Laptop Security
Continuing with our technology and security aspects related to laptops, you can figure out that most of the enterprises like you are upset with data theft and leakage through laptops.
Laptops can be company owned or BYOD basis. They are used outside of company's network and are exposed to security threats in public network, home network etc. There are 2 challenges to be taken seriously when you want to achieve Data Theft or Leakage Prevention on laptops.
Challenge 1: Segregation of Security Eligible Enterprise Data
Laptop encloses voluminous personal data in terms of entertainment, photos along with enterprise data. Your need is only to secure enterprise data from Theft and Leakage. Attempt to secure all the data irrespective, whether it is personal or enterprise, will severely affect laptop performance and user may object to it if security policies are applied on personal data.
Challenge 2: Mix-up of personal and enterprise data making it difficult only to apply security policies on laptops
Users may have a severe objection if their personal data is subjected to vigilance and control policies. It is not possible to apply policies selectively on personal and enterprise data as users tend to a mix-up on saving enterprise data with personal data and vice versa.
They do not have any prerequisite to stop it. Our technology, as explained in the previous slide separates enterprise data in data-tight (like air-tight or water-tight) manner, during the session of accessing enterprise data, it implements all data leakage and theft prevention policies on USB, emails and internet. This ensures that your staff can utilize enterprise data and the organization is not concerned about data loss, theft or leakage. Not only this but also, all limits are automatically removed when personal data is accessed. It works great when enterprise allows devices on a BYOD basis where employees are assured of free use of personal sessions without any tracking, monitoring or restricted use of enterprise sessions under all monitoring and organization policies.
In order to understand how BLACKbox prevents theft or leakage of data, let us first understand the situations which can cause data theft or competitive exploitation or NDA liability trigger.
BLACKbox intelligently solves this challenge in a full proof manner. Its technology is known as a duo, first separates laptop storage in personal and enterprise compartments. It separates these compartments in enormously data-tight (like air-tight or water-tight) manner. Once implemented, enterprise data can’t be accessed from the personal session and vice versa. Now, you can map only enterprise data with your cloud or data center.
Duo technology will not allow user to mix-up personal and enterprise data. It will make sure that only enterprise data is subjected to all security and control policies.
First situation is, Data Theft over USB from Laptop; A user can easily take away your designs, drawings, documents, cost sheets, business information, customer data etc by USB drive through laptop. It can be misused for competitive exploitation or you may be liable of an NDA breach. We are 100% sure that 99% enterprises are not equipped to plug such serious loophole. Think about your enterprise, are you among those 99% vulnerable enterprises?
Second Situation is, Data Leakage or Theft in email attachment or Blind Carbon Copy; Users can easily attach data and send out by emails from their laptop, mobile or desktop. Not only that but also, user can send Blind Carbon Copy to leak or steal data. This is how it works. A confidential report or tender bid, or design or accounts data is sent to senior management and BCC is sent to a competitor. Senior management would never realize that such a confidential data is also sent to competitor as BCC is not visible. We are 100% sure that 99% enterprises can’t stop data theft through their email system. Think about your enterprise, are you among those 99% vulnerable enterprises? and Three,
Data theft or leakage over Internet Ever enterprise has to provide internet to users as a resource to do their job. Specific jobs in sales, marketing, research, technical, procurement area, full access to Internet is essential. Enterprise understands necessity of unrestricted internet access to users, but is worried about data leakage or theft over internet from mobile, laptop and desktop. Firewalls cannot stop data theft over internet for the users whose internet is not restricted due to work requirement reasons. We are 100% sure that 99% of enterprises do not have any solution to prevent data theft over internet. Think about your enterprise, are you among those 99% vulnerable enterprises?