryption stores logs to a central database, enabling easy creation of detailed reports using structured queries. Administrators can also centrally monitor and audit file operations on removable devices, such as which files were moved to or from individual devices, and when. Email alerts can be configured to notify administrators about specific events.

Auditing and Alerts