Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

InterGuard DLP for the UK

Awareness Technologies : 27 March, 2009  (Company News)
Awareness Technologies appoints Security IP for the UK distribution of its data loss prevention products including stolen asset tracking
Security IP has been appointed by Awareness Technologies to handle the UK launch of InterGuard, an innovative suite of data loss prevention (DLP) countermeasures. While traditional security solutions protect companies from external threats such as viruses and hacking attempts via firewalls, DLP deals with threats that originate from inside the organisation. These threats can be caused by intentional malicious behaviour, or simply careless administration and weak management procedures.

InterGuard features a Single Agent desktop software architecture, which is deployed to all computers and laptops within the host organisation. As well as improving performance, this approach has freed InterGuard from the limitations of conventional network-based security solutions. Full functionality can be delivered throughout the organisation - even to travelling employees and subsidiaries that never connect to the network.

The InterGuard suite comprises three main products: Sonar monitors and controls all employer computer activity; Datalock protects confidential data, IP and trade secrets; and Laptop-Cop can track stolen assets and remotely retrieve important files.

Datalock screens all email, email attachments, removable media (such as USB and flash memory drives) in a "content aware" fashion, looking for types of data rather than proscribed documents. This has a significant advantage over traditional document "fingerprinting" methods, which depend on the compilation and availability of a list of an organisation's highly sensitive documents.

Because of the enormity of keeping such a listing up to date, this is something that most prudent organisations would prefer not to do as it can drain valuable human resources. Datalock instead looks inside of the data being accessed for specific types of data - consistent with data that is considered sensitive, such as account numbers and ID details. And because Datalock is a desktop agent, it scans the data immediately without having to make a call to a centralised server, and is thus much quicker than other data loss prevention tools, which rely on the network and a large bank of servers to handle the queries coming from all over the organisation.

This unique architectural approach allows Datalock (and the entire InterGuard suite) to be run in a SaaS environment if desired. InterGuard is the first DLP tool to provide this ability.

Sonar provides total visibility and total control over the computers in an organisation both on and off of the network. It allows organisations to enforce acceptable use policies via software application use controls and an industry-leading web filter. Additionally, it lets administrators monitor all employee computer activity. It works invisibly and undetectably at each desktop, without impacting central network computer resources.

All employee communications can be recorded - email, webmail and Instant Messaging - keystroke activity can be analysed and all data can be formatted into report form, making it easy to find and evaluate critical security lapses. The reports can also be used to study email behaviour by creating league tables highlighting sources of internal email traffic, and areas where productivity may be at risk. In conjunction with Datalock, it can also prevent the accidental miss direction of an email containing sensitive information to an address outside of the intended distribution.

WebWatcher, the retail version of Sonar, has the same capabilities as the Sonar product. The main difference between the two products is WebWatcher has a simplified user interface for domestic users, replacing Sonar's more advanced 'dashboard' facility which has been designed for use in business applications.

Laptop Cop is the revolutionary development which draws on the capability to track and control the operation of a computer at all times, even if it should be stolen or removed from its normal operational environment. Laptop Cop allows administrators to remotely, and invisibly, geo-track the stolen computer no matter where it goes (often with a higher degree of accuracy than GPS), retrieve and/or delete any files, and record and control everything that the thief does on the computer.

This multi-angled approach provides law enforcement agencies with the "actionable evidence" that they need to recover the asset. But perhaps more importantly, Laptop Cop allows you to access and protect the data on the computer, which in most cases is more valuable than the computer itself. Laptop Cop even allows administrators to communicate directly to the thief by remotely displaying messages on the stolen computer's screen.

According to a recent FBI crime study report; approximately 93% of all stolen laptops re-connect to the Internet. Since Laptop Cop relies on an Internet connection to receive the administrator's commands from the server, and to upload retrieved files, it is therefore very likely that the opportunity will arise to take action and recover the data, and possibly the laptop, which will have been rendered useless to the thief.

"InterGuard has two specific unique propositions that distinguish it from any other products on the market," explains SIP Director, Andi Robinson.

"The first is the ability to scan for data types rather than relying on document "fingerprinting". This makes InterGuard more intuitive and more secure because it does not require organisations to constantly update the list of documents that contain sensitive information. It will automatically detect an attempt to move sensitive data, even if administrators were unaware of its location.

"Because InterGuard uses a "distributed" approach, it can also be deployed on a Software-as-a-Service basis, eliminating the need for expensive server infrastructure inherent in traditional data loss prevention tools - giving it a clear financial advantage on return on investment."
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo