You are here

InfoWatch Endpoint Security

INFORMATION CONTROL AND
PROTECTION ON COMPUTERS
AND REMOVABLE DRIVES

InfoWatch EndPoint Security protects
your business from critical information loss
and performance degradation.

Download demo version

InfoWatch EndPoint Security features:

  • Critical information access control based on employee rights
  • Automatic monitoring of unwanted employee actions
  • Application launch control
  • Cloud storage information control
  • Data encryption on notebooks, removable drives and cloud storages

The solution concept is based on the innovative C.A.F.E. management principle with the following functionality:

Control

Defines which user is authorized to use which data paths. Only those employees who need sensitive data for their work have access to these data.

Audit

Logs provide evidence if users violate laws and regulations to ensure that they handle data with care – an important requirement to ensure IT compliance.

Filter

Separates critical data types from uncritical data types and blocks data types that are not wanted within the company.

Encryption

The C., A. and F. components ensure that only authorized employees have only access to data and applications which are relevant for their work. 100-percent all-round protection is provided by encrypting authorized data, since encryption also protects against intentional data theft or the negligent loss of data.

Management

The intelligent and central management ensures the easy installation and administration of functionality and a high degree of usability.

The intelligent and central management allows for the easy installation and administration of functionality. Protection is ensured with a high degree of transparency for the users, but mostly in the background to not interrupt users‘ workflows – an important factor to achieve users’ acceptance of the security concept. Business risks addressed by the product:

Data losses

Any company, independent of its size and industry, is exposed to data losses through intentional theft or the negligent handling of data and risks know-how losses, competitive disadvantages, penalties and also major image damages `in case of notifiable data losses.

Malware

Malware is malicious code that can be infiltrated into the company through a variety of data paths. Malware may destroy data (traditional viruses), but also transfer data elsewhere (Trojans) – again, this results in data losses. Often, malware is used for industrial espionage purposes. While most people think that antivirus software or a firewall is able to protect them against malware, this approach does not go far enough, since infected devices (mobile media, USB sticks, smartphones etc.) may also infiltrate malware into the company.

Liability

The Data Protection Act provides for high penalties in case certain kinds of data are lost – and no company can ignore the related risks. However, companies do not only face liability risks based on data protection regulations, but also through copyright infringements or incompliance with licensing regulations, if the corporate IT is used by their employees for private purposes.

Productivity losses

Employees who use corporate IT devices, for instance, to play PC games, edit their holiday pictures, download music or movie files or chat in social networks, do not only expose the company to liability risks, but also cause higher costs due to productivity losses, a factor that is often highly underestimated.