It provides companies with a complete toolkit for securing their data and the resources they need to keep their human assets from turning into liabilities. The software includes the new Safetica Endpoint Data Loss Prevention suite, user activity monitoring, and additional features such as disk and file encryption, IT policy settings, access management, application control/whitelisting, printer control, and web filtering with all features overseen by the Safetica Management Console.
Studies on data breaches show that the majority of insider data leaks – either accidental or malicious – go out through the endpoint computer. And, analysis of breaches by the CERT Institute at the American Carnegie Mellon University in the United States showed that there were often detectable signs of unsafe behavior beforehand a malicious data breach.
The new suite brings with it three major technical innovations:
- Zones - The Zones concept allows companies to mirror their actual working environment into Safetica data security policies. Companies can easily establish the locations, storage areas and assets for safe data processing according to their own needs.
- Policies – Once established, IT policies and rules for specific data categories and groups can be rolled out across the company, enabling faster and more accurate implementation.
- Three mode deployment – Separate deployment modes – testing, informative, and restrictive – allow companies to progressively implement data protection policies and educate employees on safer data handling processes.
The launch of the suite comes as the numbers and expenses of data breaches are soaring. Companies are also being squeezed between their needs to protect their own confidential data and the legal requirements in the European Union and the United States to secure the private data of customers and employees.
Safetica 5 gives companies with between 100 – 500 computers a new option when it comes to data security.
“We took a two pronged approach to our development of the new Safetica,” says Pavel Kratky, CTO of Safetica Technologies. “First, we wanted to give companies extensive coverage of all their potential data leak channels and give them a look at the behavior preceding a data breach. Secondly, we worked hard to make the process of using Safetica an easier and more instinctive experience. The best protection is worthless unless fully installed and operational.”