egosecure data protectionegosecure.com/files/egosecure_endpoint_en.pdf · path in the network, for...

8
www.egosecure.com ENJOY DATA PROTECTION FIRST DATA SECURITY SOLUTION WITH A COMPREHENSIVE APPROACH UNDERSTAND – PROTECT – PROVE EGOSECURE DATA PROTECTION

Upload: others

Post on 24-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EGOSECURE DATA PROTECTIONegosecure.com/files/egosecure_endpoint_en.pdf · path in the network, for example: Cloud, network communi-cations, mobile devices, Internet, CD / DVD, etc

www.egosecure.com ENJOY DATA PROTECTION

FIRST DATA SECURITY SOLUTION WITH A COMPREHENSIVE APPROACHUNDERSTAND – PROTECT – PROVE

EGOSECURE DATA PROTECTION

Page 2: EGOSECURE DATA PROTECTIONegosecure.com/files/egosecure_endpoint_en.pdf · path in the network, for example: Cloud, network communi-cations, mobile devices, Internet, CD / DVD, etc

EGOSECURE DATA PROTECTION

ENJOY DATA PROTECTION

DATA LOSSHOW GREAT IS THE THREAT?

3.1 MILLION €

LIABILITY RISKS AND COSTS OF WORKING TIME LOSS

Insufficient problem awareness plays a major role when using company-owned IT-equipment for personal purposes. So you cannot know e.g. whether a PC game played on a corporate computer is properly licensed. If films, programs or music are illegally downloaded with the help of corporate hardware, the company becomes the target of the investi-gation and must adhere to circumstances. The private use of corporate hardware leads to losses even without liability cases, because it often happens during working time.

Almost all the value of a company is now available in digital form - research and development data, patents, customer lists, etc. Much of the data is so sensitive that its loss can cause an enormous disturbance or even threaten the company’s exis-tence. To offset that risk there are many laws in place to protect your company’s data, such as the Federal Data Protection Act.

Data loss can be caused not only by active attacks of data thieves and spies from the outside, but also by so called “insid-ers”. The Federal Office for Information Security (German BSI) assumes in its „Guide to Information Security“ that most se-curity breaches are caused by insiders. Insiders can be employees, external service providers or even visitors who already have access beyond the company’s external data protection systems.

The idea that external service providers would attempt to steal your data doesn’t seem that absurd, but how about your employees? The BSI explicitly states that the intent to cause harm does not always take place when data is lost or stolen, often it can be a careless error by your own employ-ee; sometimes employees make mistakes, are excessively enthusiastic, and are curious. The graph below shows that the majority of data loss was caused by unconscious mis-conduct of employees.

The study “Ponemon Institute Releases 2014 Cost of Data Breach“ estimates that the average cost of the consequences of data loss at:

Page 3: EGOSECURE DATA PROTECTIONegosecure.com/files/egosecure_endpoint_en.pdf · path in the network, for example: Cloud, network communi-cations, mobile devices, Internet, CD / DVD, etc

EGOSECURE DATA PROTECTION

THE FIRST DATA SECURITY SOLUTION WITH A COMPREHENSIVE APPROACHUNDERSTAND – PROTECT – PROVE

To set up a comprehensive data security concept, one must UNDERSTAND it first. Whereas to UNDERSTAND, one has to answer questions.

This „question-answer game“ can be applied to each data path in the network, for example: Cloud, network communi-cations, mobile devices, Internet, CD / DVD, etc.

With EGOSECURE DATA PROTECTION we always begin with UNDERSTANDING.The Insight Module gives you the answers to the important questions for all data paths; as well as other important information that you will need before configuring your protective setting with our flexible module system.

It is clear for every IT-professional that uncontrolled use of USB-devices means data security problems for companies and organizations. To realize what scope of security measures one actually needs to overcome this problem, one has to answer a couple of questions first:

The reports delivered by the Insight Module, of course, do not violate the employees’ privacy rights, as they can be shown anonymously. An over-view of single user is presented according to the agreements of the Federal Data Protection Act, so that the works council and / or the Data Protection Of-ficer must go through additional security measures in order to gain access. This process has been proven to be successful in the EGOSECURE Audit Module for many years.

Will devices be used for personal purposes?

Do we know how much data is brought into the company and how much of it can pose a threat?

Are those only corporate devices orare there also private ones in use?

For all questions answe-red "Yes", do we know "How many", "How often" and "By whom"?

Do we know how many USB devices are in use and which devices they are?

Do we know how much data leaves the company and how much of it is sensitive?

Page 4: EGOSECURE DATA PROTECTIONegosecure.com/files/egosecure_endpoint_en.pdf · path in the network, for example: Cloud, network communi-cations, mobile devices, Internet, CD / DVD, etc

EGOSECURE DATA PROTECTION

EGOSECUREDATA PROTECTION

At first, EGOSECURE DATA PROTECTION determines transparent indi-vidual protection needs and puts it into the solution center. The protection functions are based on the C.A.F.E. Management principle and can be flexibly combined for all data paths. All functions are part of an integrated solution with system architecture, central management console, operating concept and database.

C.A.F.E.

C.A

.F.E.

PERCEIVED SECURITY IS NOT ENOUGH EFFECTIVE PROTECTION NEEDS FACTS

All necessary features can be licensed via the EGOSECURE DATA PROTECTION console in the required quantity accord-ing to the answers delivered by Insight. This will insure that your company is protected from the right threats, at the right times. However, the security concept of EGOSECURE DATA PROTECTION is not complete yet, because it is not only about perceived protection.

Insight also provides reports that make the effects of pro-tective measures visible and verifiableso that the protection level is based off of facts. Safety is therefore measurable and auditable, which is important not only for your company’s data security, but as well for compliance reasons.

EGOSECURE solution concept guarantees that all functions are considered during the installation process. Everything

accesses a database and can be controlled by a central-ized management console. Only actually needed func-tions are licensed - but if the protection requirements are changed, further functions can be activated without extra installation.

Page 5: EGOSECURE DATA PROTECTIONegosecure.com/files/egosecure_endpoint_en.pdf · path in the network, for example: Cloud, network communi-cations, mobile devices, Internet, CD / DVD, etc

EGOSECURE DATA PROTECTION

SAFE&SAVEMADE IN GERMANY

SAFERELIABLE SECURITY

In addition to a solution’s high reliability and security, eco-nomic factors also play a major role for purchasing deci-sions. When it comes to security solutions, the respective ROI is, however, often difficult to demonstrate.

EGOSECURE solutions are developed, based on the SAFE & SAVE concept. They provide comprehensive protection and ensure security levels required by international law and regulations, while also achieving a real ROI within less than one year.

Germany has the highest data security and pri-vacy standards, and so, it is not a surprise that international corporations are increasingly look-ing for IT security solutions by German vendors. EGOSECURE was founded in Germany; the vendor is expanding its business activities and is still headquartered in its original location. From the beginning, the solutions were developed, based on German quality standards, and were adjusted to address international requirements. EGOSECURE’s customer base includes many global corporations, with the largest installation comprising 165,000 clients.

The SAFE approach describes user organiza-tions‘ understanding of reliable security.

SECURE

There is no chance whatsoever to manipulate EGOSECURE DATA PROTECTION, since there are no backdoors for intel-ligence services, no vendor master keys and no reasons or possibilities for users to bypass the system.

ALL-IN-ONE There is only one server, one console, one agent and one database, which makes EGOSECURE a lightweight, fast and highly functional solution.

FLEXIBLE

The software adjusts to the respective business processes, rather than the other way round. It also integrates with ex-isting workflows and can be flexibly connected to third-party systems.

EFFICIENT

Minimized implementation costs and EGOSECURE GREEN-IT help companies achieve a return on their investment within less than one year.

Page 6: EGOSECURE DATA PROTECTIONegosecure.com/files/egosecure_endpoint_en.pdf · path in the network, for example: Cloud, network communi-cations, mobile devices, Internet, CD / DVD, etc

EGOSECURE DATA PROTECTION

SAVESUPERIOR VALUE FOR THE CUSTOMER

The high total costs involved often deter companies from implementing a new security solution. These costs may not only include pure licensing costs, but also costs for external consulting, training and related productivity losses.

EGOSECURE’s SAVE approach ensures minimized overall implementation costs through an intelligent installation concept and user interface. The intuitive administration

concept enables administrators to implement most con-figuration modifications with only few mouse clicks. And in case support is needed, this support is provided in English out of the German headquarters. EGOSECURE GREEN-IT, EGOSECURE’s integrated power management feature, helps companies achieve a much faster return on invest-ment (ROI), compared to other solutions.

SPENDINGS

Costs incurred by a data loss amount to an average of 3.1 million Euros.* EGOSECURE DATA PROTECTION has a focus on minimizied installation, administration and training costs, which reduces the overall spendings, compared to other solutions.

ADMINISTRATION

Time needed to install EGOSECURE DATA PROTECTION is about half a day; configuration can be done with few mouse clicks. The centralized management console is based on an intuitive user interface.

VISIBILITY

Most functions are performed in the background and do not interrupt users’ work. The agent provides transparent and clear information, and so, no user training is required.

ECONOMIZE

Depending on the hardware in use and regional electrici-ty rates, EGOSECURE GREEN-IT helps companies save between 50 and 100 Euros per computer per year. Thus, EGOSECURE DATA PROTECTION pays off within less than one year.

*2014 Annual Study: Cost of a Data Breach, Ponemon Institute

Page 7: EGOSECURE DATA PROTECTIONegosecure.com/files/egosecure_endpoint_en.pdf · path in the network, for example: Cloud, network communi-cations, mobile devices, Internet, CD / DVD, etc

EGOSECURE DATA PROTECTION

INSIGHT

INSIGHTThe module Insight provides reports with which the protection re-quirements and the necessary combination of protection modules can be determined exactly. In addition, it provides facts that make the effects of protective measures visible. Safety is therefore measurable and auditable. In principle, the reports can be anonymous and ac-cumulated, so no conclusions about single users are possible. More detailed reports are available, but only after the works council and/or Data Protection Officer authorize the access. See also: the Audit module, as this module already provides a good overview of what happens in the corporate network.

CONTROL

ACCESS CONTROLAccess control protects companies against “internal attackers” by controlling which persons within the company need access to which data.

APPLICATION CONTROLApplication Control controls which user is allowed to start which pro-grams. This prevents, for instance, that games or unlicensed software products are used to avoid liability risks and economic damage. It is also possible to block most viruses, even before antivirus solutions have detected them.

AUDIT

AUDITAudit ensures the transparency of all protection measures and allows you to capture forensic data. This optional auditability of EGOSE-CURE DATA PROTECTION is an important contribution to ensure IT compliance. As a matter of course, compliance with your employees’ personality rights and labor laws is also ensured (4-6-eye principle).

FILTER

CONTENT ANALYSIS & FILTERAnalyzing content and filtering secret information from data that leave the company as well as blocking unacceptable information within in-coming data are also components of an integrated, overall security concept. Content Analysis & Filter provides granular and reliable pro-tection for corporate data communications without affecting users‘ workflows and desired data transfers.

ANTIVIRUSAn antivirus solution provides proven protection against anonymous attackers from the Internet. It is important to ensure a high detection rate to be able to respond very quickly to new viruses and Trojans. EGOSECURE DATA PROTECTION provides an integrated antivirus solution which, according to many test reports, is the leading solution in the market and features an acknowledged high detection rate.

ENCRYPTION

MAIL ENCRYPTIONMail Encryption ensures the safe exchange of e-mails; no software needs to be installed for this purpose on the receiving or transmitting system. Encrypted e-mails with an electronic signature can be sent and read within the user‘s familiar environment. It is also easy to en-crypt and transport very large e-mails.

EGOSECURE MODULES

REMOVABLE DEVICE ENCRYPTIONMobile data media such as USB sticks get increasingly smaller and powerful; however, this also means that they can get lost or stolen much more easily. Removable Device Encryption ensures that the data cannot be used by unauthorized parties. Password-based encryp-tion and decryption can be done on any Windows computer, with full transparency for authorized users. Encryption is file-based and multi-ple kinds of encryption are available and can be used simultaneously on one medium.

FOLDER ENCRYPTIONFolder Encryption protects data on lost notebooks or hard drives and also individually defined sensitive data on systems that can be ac-cessed by several users. For instance, highly sensitive management data can be protected against access through employees with many privileges, such as IT staff.

FULL DISK ENCRYPTIONFull Disk Encryption provides comprehensive protection of all devices and encrypts the complete hard disk or partitions on the sector lev-el. The solution also provides on-demand pre-boot authentication to authenticate users before the operating system is started. Automatic detection of new hard disks in the integrated encryption chip, light-ning-fast initial encryption and the centralized management ensure the seamless integration with existing IT infrastructures.

CLOUD/NETWORK ENCRYPTIONCloud and Network Encryption can be used to encrypt folders in the cloud or on any network. Encryption keys remain within the company and are never stored in the cloud – a clear advantage over encryption solutions provided by cloud storage providers themselves.

ANDROID/IOS ENCRYPTIONThe encryption for iOS and Android devices offers file-based protec-tion on internal storages and memory cards and cloud accounts of mobile devices via app. Files are decrypted by entering a password.

MANAGEMENT

MOBILE DEVICE MANAGEMENTThe increasing degree of adoption of mobile devices such as tablets or smartphones must also be reflected in corporate security architec-tures. Mobile Device Management ensures the intelligent integration of mobile devices, including support of the Android and iOS operating systems.

GREEN-ITIntelligent power management ensures efficient device operations by only consuming energy when the computer is actually used. Green-IT helps reduce IT operational costs while also contributing to the com-pany’s environmental balance and ensuring a fast ROI for the EGOS-ECURE DATA PROTECTION implementation.

SECURE ERASESecure Erase ensures that deleted files cannot be restored, no matter if they are located on the internal hard disk or on an external storage medium. Users can choose among multiple deletion methods. They have the option to securely delete documents immediately or to de-stroy all deleted files irrevocably, based on a specific schedule. Secure Erase also ensures that you discard hardware only when you sell or withdraw respective hardware.

Page 8: EGOSECURE DATA PROTECTIONegosecure.com/files/egosecure_endpoint_en.pdf · path in the network, for example: Cloud, network communi-cations, mobile devices, Internet, CD / DVD, etc

Pforzheimer Str. 128 A76275 Ettlingen/Germany

Phone +49(0)7243.354.95-0Mail [email protected] www.egosecure.com

GÜTESIEGEL

SoftwareEgoSecure ENDPOINT

Stand 02/2014Version: 5.4

CUSTOMER STATEMENTS

FACTS

1,700 SATISFIED CUSTOMERS

MORE THAN 1.1 MILLION MANAGED CLIENTS

IN MORE THAN 40 COUNTRIES ALL OVER THE WORLD

“What we really like about EGOSECURE Endpoint is its integrated functionality within an overall concept. As opposed to key vendors’ offerings, where you buy multiple individual products, the EGOSECURE components are com-bined effectively; this means that only a minimum of resources is required to operate the solution – it simply works. For us it is also important to know that the product is developed and enhanced on an ongoing basis and that the new functionality is fully integrated with the existing solution.”

Jürgen Munk

IT Director GroupM, Düsseldorf

“You have a multitude of solution ap-proaches that address our most press-ing ‚hot‘ issues with compelling func-tionality such as the easy administration and a high degree of transparency for the user. The product philosophy is ex-actly what administrators desire. There-fore we will start to use your endpoint solution next year across our whole or-ganization.”

Peter Lange

State Reservoir Administration of

the Free State of Saxony

“As we had anticipated when we tried to set up a short-list of products, the highly complex system landscape was a challenge for vendors with respec-tive solutions. Due to its high degree of compatibility, EGOSECURE was the first solution to meet our demands.”

Klaus Thomas

City of Baden-Baden

“With EGOSECURE, we have found a professional security product that will protect our client landscape against unauthorized data transfers without disrupting our users‘ work.”

UniVersa Lebensversicherung a.G.

“Managing open ports and devices has become easier than ever with EGOSECURE. It’s never been easier to manage device permissions in a closed environment. Operating is intuitive and the support team is always ready to help – no matter how difficult the prob-lem is. We have been using EGOSE-CURE for 4 years and have never been disappointed, and we also look forward to further software enhancement.”

Timo Jöhnk

System Administrator, Federal Waterways and

Shipping Agency, Kiel

“EGOSECURE does not only provide comprehensive functionality, but has also worked closely with us in a way that exceeded normal support services by far.”

Michael Kraemer

State Office of Criminal Investigation

of the German federal state of Saarland

“The main reasons in favor of EGOSE-CURE Endpoint are integrated and easy performance of active directory syn-chronization, easy installation matrix (server environment and clients) as well as flexible and adaptable rights man-agement.Other advantages of EGOSECURE portfolio include extensive reporting and shadow copy functionality. The EGOSECURE team supported us during the “Proof of Concept” and helped if questions did arise.”

KNEIP Communication S.A. (“KNEIP”)