資安常用軟體‎ > ‎加密解密‎ > ‎

becrypt Connect Protect

張貼者:2010年6月12日 下午8:16service orderble   [ eddie liu 已於 2012年8月7日 下午11:16 更新 ]
Connect Protect曾獲得CSIA認證標誌,同時成為DIPCOG組織成員並列入DCSA目錄。 它通過控制端口和播放設備來保護企業的信息免遭外部介質的盜用。 並且可以隨時探測到任何不安全的外部連接,通過控制USB驅動器、打印機、iPods、照相機、電話等設備的可用、不可用或只讀來達到保護內部資源安全的效果。

連接保護是一個終點控制解決方案,使企業能夠控制使用的“即插即用”設備,防止數據洩漏。 連接保護終點控制保護組織,防止未經授權的訪問和使用,外部可移動設備,並提供審計線索集中管理所有連接的事件。

連接保護是一個終點控制解決方案,幫助防止數據洩漏,確保沒有任何未經授權的訪問外部移動設備。

它控制使用的所有“即插即用”的設備和其他可移動媒體,使一個組織強制執行使用政策,防止資料外洩。 它可以防止未經授權的設備連接到網絡,它可以限制只使用已核准的設備。 此外,連接保護提供了一個完整的審計線索來跟踪設備的使用情況和突出否認,並授權連接。

連接保護功能的數字簽名,認可的設備,允許一個組織,嚴格控制什麼類型,多少,可移動存儲設備在該組織內使用。 這也可以防止數據洩漏,防止授權設備被克隆。

---------------------------------------------------

開發商:Becrypt
原廠網址:http://www.becrypt.com/apac/products/connect-protect
更新日期:2011/05/09
採購正式版、大量授權報價、技術支援、軟體諮詢、委託採購、詢問報價請來電 02-29299388 分機16 , 
來信service@orderble.com,或點我
------------------------------------------------------------------------------
特點:優點:
可移動媒體訪問是根據一個白名單的廠商品牌/型號,獨特的標識符或預先核准的數字簽名的設備。簡單和快速部署,因為只有中央發出批准設備可能被使用。 執行信息安全保障政策
與 Active Directory集成,允許集中管理和使用組策略。易於管理 - 沒有額外的訓練是必需的管理員。
允許使用的設備全面審計,包括阻止企圖和被動的監測和報告的所有設備的使用。用法很容易跟踪審計報告充分。
清除複製。 允許使用的監測設備與問候文件複製到和從授權設備。 文件的名稱和內容複製到和從可移動媒體可以被視為。複製歷史是很容易跟踪和跟踪法醫調查。
綜合審計。 柔性設備使用的審計允許細粒度控制,使不同層次的細節。管理員可以選擇所需的詳細程度為每個任務或調查
整合Becrypt企業管理提供了一個集中的審計能力從同一控制台同時 Becrypt盤保護和Becrypt連接保護。集中管理所有Becrypt節省時間,使產品更符合效率和效益。
電子郵件報警。 電子郵件管理員與警報設備基於一個可定制的事件,如被拒絕的設備。管理員是擺脫了手工檢查任務,定期對系統和設備中使用。
挑戰的回應。 允許臨時訪問設備重置密碼。提供機制重置丟失或遺忘密碼不暴露原始密碼,維持治安。

End Point Control with Connect Protect

Connect Protect is an end point control solution that enables organisations to control the use of "plug and play" devices and prevent data leakage. Connect Protect end point control protects organisations, by preventing unauthorised access to, and use of, external removable devices and providing centrally managed audit trails for all connection events.

Connect Protect is an end point control solution that helps prevent data leakage by ensuring there is no unauthorised access to external removable devices.

It controls the use of all “plug and play” devices and other removable media, enabling an organisation to enforce a usage policy, preventing data leakage. It prevents unauthorised devices from connecting to the network; it can restrict usage to approved devices only. In addition, Connect Protect provides a full audit trail to track device usage and highlight denied and authorised connections.

Connect Protect features digital signing for approved devices allowing an organisation to strictly control what type, and how many, removable storage devices are in use inside the organisation. This also prevents data leakage by preventing authorised devices from being cloned.

Features:Benefits:
Removable media access is based upon a white list of vendor make/model, unique identifier or pre-approved digitally signed devices.Straightforward and fast to deploy as only centrally issued, approved devices may be used. Enforces Information Assurance policy
Integrates with Active Directory to permit centralised management and the use of group policies.Easy to manage - no additional training is required for the administrator.
Allows full auditing of device usage, including blocked attempts and passive monitoring and reporting of all devices usage.Usage easily tracked with full auditing reports.
Clear Copy. Allows the monitoring of device usage with regards to file copying to and from an authorised device. File names and content copied to and from removable media can be viewed.Copying histories are easy to track and trace for forensic investigations.
Integrated Auditing. Flexible auditing of device usage allows for fine grain control, giving varying levels of detail.Administrators are able to choose level of detail required for each task or investigation
Integration of Becrypt Enterprise Manager gives a centralised audit capability from the same console for both Becrypt DISK Protect and Becrypt Connect Protect.Centralised management of all Becrypt products saves time and makes compliance more efficient and effective.
Email Alerting. Emails the Administrator with an alert based upon a customisable device event such as a denied device.Administrator is freed from the task of regularly manually checking on systems and devices used.
Challenge Response. Allows temporary access to devices to reset passwords.Provides mechanism for resetting lost or forgotten passwords without exposing the original password, maintaining security.







Comments