Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

PGP Corporation has partnered with Lumension Security™ to deliver PGP® Endpoint

April 2008 by Marc Jacob

This new solution prevents data loss through unauthorized devices, connections, and applications. PGP Endpoint is a centrally managed solution that integrates Lumension Security’s Sanctuary Device and Application Control with PGP® Whole Disk Encryption to protect data transferred or stored on portable devices. With PGP Endpoint, administrators easily establish and continuously enforce encryption security policies for device usage via USB, FireWire, WiFi, DVD/CD, and Bluetooth connections, preventing potential data loss. PGP Endpoint joins an award-winning family of applications that are part of the PGP® Encryption Platform, enabling organizations to protect data throughout the enterprise while reducing the operational costs associated with point solutions.

PGP Endpoint is built on Lumension Security’s Sanctuary Device and Application suite to help enforce endpoint device use and encryption policies to prevent data theft and loss. With PGP Endpoint, administrators can establish and enforce policies for device usage via USB, FireWire, WiFi, and Bluetooth connections, preventing potential data leakage. Administrators can review device usage logs and establish policies to monitor the content of data transferred to and from the device. When PGP Endpoint is used with PGP Whole Disk Encryption, administrators can enforce granular policies based on encryption of removable storage. In 2007, both PGP Whole Disk Encryption and Lumension Security’s Sanctuary were named “Best Buy” by SC Magazine.

PGP Endpoint delivers the following key benefits:
• Prevents Data Loss - Eliminates unauthorized access to data on PCs, laptops, tablet PCs, PDAs, portable devices, removable storage drives and USB media
• Enforces Enterprise Encryption Policy – Enables administrators to require removable device encryption and automatically encrypt devices by policy by integrating with PGP Whole Disk Encryption
• Audit Trail of all Actions – Organizations can log and prove that endpoints, devices and media are protected in with enterprise permissions, policies, and encryption.


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts