Device & Application Control
The most granular device control solution in the market allows companies to manage the correct use of devices regardless of the connection type. With Device Control you will comply with corporate policies, PCI-DSS audits and avoid sensitive information from being stolen.
The actual solutions for IT security are not enough to stop the daily threats to which we are exposed, since traditional tools are based on black lists or on behavioral analysis, an antivirus is as good as its last update.
Application Control is based on white lists and can deny the execution of any application not explicitly allowed to run on your corporate environment.
Device Control
1. Discover: Identify all removable devices connected to your endpoints in “audit mode.”
2. Define: Create rules at both default and machine specific levels for groups and individuals with regards to device access by class, group, model and/or specific ID.
3. Monitor: Continuously observe the effectiveness of device and data usage policies in real time and identify potential security threats.
4. Enforce: Implement “enforcement mode” of file copy limitations, file type filtering and forced encryption policies for data moved onto removable devices.
5. Manage: Use dashboard widgets and/or create reports on all device and data activity showing allowed and blocked events.
Application Control
1. Discover - Snapshot individual endpoints to identify and catalog all executables currently running on them and quickly determine potential application risk via the Endpoint Integrity Service.
2. Define - Create policies that automate how new applications are introduced and executed on endpoints using flexible, rules-based Trust Engine, ensuring that the whitelist is constantly updated to permit authorized applications to run.
3. Enforce - Block unknown and unauthorized applications from executing by default and prevent zero-day attacks automatically, before the latest anti-virus definitions or vulnerability patches are deployed. Reduce IT risk even further by extending whitelist policies to end users with Local Admin privileges.
4. Manage - Update whitelists using the Trust Engine to deploy software (and software updates). Generate reports to demonstrate compliance with security policies, and to conduct forensics as necessary