четверг, 13 февраля 2020 г.

SAFEND PROTECTOR DOWNLOAD

Safend Protector's new extended security features and enhanced management and usibility capabilities: This technology allows for highly reliable classification of files by inspecting the file header contents rather than using file extensions, thus preventing users from easily bypassing the protection by renaming file extensions. Policy flexibility - separate policies can be defined for any domain, group, computer, or user; policies are easily associated with Active Directory or Novell organizational objects. File Name Logging Enables administrators to monitor not only what storage devices were in use, but also what files were copied to and from these devices. With this feature, Safend maintains and strengthens its highly granular policy management with the ability to set policies which are more general to OUs or Groups as well as policies which pinpoint the specific user or computer. With over built-in file extensions covering all popular applications categorized into 14 file categories, policy definition has never been easier. safend protector

Uploader: Yojora
Date Added: 25 July 2009
File Size: 47.78 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 5702
Price: Free* [*Free Regsitration Required]





Immediate Updates A new policy can be pushed to clients without having to wait for the GPO update interval to complete.

Safend Protector and Safend Auditor offer secure, easy-to-use endpoint solutions

U3 and Autorun Control — turns U3 USB drives into regular USB drives while attached to organization endpoints, and protects against dangerous auto-launch programs by blocking autorun. Data Awareness - inspects files for their type and controls the transfer of unauthorized file types to and from external storage devices Data Protection — protects corporate data in motion by encrypting data on external storage devices and tracking offline use.

In addition, agents are invisible to end-users until a non-approved device is connected, at which time a custom-defined notification appears. This feature provides an audit trail of the data transferred in and out of the organization, and is key to analyzing security incidents and tracking potential abuse of portable storage devices. Safend Protector Management Console All management tools are now combined into a single console, which can be installed and run from any computer on the network.

With built-in alerting capability, administrators can get immediate notifications of any activity that needs immediate response. Internal Ports This feature extends the reach of Safend Protector beyond external peripherals to include devices connected protecotr the internal computer ports.

B19 Data Solutions :: Safend Protector

Granular WiFi Network Control With WiFi ports now a standard in most enterprise PCs, it is critical to avoid malicious or accidental exposure of company assets through uncontrolled connections. Underlying Protection against Protocol and OS Exploits Safend Protector has built-in mechanisms that allow it to overcome and block potential exploits of buffer overflows and other OS and protocol deficiencies.

Administrators can now create security policies that do not restrict device usage, yet allow full visibility of the activity and content transferred to removable media. File Name Logging Enables administrators to monitor not only what storage devices were in use, but also what files were copied to and from these devices. Active-Directory Synchronization Logs and clients can be viewed from the native organizational units view, through the organizational tree.

The tree is continuously synchronized with Active Directory, to ensure it remains current at all times. Compatibility and Localization Features.

Safend Protector and Safend Auditor offer secure, easy-to-use endpoint solutions

Robust Endpoint Lrotector Leakage Prevention. The Protector agent operates at the kernel level, and includes redundant, multi-tiered anti-tampering features to guarantee permanent control over endpoints. The new policy becomes effective immediately on all connected clients. Safend Protector monitors real-time traffic and applies customized, highly-granular security policies over all physical, wireless and storage interfaces, including:.

Manually Add a Device Enables adding an approved device whose parameters model, distinct ID are known to your policy manually, without having to detect it with the Auditor first. Through a built-in and flexible management console, Safend Protector allows administrators to create comprehensive and safejd endpoint security policies.

Track Offline Usage of Encrypted Devices Safend Protector provides administrators with improved visibility on the usage of encrypted saffnd outside the organization.

This new feature ensures that users are only connecting to secure WiFi networks, as defined by security administrators. Hybrid Network Bridging Prevention With so many networking options available via endpoints, each endpoint in the organization can become an uncontrolled gateway into the corporate network, granting potential hackers access to confidential data.

This allows access to any safenf for the duration of the suspension, after which the original policy enforcement is resumed. Safend Protector enables administrators to enforce secure use of WiFi networks by controlling whether end users may use WiFi altogether, which networks they are allowed to connect to, and how.

What's New in Safend Protector? For storage devices, Safend Protector allows security administrators to either block all storage devices completely, permit read-only, encrypt all data on devices as well as monitoring, blocking and logging files that are downloaded to or read from these devices.

Safend Protector

Safend Protector's new extended security features and enhanced management and usibility capabilities: Safend Protector monitors real-time traffic and applies customized, highly-granular security policies over all physical, wireless and storage interfaces, including: Administrators can easily set the security policy to block both U3 and autorun as well as turn smart U3 USB drives into regular USB drives while attached to organization endpoints.

Safend Protector Advantages Granular control - detects and restricts protecgor transfers by device type, device model or unique serial number.

safend protector

Extensive logging and reporting capabilities Enables administrators to view and analyze logs collected from endpoints in the organization, both immediately and over time. The console provides unified management of policies, logs and clients.

safend protector

Tighter client management can be easily achieved by pushing policies and collecting logs at any time, with one click. Intuitive management - seamlessly integrates into Active Directory or other network management software. Tamper-proof - advanced policy enforcement via independent, kernel-level, real-time analysis of low-level port traffic.

Комментариев нет:

Отправить комментарий