Protect against data leakage with our end point control solution
Connect Protect is an end point control solution that enables organisations to control the use of “plug and play” devices and prevent data leakage. Connect Protect end point control protects organisations, by preventing unauthorised access to, and use of, external removable devices and providing centrally managed audit trails for all connection events.
Connect Protect is an end point control solution that helps prevent data leakage by ensuring there is no unauthorised access to external removable devices.
It controls the use of all “plug and play” devices and other removable media, enabling an organisation to enforce a usage policy, preventing data leakage. It prevents unauthorised devices from connecting to the network; it can restrict usage to approved devices only. In addition, Connect Protect provides a full audit trail to track device usage and highlight denied and authorised connections.
Connect Protect features digital signing for approved devices allowing an organisation to strictly control what type, and how many, removable storage devices are in use inside the organisation. This also prevents data leakage by preventing authorised devices from being cloned.
Features / Benefits
|Removable media access is based upon a white list of vendor make/model, unique identifier or pre-approved digitally signed devices.||Straightforward and fast to deploy as only centrally issued, approved devices may be used. Enforces Information Assurance end point control policy|
|Integrates with Active Directory to permit end point control centralised management and the use of group policies.||Easy to manage – no additional training is required for the administrator.|
|Allows full auditing of device usage, including blocked attempts and passive monitoring and reporting of all device usage to prevent data leakage.||Usage easily tracked with full auditing reports.|
|Clear Copy. Allows the end point control monitoring of device usage with regards to file copying to and from an authorised device. File names and content copied to and from removable media can be viewed.||Copying histories are easy to track and trace for forensic investigations.|
|Integrated Auditing. Flexible auditing of device usage allows for fine grain control, giving varying levels of detail.||Administrators are able to choose level of detail required for each task or investigation|
|Integration of Becrypt Enterprise Manager gives a centralised audit capability from the same console for both Becrypt DISK Protect and Becrypt Connect Protect.||Centralised end point contol management of all Becrypt products saves time and makes compliance more efficient and effective.|
|Email Alerting. Emails the Administrator with an alert based upon a customisable device event such as a denied device.||Administrator is freed from the task of regularly manually checking on systems and devices used.|
|Challenge Response. Allows temporary access to devices to reset passwords.||Provides mechanism for resetting lost or forgotten passwords without exposing the original password to data leakage.|
How it works
Connect Protect works by using filter drivers to allow/deny access to devices. Depending on policy, any external device may be connected but not accessible unless the machine or user has permission to do so.
Connect Protect end point control also allows the signing of removable media, allowing an administrator to sign any removable media device, and prevent data leakage access to media that has not been signed. The product can also make use of Active Directory group polices, allowing simple and familiar management end point control management of the product and the policies across an organisation.
- FIPS 140-2 Level 1 – Connect Protect uses Becrypt’s Cryptographic Library which is FIPS 140-2 Level 1 certified.
- CESG Claims Test Mark – Connect Protect has been awarded a CCTM