INSIGHT & INTELLACT
Today data is an absolutely crucial asset for every organization. Data loss, due to theft or carelessness, can greatly harm an organization, perhaps even causing it to go out of business.
Unfortunately, this is a fact, and you have very probably already read about it in the marketing materials of our competitors. Other software providers no doubt advise you to protect yourself as comprehensively as possible against all risks, even if you don’t know whether these risks are relevant to your business. This doesn’t make any sense to us.
Don’t blindly protect yourself across the board. Instead, first UNDERSTAND your own data-security situation and then specifically PROTECT yourself against the risks that are genuinely relevant for your organization. CLICK HERE to download resources.
Insight
Insight collects facts about the data security of your network and displays them in graphs and very detailed tables, meeting the information requirements of both management and administrators. The module therefore provides a foundation so that protective measures do not have to be set up blindly. First, the facts are used to diagnose the requirements for the initial installation of protective measures, and from then on they are used to constantly monitor whether your company’s protection requirements change with time.
IntellAct
The new IntellAct module analyses the facts from Insight and automatically activates protective measures based on pre-defined rules. In addition, it can make comparisons with benchmarks, automatically detecting anomalies and critical situations so that an appropriate response is triggered to protect an organization’s data. This automatism greatly facilitates the work of administrators and minimizes reaction times considerably.
EGOSECURE FUNCTIONS
After analyzing the data flow and identifying the weak links with Insight & IntellAct, the protective measures can be configured individually with 20 protection functions. These protection functions are based on the C.A.F.E. MANAGEMENT PRINCIPLE.
All functions are integrated into one solution, access only one database and are controlled via a central management console. There is only one installation, after which the modules can be activated in accordance with the protection requirements. A subsequent adjustment of the protection needs requires no new installation.
Our solution is easy and fast to install without extensive work and costly consulting support. EgoSecure Data Protection consists predominantly of proprietary developments and therefore has a uniform installation, administration and operating concept.
All protection functions focus on making the use of EgoSecure Data Protection as easy as possible and yet safe. This is what we call “simply beautiful IT security”.
INTELLACT
Insight Analysis
IntellAct
TOOLS
Mobile Device Management
The increasing degree of adoption of mobile devices such as tablets and smartphones must also be reflected in corporate security architectures. Mobile Device Management ensures the intelligent integration of mobile devices, including support of the Android and iOS operating systems.
Password Manager (included in version 12)
Employees no longer have to write down their passwords and logins on Post-It’s or in word files – this task is now taken over by the secure Password Manager. Even when creating complex passwords, the password manager can support through an intelligent process. It is also possible to exchange logon information with colleagues by storing the protected Password Manager files in the network.
Inventory
With INVENTORY can be seen which hardware and software products are installed on the computers in the corporate network. However, the functions in INVENTORY that allow to see changes and to analyze those and also to be alerted if something changes, are much more important. The condition of the hardware can be displayed and reliably indicate any problems.
Secure Erase
Secure Erase ensures that deleted files cannot be restored, no matter if they are located on the internal hard disk or on an external storage medium. Users can choose among multiple deletion methods. They have the option to securely delete documents immediately or to destroy all deleted files irrevocably, based on a specific schedule. Secure Erase also ensures that you discard hardware only when you sell or withdraw respective hardware.
Green-IT
CONTROL
Device Management
Device management allows a clear definition of who can use which devices (e.g. USB sticks, CDs, TV tuner) or interfaces (e.g. WLAN, Firewire, USB) and to what extent. Thus, all of these devices can be used without causing abuse or risking the loss of data. It also prevents malware of getting into the corporate network via these interfaces. Device Management offers effective protection against “attackers from inside”.
Cloud Access Control
The use of the cloud has many advantages in terms of flexibility of labour, because data can be accessed anywhere. Particularly sensitive data, however, should not be saved in the cloud and some data types may not even be allowed by law to be saved. Especially in so-called third countries. Cloud Access Control checks which employee is allowed to use which cloud services to which extent.
Connection Access Control
AUDIT
Insight Audit
FILTER
Content Analysis & Filter
An integrated, overall security concept also has to provide options to analyse content, filter sensitive information that leaves the company and block damaged information within incoming data. Our Content Analysis & Filter provides granular and reliable protection of corporate data communications without affecting users‘ workflows and desired data transfers.
Application Control
Application Control allows configuration as to which user is allowed to start which programs. For instance, to prevent games or unlicensed software products being used. This way liability risks and economic damage can be avoided. It is also possible to block most viruses before antivirus solutions detect them.
Antivirus
An antivirus solution provides proven protection against anonymous attackers from the internet. It is important to ensure a high detection rate to be able to respond quickly to new viruses and trojans. EgoSecure Data Protection integrates a leading-edge solution with an acknowledged high detection rate.
Data Loss Prevention
DLP (Data Loss Prevention) scans text files which left or were copied to the computer for specific content. This ensures that information such as credit card numbers or other strictly confidential information is not transmitted to the outside world. When a confidential information is found, selected actions can be performed, such as logging or blocking the operation.
ENCRYPTION
Removable Device Encryption
Mobile media such as USB sticks are important means to support increasingly flexible business and working environments. While devices are shrinking in size and increasing in performance, they are also lost or stolen more easily. Removable Device Encryption ensures that the data cannot be used by unauthorized parties. Password-based encryption and decryption can be achieved on any Windows computer, with full transparency for authorized users. Encryption is file-based, and various encryption types are available (for the whole company, for individual users or for certain user groups). It is possible to use multiple encryption types for one medium.
Pre-Boot Authentication
PRE-BOOT AUTHENTICATION ensures that registration at Windows and related encryptions, such as the disk encryption, cannot be manipulated and circumvented by converting the hard drives, starting of USB/CD or the replacement of the operating system. The registration to the corresponding terminal will thereby take place immediately after the BIOS loading process, but before the start of the operating system. Besides passwords also many smart cards are supported as login security. Enterprise features such as help desk, self-initialization and more are also available. Login screens can be customized to each customer.
Cloud / Network Encryption
Cloud and Network Encryption can be used to encrypt folders in the cloud or on any network. Encryption keys remain within the company and are never stored in the cloud – a clear advantage over encryption solutions provided by cloud storage providers themselves.
Android / iOS Encryption
The encryption for iOS and Android devices offers file-based protection on internal storages,memory cards and cloud accounts of mobile devices via app. Files are decrypted by entering a password.
Full Disk Encryption
Laptops can be lost or stolen and chances are that there is sensitive corporate data on them. Full Disk Encryption makes sure that only authorized users have access to the device and data.
For better security smart-Cards and eToken can be used for 2-factor user authentication. EgoSecure FDE is certified to FIPS 140-2 Level 1 in software. Advanced Encryption Standard New Instructions (AES-NI) support in EgoSecure FDE improves the performance of encryption.
Folder Encryption
Folder Encryption protects data on lost notebooks or hard drives and also secures individually defined sensitive data on systems that can be accessed by multiple users. For instance, highly sensitive management data can be protected against access through employees with many privileges, such as IT staff.
Permanent Encryption (included in version 12)
Permanent Encryption encrypts files, no matter on which data carriers they are stored. These encrypted data packets also remain encrypted during the transfer to other data carriers. Thus, an encrypted file can be copied into an e-mail attachment or uploaded to a web-based cloud while being permanently encrypted. On external computers and mobile devices, the file can be opened by entering a password or by using a PKI token.
Mail Encryption
Mail Encryption ensures the safe exchange of e-mails. For this purpose, no software needs to be installed on the receiving or transmitting system. Encrypted e-mails with an electronic signature can be sent and read within the user’s familiar environment. It is also easy to encrypt and transport large e-mails.
More than 8,000 companies trust EgoSecure
CITY OF GARBSEN | KÜHN SECURITY, HILDESHEIM, | CRIMINAL INVESTIGATION OFFICE SAARLAND | HEAD OFFICE OF WATERWAYS AND MARINE , KIEL
Learn How EgoSecure can make your security even stronger
MANAGE AVIRA ANTIVIRUS
EGOSECURE EMAIL ENCRYPTION
Request for demo and find out more about EgoSecure
Become a customer or Partner and ensure your Data Protection
EGO SERVICES IN META REGION
We offer different ways to get to know our products and services.
Our intuitive management console reduces training requirements to a minimum. We support you when implementing EgoSecure Data Protection in the fields of planning and establishment in larger or distributed environments.
Consulting
Remote Assitant
Proof of Concept
C.A.F.E. Management – comprehensive security and efficient systems operations
The C.A.F.E. Management principle focuses on all devices and all data paths and solves the data security problems through the intelligent combination of the following functionalities:
CONTROL: Defines which user is authorized to use which data paths. Only those employees who need sensitive data for their work have access to these data.
AUDIT: Logs provide evidence if users violate laws and regulations to ensure that they handle data with care – an important requirement to ensure IT compliance.
FILTER: Separates critical data types from uncritical ones and blocks data types that are unwanted within the company.
ENCRYPT: The C., A. and F. components ensure that only authorized employees have access to data and applications which are relevant for their work. 100% all-round protection is provided by encrypting authorized data, since encryption also protects against intentional data theft or the negligent loss of data.
MANAGEMENT: The intelligent central management ensures the easy installation and administration of functionalities and a high degree of usability. This integrated and efficient security principle is complemented by antivirus software, mobile device management functionality, the integration of iOS and Android devices, secure cloud applications and power management.
EgoSecure in the Middle East, Turkey, and Africa Region Region!
Contact EgoSecure Dubai | META and request for DEMO
+971 4 369 9768
DOWNLOAD
Now you are only a few steps away from downloading the best data protection solution on the market, according to our customer survey.
Would you like to test our solution free of charge and without obligation as a potential new customer?
EgoSecure Corporate Data Protection Trial Version
In order to send you the latest trial version of EgoSecure Data Protection, we will need your name and your e-mail address.
EgoSecure Home Data Protection Trial Version
- EgoSecure Home Data Protection for 64 Bit versions of Windows (recommended): click here!
- EgoSecure Home Data Protection for 32 Bit versions of Windows: click here!
Step 2: Perform the installation after downloading.
Step 3: Activate your 30 days free of charge version with the following code: CF91C-946C0-F54FB-788AB-B71AB
Purchase an EgoSecure Home Data Protection license for 3 devices: Visit our online shop …
The full range of functions is available for all common Windows versions as of Windows 7 SP1.
Encryption apps for iOS and Android can be found in the respective app stores.