contents | software | |||||||
| Senforce Releases Endpoint Security Suite 3.2 Senforce Technologies is shipping its Endpoint Security Suite (ESS) version 3.2. Senforce is upgrading its current customers' endpoint security management solution with enhanced removable storage security that monitors and/or prevents intentional or inadvertent transmission of data to and from endpoints to removable storage devices. Through ESS 3.2, Senforce focuses on securing PCs, laptops and tablet PCs (endpoints) by providing a comprehensive, 360-degree view of endpoint security management. The suite gives IT and security administrators the ability to secure and control data in motion as it moves in and out of an organization, and delivers this through centralized management functionality to create, distribute and enforce security policies on endpoint devices. The addition of removable storage security to its existing best-in-class wireless security, advanced firewall, endpoint integrity, Location-Aware, data security and centralized management and reporting capabilities increases IT departments' control over users' endpoint devices, without compromising their productivity. ESS 3.2 enables IT administrators to enforce the security policies that are appropriate or allowed for each endpoint device. Senforce believes that no single security policy fits everyone, every threat profile, and every situation. ESS 3.2 builds upon the suite's key foundational feature, Location-Aware technology, which ensures that the appropriate security policy is automatically enforced; based on the location of the laptop, tablet PC or desktop PC. The addition of removable storage device security allows security administrators more granular control to determine what a user may connect to their laptop or PC and where they are allowed to do it, as well as controlling how much data may be transferred from or to their endpoint device. Security administrators can now choose to give users complete freedom over the attachment of external devices via USB, FireWire, Bluetooth, Infrared, and PCMCIA ports, or limit them to only having data transfer capability within the safe office environment. When employees are on the road, they may be limited to only reading external storage devices, or have no ability to connect anything at all, other than a mouse and keyboard. Stricter controls may be implemented, whereby users are restricted to attaching only those devices that have a specific serial number. write your comments about the article :: © 2006 Computing News :: home page |