DEVICE MANAGEMENT – Device management allows a clear definition of who can use which devices (e.g. USB sticks, CDs, TV tuner) or interfaces (e.g. WLAN, Firewire, USB) and to what extent. As a result all of these devices can be used without causing abuse or risking the loss of data. It also prevents malware of getting into the corporate network via these interfaces. Device Management offers effective protection against “attackers from inside”.
- Control the usage of removable devices and apply access rights to these devices for groups of users and computers
- Control all external devices including flash drives, communication devices, smartphones and tablets
- Control all types of interfaces – USB, Firewire etc.
- «Read only» mode for removable media
- Date and time restrictions
CLOUD ACCESS CONTROL – The use of the cloud has many advantages in terms of flexibility of labour, because data can be accessed anywhere. Particularly sensitive data, however, should not be saved in the cloud and some data types may not even be allowed by law to be saved, especially in so-called third countries. Cloud Access Control checks which employee is allowed to use which cloud services to which extent.
- Control the usage of most popular cloud storage
- Apply access rights to these storage for groups of users and computers
- «Read only» mode for Cloud storage
CONNECTION ACCESS CONTROL – Data transfers are nowadays, in addition to the official channels via the corporate network, possible through many means – Bluetooth, WiFi, modem, etc. However, a company should control via which routes data leave the company. Connection Access Control checks which employee has access to which data transmission devices.
EgoSecure even has a policy to block “Skype File Transfers” whilst still allowing users to use the VoIP features of Skype. The endpoint is the only place where such a policy can be enforced due to encrypted communication between Skype users which cannot be analyzed by any gateway solutions.