|HOME | ABOUT | PRODUCTS | SERVICES | EVENTS | NEWS||Alizian News and Views|
Tel: 0870 77 77 981
With the invasion of personally-owned portable storage devices into the workplace, DeviceWall minimizes the threat of data leakage by enabling the organization to create a white list of ‘approved’ devices assigned to specified groups and individual users.
By default, DeviceWall can be configured to automatically block any device not explicitly permitted in the security policy.
DeviceWall stops the unauthorized use of all common portable storage and wireless devices, including:
Data Security - Security Beyond the Endpoint
For those staff where there is a legitimate need to carry sensitive information on portable media such as USB sticks, the risk remains that the device may be lost, stolen or compromised in some other way.
To prevent sensitive data ending up in the wrong hands, DeviceWall can automatically encrypt all data legitimately copied to USB flash drives using a choice of AES or Blowfish 256-bit encryption algorithms.
Data on a DeviceWall-encrypted device can only be read on a PC using the company's DeviceWall key (and, if selected, the user's personal key).
With fast local and wireless communications ports now standard on all PCs, it's not just USB-connected devices that pose a security risk to the organization. Uncontrolled Wi-Fi ports, plug and play modems and even locally-connected printers can all increase the chances of data leakage from the corporate network.
To prevent users accidentally or maliciously putting the organization's data at risk, DeviceWall's Policy Customizer allows administrators to centrally manage the presence of a wide range of internal and external devices