infoTECH Feature

July 23, 2012

DeviceLock Focuses on Endpoint Data Protection

If a disgruntled employee who was about to be fired wanted to make off with sensitive data from your network, would he be able to do so easily? If his initial efforts were blocked, could you be sure that he would not have the resourcefulness to come up with a workaround, using a USB drive or even an good old-fashioned printer? Well, with endpoint data protection solutions from DeviceLock, you can be protected from even the most creative of potential thieves.

Because of its comprehensive solutions, DeviceLock has had a very successful year, growing by nearly 300 percent year-over-year. Much of this growth can be attributed to the rising popularity of the “bring your own device” trend that is sweeping workplaces across the country and creating all new headaches for IT departments. Since companies are focused on the migration of applications out of data centers and into the cloud, there is an even greater need for security that is focused on endpoint data protection. While other security companies focus on gateway security approaches, they cannot necessarily protect against disgruntled employees who wish to steal precious data.

In light of the BYOD trend, legacy security companies are focused on solutions that involve encryption, remote wipes, etc. But, according to Vincent Schiavo, CEO of DeviceLock, true data leak protection must be content and context aware. Solutions must be able to block or allow data transfers based on time, day and identity of the person accessing the data. The solution must look at the content and make a decision based on the particular file. DeviceLock’s products work with active directories, looking like they are a part of Windows, so any administrator would know how to use them.

The solutions operate seamlessly with Windows and are massively scalable, therefore perfect for enterprises, but also affordable for small and medium businesses. The company operates on a freemium model and boasts over 66,000 customers over 4,000,000 computers. And all of these are protected from even the most creative thieves, they won’t be able to copy, email, or even print the documents that are protected. Your devices will truly be locked, giving peace of mind to any company wanting to ride the BYOD train.

Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO West 2012, taking place Oct. 2-5, in Austin, TX. ITEXPO (News - Alert) offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations. It's also where service providers learn how to profitably roll out the services their subscribers are clamoring for – and where resellers can learn about new growth opportunities. For more information on registering for ITEXPO click here.

Stay in touch with everything happening at ITEXPO. Follow us on Twitter.




Edited by Rachel Ramsey
FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter

infoTECH Whitepapers