Link data loss prevention at the endpoint with encryption at the device level.
Developed by our company, the TrustedDevice architecture stands as an innovative technology in the endpoint protection environment and it is designed to link endpoints' data loss prevention with encryption at the device level in an effort to increase the strength of our data security solutions.
The technology is designed to deal with the increased unintentional employee error leading to data loss and data breach. Every day, stories about lost laptops or mobile storage devices exposing healthcare records, social security numbers, financial, billing or account details of millions of people are seen in the news. Most of this data is in readable form because companies often overlook this aspect. The majority of companies still rely on employees to handle the data security instead of providing the means to ensure that the data in motion travels encrypted at all times.
The TrustedDevices technology is integrated with both Endpoint Protector and My Endpoint Protector, our Data Loss Prevention solutions and, EasyLock, an enterprise-grade portable device data encryption application. Thus, each organization implementing Endpoint Protector and the TrustedDevice technology can achieve better device control and policy enforcement for data at endpoints. It will easily ensure support for sensitive information dissemination inside and outside the company network.
TrustedDevices offer the best security approach for small businesses, multinationals and even government bodies that require mobility and need to safely allow sensitive data to cross their network boundaries.
Security for SMBs and enterprises with a focus on software-based encryption for data security. Any USB Flash Drive and most other portable storage devices can be turned into a TrustedDevice Level 1 with EasyLock Software.
Medium security level with biometric data protection or advanced software-based data encryption. It includes FileVault encrypted devices.
High-security level with strong hardware-based encryption that is mandatory for sensitive enterprise data protection for regulatory compliance such as SOX, HIPAA, GLBA, PIPED, Basel II, DPA, or PCI 95/46/EC.
Maximum security for military, government and even secret agencies use. Level 4 TrustedDevices include strong hardware-based encryption for data protection and they are independently certified (e.g. FIPS 140). These devices have successfully undergone rigorous testing for software and hardware.