資安常用軟體‎ > ‎安全工具‎ > ‎

DeviceShield

張貼者:2010年9月29日 上午3:47未知的使用者   [ eddie liu 已於 2012年8月8日 上午1:23 更新 ]
DeviceShield Endpoint Security SoftwareDeviceShield就好像有一個防火牆,工程對在你的電腦網絡的完整性,以保護您公司的機密數據。

保護你的網絡中的病毒和間諜軟件侵入通過安裝最新的防火牆和防病毒保護,但您的組織的安全最敏感的信息和知識產權可能仍然完全暴露和易受傷害的由內而外。



-------------------------------------
開發商:Layton Technology
原廠網址:http://www.laytontechnology.com/deviceshield-security-software-benefits.html
更新日期:2011/05/18
採購正式版、大量授權報價、技術支援、軟體諮詢、委託採購、詢問報價請來電 02-29299388 分機16 , 
來信service@orderble.com,或點我
------------------------------------------------------------------------------








DeviceShield™的優點綜述

USB驅動器已有效地取代了軟盤。 他們還採取了Zip驅動器,使
的CD - R的適度冗餘,保持清醒的IT經理在夜間異象公司數據漫步出了門。 隨著 DeviceShield你永遠不會失去任何睡眠對數據安全性。您可以完全控制每個端口,每個驅動器,每一個裝置在任何工作站上使用你的整個電腦網絡。

答案不是簡單地防止其使用,答案是落實 DeviceShield管理可移動媒體設備。

  • 端點安全 - 投資回報率

直到最近,它的安全性並沒有受到投資回報率分析,但這種看法正在迅速改變,因為世界各地的企業更加重視對這些解決方案發揮作用,在整體的安全策略。 企業關心的端點安全的一種手段保護自己不受威脅財產,隱私,生產力,甚至聲譽。 數據丟失的情況下進行的頭條新聞上幾乎每週的基礎上,不採取跨越式的想像要明白,這些威脅的成本不可忽視。 問題不再是“我們會被打到,襲擊”,而是“我們什麼時候會打,在什麼樣的代價?”

在主動投資的端點安全軟件,服務,設備和資源,可稱為權衡成本。 已知的成本,包括生產力的損失,因為停機時間,回收成本,因為需要清理的襲擊後,法律費用,因為沒有保護隱私和遵守法規要求,如HIPAA和Sarbanes - Oxley法案。

  • 提高安全性

除了USB安全DeviceShield也使IT管理來控制板上的WiFi,紅外和藍牙適配器。 這可以防止企業電腦連接到不安全的無線網絡和藍牙端口被停止犯罪分子侵入組織外部。 不像USB接口,其中總鎖定會影響生意生產力,無線數據端口是專門用於數據,因此,鎖定下來可以成為一種有效的安全措施。 雖然還有許多重點放在可移動媒體設備,不需要本地連接也構成危險,通過無線連接。

  • 設備的靈活性

DeviceShield可以管理特定的設備類型,可以被用在您的組織。 例如,你可能有一個規定,即某一特定品牌的USB記憶棒或某利用數碼相機都可以使用。 使用DeviceShield選擇性的控制什麼樣的設備,請或模型可以連接到你的網絡電腦,而阻止其他人。

  • 唯一的文件過濾技術

您不必再簡單地塊可移動媒體設備。 DeviceShield允許您控制如何使用設備。 您可以選擇允許特定的文件類型,可轉讓或從設備,比如你可以授權 *. doc文件,但不允許 *. exe文件。 這種靈活性使您可以選擇性地控制特定的文件類型,可在設備之間傳輸和網絡,同時限制其他人。

  • 您的數據加密 - 不要失去它!

DeviceShield包括自動加密技術,讓您有選擇地對文件進行加密時,他們被轉移到可移動媒體設備。 這個級別的保護讓您加入和平的心態,即使數據被複製到USB設備,如果設備被意外丟失或被盜,您的數據將被加密並鎖定方式的危害。

  • 提高生產力

通過控制哪些設備可以用在您的組織可以提高員工的有效性的資源。 僱員可以花時間下載音樂或圖片從數碼相機,不僅浪費時間和磁盤空間,但可能使你的組織意外轉移的病毒和木馬。

  • 打擊侵犯版權保護

由於沒有控制設備連接到您的網絡有一種內在的危險未經授權或非法的文件被儲存在你的網絡電腦。 使用DeviceShield控制哪些文件可以傳輸設備之間和防止侵犯著作權的盜版音樂的軟件。

  • 降低支持成本

允許不加控制的使用組織內的設備導致電腦變得不穩定和不兼容的設備類型和不正確的設備驅動,增加支持成本和PC機的停機時間。 使用DeviceShield管理和控制設備的類型根據您公司的政策。 沒有更多的不必要的文件傳輸或未經授權的設備類型。 你控制一個統一的標準操作環境。

  • 策略管理輕鬆

DeviceShield提出政策管理更加容易被極其簡單的管理,使授權的管理員創建,部署和報告的政策從中央用戶康壽。DeviceShield使光的工作環境和應用的政策。 使用遠程部署,無縫集成與 Active Directory,您可以創建安全策略為個人用戶,組,部門或整個公司。

  • 始終保安

即使用戶沒有連接到網絡,DeviceShield政策總是執行。 DeviceShield,目的是確保最高水平的安全為公司個人電腦,不管是在辦公室,家裡或現場客戶。 DeviceShield適用於一個一致的安全政策既當連接到企業網絡或脫機。

  • 審計報告和綜合治理的歷史

DeviceShield自動監視所有設備的連接,匯報重要信息,如設備類,用戶,個人電腦,連接時間和連接是否阻止或允許的。 審計跟踪文件的傳輸設備之間也被記錄下來。

DeviceShield賦予無與倫比的靈活性,而不會失去任何的好處與使用可移動媒體設備。 你可以“一勞永逸”。 只需安裝 DeviceShield,設置您的用戶政策,部署和放鬆的知識,每一台PC受到保護,您的公司數據坐穩。
















DeviceShield™ Summary of Benefits

USB drives have effectively replaced the floppy disk. They've also taken out the Zip drive, made
CD-R moderately redundant and kept IT managers awake at night with visions of company data strolling out the door. With DeviceShield you will never lose any sleep over data security. You have complete control over every port, every drive and every device used on any workstation in your entire PC network.

The answer is not to simply prevent their use; the answer is to implement DeviceShield to manage removable media devices.

  • Endpoint Security - Return on Investment

Until recently, IT security has not been subject to ROI analysis, but that view is rapidly changing as the corporate world places greater importance on the role these solutions play in their overall security policies. Enterprises care about endpoint security as a means of protecting themselves from threats to property, privacy, productivity and even reputation. With data loss cases making headlines on an almost weekly basis, it does not take a leap of imagination to understand that the cost of these threats cannot be ignored. The question is no longer, "Will we get hit by an attack" but "When will we be hit, and at what cost?"

An investment in proactive endpoint security software, services, devices, and resources can be weighed against known costs. Known costs include productivity loss because of downtime, recovery costs because of the required clean up after an attack, and legal costs because of the failure to protect privacy and comply with regulatory requirements such as HIPAA and Sarbanes-Oxley.

  • Increase Security

In addition to USB security DeviceShield also enables IT manages to control any on-board WiFi, Infrared and Bluetooth adapters. This prevents corporate PCs connecting to unsecured wireless networks and stops Bluetooth ports being hacked into by criminals outside the organization. Unlike USB ports, where total lockdown can hurt business productivity, wireless data ports are used exclusively for data and as such, locking them down can be an effective security measure. While much emphasis is put on removable media devices, unwanted local connections can also pose a danger through wireless connections.

  • Device Flexibility

DeviceShield allows you to manage specific device types that can be used within your organisation. For example, you may have a requirement that a particular brand of USB memory stick or a certain make of Digital Camera can be used. Use DeviceShield to selective control what kind of device, make or model can connect to your networked PCs, whilst blocking others.

  • Unique File Filtering Technology

You no longer have to simply block removable media devices. DeviceShield allows you to control how the device is used. You can choose to allow specific file types that can be transferred to or from the device, for example you can authorise *.doc files but prevent *.exe files. This flexibility allows you to selectively control specific file types that can be transferred between devices and your network whilst restricting others.

  • Encrypt Your Data - Don't lose it!

DeviceShield includes auto-encryption technology that allows you to selectively encrypt files when they are transferred onto removable media devices. This level of protection gives you the added peace of mind, that even if data is copied onto a USB device, should the device be accidentally lost or stolen, your data will be encrypted and locked out of harms way.

  • Increase Productivity

By controlling which devices can be used within your organisation you can increase the effectiveness of your staff's resources. Employee's can spend hours downloading music or pictures from digital cameras which not only wastes time and disk space but could expose your organisation to accidental transfer of Viruses and Trojans.

  • Protects Against Copyright Infringement

With no control over devices connecting to your network there is an inherent risk of unauthorised or illegal files being stored on your networked PCs. Use DeviceShield to control which files can be transferred between devices and protect against infringement of copyrights from pirated music of software.

  • Reduces Support Costs

Allowing uncontrolled use of devices within your organisation causes PCs to become unstable with incompatible device types and incorrect device drivers which increases support costs and PC downtime. Use DeviceShield to manage and control devices type according to your company policy. No more unwanted file transfers or unauthorised device types. You control a uniformed standard operating environment.

  • Policy Management Made Easy

DeviceShield makes policy management easy by being incredibly simple to manage, enabling authorized administrators to create, deploy and report on policies from a central user consol. DeviceShield makes light work of setting and applying policies. Using remote deployment that integrates seamlessly with Active Directory you can create security policies for individual users, groups, departments or the whole company.

  • Always on Security

Even if a users are not connected to the network, DeviceShield polices are always enforced. DeviceShield is designed to ensure the highest levels of security for company PCs, whether in the office, at home or on-site with customers. DeviceShield applies a consistent security policy both when connected to the corporate network or offline.

  • Comprehensive Management Reports & Audit History

DeviceShield automatically monitors all device connections, reporting back vital information such as device class, User, PC, time of connection and whether the connection was blocked or allowed. An audit trail of the file transferred between devices is also recorded.