Data Protection Solution

  • End Point Security

The proliferation of consumer devices such as iPods, USB sticks, smartphones and other portable devices has increased the risk of data leakage and malicious activity on networks. While most companies have antivirus, firewalls, and email and web content Security to protect against external threats, few realize how easy it is for an employee to copy huge amounts of confidential and commercially-sensitive data onto an iPod or USB stick without anybody knowing. There is also a high risk of viruses, malware and illegal software being introduced on the network. A draconian way to prevent this from happening is to lock down all USB ports, but this is neither sustainable nor feasible.

Most data theft happens internally by employees manually transferring data onto removable storage devices. Using unauthorized removable storage devices can expose the network to a higher risk of malware infections. An Endpoint Security system enables you to comprehensively control access to portablestorage devices with minimal administrative effort.

  • Prevents data leakage/theft by controlling access to portable storage devices with minimal administrative effort
  • Prevents accidental data loss when removable storage devices get lost or stolen by the use of encryption
  • Assesses the data leakage risk posed by removable devices at endpoint level and provides information on how to mitigate it
  • Controls data transfers involving removable storage devices based on the real file type and contents
  • Prevents introduction of malware and unauthorized software on the network
  • Protects data on the move with removable volume encryption

Unfortunately, many businesses ignore or are unaware of the threat until something actually happens. According to research conducted by eMedia on behalf of GFI in the US, few medium-sized businesses consider portable storage devices to be a major threat while less than 20% had implemented software to address this risk. The key to managing portable device use is to install an endpoint security solution that gives administrators control over what devices are in use, have been used and by whom, as well as an in-depth knowledge of what data has been copied. It is also important to control sensitive data when it needs to be taken outside the company’s premises on a portable device.

An EndPoint Security software enables administrators to actively manage user access and log the activity of:

  • Media players, including iPods, Creative Zen and others
  • USB sticks, CompactFlash, memory cards, CDs, floppies and other portable storage devices
  • iPhone and BlackBerry handhelds, mobile phones, smartphones and similar communication devices
  • Network cards, laptops and other network connections.

GFI

Comguard is the sole distributor of GFI in Middle East, Levant Region & Pakistan. We at Comguard provides pre-sales supports as well as post-sales support including email support, tele-support, remote support and on-site support.

GFI Endpoint Security enables administrators to block devices by class, file extensions, physical port or device ID, allows administrators to grant temporary device or port access for a stipulated timeframe, can automatically download and install SQL Express if a database server is not available. It can also provide limited access to certain users for a limited time frame as per their requirement.

To know more about the product CLICK HERE

Nothing is more important to to you as a small business owner than your customers. You've worked hard to engage and secure their trust and confidence in you, and growing your business will depend in large part on maintaining their trust. In today's competitive marketplace, that's more difficult to do than ever. As hard as you've worked to earn your customers' trust, it can take just one negative experience to break it. Your ability to keep your customers' sensitive data secure is one of those make-it-or-break-it events. It may surprise you, but developing a data protection plan — and then openly communicating it and actively implementing it — is a key way to build customer trust. Being a payment card industry compliance and validation regulations apply to financial institutions, Internet vendors and retail merchants. The rules spell out what security measures must be taken to protect the private information of employers and employees during any transaction occurring with the use of a pay card. They also require certain auditing procedures. The Payment Card Industry Data Security Standard is used by all card brands to assure the security of the data gathered while an employee is making a transaction at a bank or participating vendor. 

Today, organizations are asking, how can I ensure my keys are protected throughout the key life-cycle? Can hardware security modules help my company meet compliance mandates? Should I consider an HSM if I need to accelerate my cryptographic operations? How can HSMs help secure my assets in the cloud? So Hardware Security Modules (HSMs) provide reliable protection for transactions, identities, and applications by securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services

  • Offload and accelerate cryptographic operations to a dedicated cryptographic processor that eliminates bottlenecks and maximizes application performance.
  • Centralize lifecycle management of cryptographic keys—from generation, distribution, rotation, storage, termination, and archival— in a purpose-built, highly secure appliance
  • Improve profitability and achieve compliance with solutions for paper-to-digital initiatives, PCI DSS, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, bulk key generation, data encryption, and more.
  • Proven reliability, highest throughput, and lowest latency makes network security devices the ideal solution for protecting data in motion, including time-sensitive voice and video streams.

Safenet

Hardware Security Modules (HSM)

SafeNet facilitates Hardware Security Modules (HSMs) that provides reliable protection for applications, transactions and information assets by securing cryptographic keys. SafeNet HSMs are the fastest, most secure, and easiest to integrate application security solution for enterprise and government organizations to achieve regulatory compliance, reduce the risk of legal liability, and improve profitability.

To know more about SafeNet HSM CLICK HERE

The password is a really old way to protect computer systems, yet many systems we use rely solely on them when authenticating users. A simple password might have been a good idea when we used only a handful of systems, but times are changing. You need to go deep through the technology to avoid misuse of your identity because once your password is hacked or cracked, the bad guy becomes a legitimate user.

Today we need accounts for all the social media we are on, the mail accounts, accounts for on-line shops, the bank, the workplace.  And here we are at the core problem with passwords. They should be complex enough to withstand brute force and dictionary attacks. Multi-factor authentication provides additional layer of security along with the passwords to validate a person’s identity. So multi-factor authentication is a new approach to overcome these challenges. Multi-factor authentication is an approach to authentication which requires the presentation of two or more of the three authentication factors: a knowledge factor ("something only the user knows"), a possession factor ("something only the user has"), and an inherence factor ("something only the user is"). After presentation, each factor must be validated by the other party for authentication to occur.

Provides a comprehensive strong authentication platform that allows organizations to effectively ensure secure employee access to the organizational VPN as well as other end points that enable remote access to a company’s sensitive online resources.

Offers organizations optimal flexibility with a wide range of form factors and authentication methods including softwarehardwaresmartcardsUSBOTP and OOB, etc which can be deployed side by side depending on employee usability requirements and organizational privileges.

Safenet

Multi-Factor Authentication

SafeNet provides authentication which serves a vital function within any organization -securing access to corporate networks, protecting the identities of users, and ensuring that a user is who he claims to be. Yet the recent surge in high-profile security breaches, as well as evolving business environments that require entirely new considerations for access control - like SaaS applications represents a shift in how trust and control is established and maintained.

To know more about Multi-Factor Authentication. CLICK HERE

Our Technology Partners