Know your gear
The presence of USB ports on laptops and PCs has driven the potential for serious data leakage occurring in your enterprise. These ports allow users to extract any data in an instant by connecting storage devices like USB flash drives, iPods or Bluetooth devices to company computers - making all enterprise computers vulnerable. The capability to copy sensitive enterprise data from corporate PCs onto these personal devices places your organization at risk of undetected data leaks, which you probably have no way of tracking even if you do detect them.
Pointsec Protector from Check Point addresses the internal threat from unauthorized copying of enterprise data to personal storage devices through a combination of port management, content filtering, centralized auditing and management of storage devices and optional media encryption. It plugs these potential leak points and provides a comprehensive audit-reporting capability of how data files move on and off these devices, giving enterprises complete control of their security policies.
This product is the Pointsec Protector Starter Kit including Pointsec Port Management and Media Encryption and SmartCenter for Pointsec.
Pointsec Protector from Check Point addresses the internal threat from unauthorized copying of enterprise data to personal storage devices through a combination of port management, content filtering, centralized auditing and management of storage devices and optional media encryption. It plugs these potential leak points and provides a comprehensive audit-reporting capability of how data files move on and off these devices, giving enterprises complete control of their security policies.
This product is the Pointsec Protector Starter Kit including Pointsec Port Management and Media Encryption and SmartCenter for Pointsec.