 |
|
DAP Laptop Protector
DAP Laptop Protector is designed for customers concerned about accidental information leakage when laptops are lost or stolen. This solution provides an easy way for users to protect data on laptops, or to enforce that all sensitive corporate data on a laptop is protected.
DAP Laptop Protector protects data on your laptops in 5 key ways:
- 1: Encryption - Ensure critical files on your laptop are encrypted.
DAP Laptop Protector provides a very simple way to encrypt and protect any file. The encryption is performed using an industry standard, strong symmetric encryption algorithm. The files can be protected centrally, ensuring that they remain encrypted wherever they go. Users operating on the road can easily create new Digital Assets. Decryption requires authentication of both user and machine, which protects data from the outside world, notably in the event of a lost or stolen laptop.
- 2: Data Self-Destruct - Set self destruct timeouts (time-bombs) on sensitive files.
To provide an extra level of protection, the DAP Laptop Protector can automatically destroy sensitive data after a set time-out period. The destruction of data is performed to the US Department of Defense standards. Laptops can be permitted a set number of reboots or a set number of days before connecting back to the network, otherwise the data will be destroyed.
- 3: Centralized Tracking - Know exactly what confidential files are on a laptop.
Corporate data stored as shared Digital Assets is tracked from a central location. This provides evidence of exactly what data is on any laptop at any time. This is immensely valuable in the process of dealing with a stolen or lost laptop. Understanding what data has become vulnerable, and being able to prove that certain data wasn't released allows a quick and complete response to a potential data breach.
- 4: Log Actions - Have an auditable log proving that data was encrypted.
Any folder structure of corporate data can be converted to Digital Assets. By doing so, not only do you ensure that all copies of the data are encrypted anywhere they are used, you also gain the ability to log actions on that data. See who opened, edited, printed, cut & paste, and print screened the data. These logs can help you to develop security policies around your data by allowing you to audit what is happening to your data.
- 5: Secure Central Repository - Have an auditable log proving that data was encrypted.
Digital Assets can either be private for a particular user, or shared among groups of users. In either case, a master copy of all Digital Assets is automatically stored securely in a central repository. This ensures that work done on Digital Assets can be recovered without having to force a user to backup manually.
|
Pricing.
Price: $150 per seat per annum
Installation: $5,000 per server (one time only)
Consulting: $1,000 per day
Licenses are sold in packs of 50, which includes a central server for logging, tracking all digital assets and encryption key distribution.
|
DAP Information Barrier for Groups
Sensitive data is vulnerable to internal leakage. Confidential information such as mergers and acquisition, salary figures, company restructuring plans and financial results need to be worked on with the guarantee that the information is not misused or viewed by those in the company that should not be viewing it.
DAP Information Barrier provides a protected circle of information exchange for a selected group of users or groups such as a Board of Directors, HR, finance, upper management and IT staff.
When trying to contain information to a select subset of users, access control is only the start. However, the IT department is often the exception to this rule. IT departments with administration rights to a server have unrestricted access to all the data on that server. The extreme risk is due to high turnover and randomly rotating responsibilities such as, hardware maintenance, backup, network storage, email systems, and other tasks that require access to data.
Using DAP Information Barrier, confidential data is converted to a 'Digital Asset' which is encrypted, tracked and controlled. This Digital Asset can then be shared and worked on only by the authorized users.
- The Digital Asset Server contains the files in encrypted form with obfuscated names, so IT can backup files and perform hardware maintenance without any knowledge of what the files are or their content.
- Any Digital Assets that reside on an executive's computer, are only visible to an Authorized user, so an IT employee logged on to that computer for maintenance reasons cannot see the protected Digital Asset.
|
All products built on DAP technology have separate IT and Data Owner interfaces. A Data Owner can authorize users and set data access control via their own control panel without IT involvement. This further isolates the data ownership to the real owners.
Pricing.
Price: $150 per seat per annum
Installation: $5,000 per server (one time only)
Consulting: $1,000 per day
Licenses are sold in packs of 50, which includes a central server for logging, tracking all digital assets and encryption key distribution.
|
DAP Remote Lockdown Data Protection
DAP Remote Lockdown ensures the security of your data by placing a data security wall around any Citrix or Terminal Services remote session. Attempt to extract data will be blocked. All attempts to leak data are logged, providing an evidentiary trail against any person or external organization attempting to extract information.
Allowing outsourcers, contractors, or employees to remotely connect to a server or application creates a security risk since data is exposed through these remote sessions. DAP Remote Lockdown is configured to protect connections to Citrix or MTS and protect the session on both ends.
- User End: Blocks copy/paste, print screens, printing, and saving files locally, ensuring the data stays only internal to the host company.
- Server End: The connection is negotiated via DAP ensuring only authorized clients are granted access and can perform functions on the secure data.
|
Pricing.
Price: $85 per seat per annum
Installation: $5,000 per server (one time only)
Consulting: $1,000 per day
Licenses are sold in packs of 50, which includes a central server for logging, tracking all digital assets and encryption key distribution.
|
|
|