Dear Readers,
Dragon symbolizes blessed and enormous power by your side.
Have you noticed that in last 10 years all the devices we use are seamlessly inter-operable with one another by an amazing invention which world knows as USB ports?
It is a mighty “Dragon” Port in true sense.
Power charging, digital signatures, WiFi dongles, keyboards / mouse, data portability, screen projection, camera, entertainment and so on, this is a silent dragon on our side, we love it. Every device we use is empowered by this dragon port.
Today’s challenges of competitive business requires this Dragon to be tamed and trained especially when you have signed NDA with your customers or you generate IP of designs / drawings / software code or you have business secrets in digital form.
If your dragon is blind and dumb, it harms more than it helps.
In enterprise environment you have to tame and train this dragon LIVING on your mobiles, tablets, laptops and desktops.
The new BLACKbox 3D does it seamlessly on your dragon ports by dividing them in three categories.
Category A : “Harmless” Dragons
BLACKbox tames these dragons to allow only harmless devices like keyboard, mouse, printer, plotter, etc. This will not allow any transfer, but will allow power charging. This will ensure no possibility of Data Theft through these dragon ports. 85 percent of your users will be riding these harmless dragons.
Category B : “Mean” Dragons
BLACKbox trains these dragons to allow digital signatures, dongles, pen drives, camera, mobile phones, tablets, tokens to function and restrict data flow direction to inward only. They are mean dragons taking in anything but giving out nothing. This will ensure no possibility of Data Theft through these dragon ports. 10 percent of your users will be riding these mean dragons for GST or statutory filings, inwarding data files from suppliers / customers or usage of internet dongles.
Category C : “Say it All” Dragons
BLACKbox trains these dragons to remember and report everything they have done. They will allow outward direction of data flow from your devices, but will report what was copied or taken out. 5 percent of your trusted users or top management users will be riding these dragons for submitting data to your vendors, customers, consultant, external backup or charter accountants.
Our team has shot this video to explain this concept. Pls check this video link and subscribe to our YouTube channel for more.
Best regards,
Vishal Shah
Founder and CEO,
Synersoft Technologies Pvt Ltd