ROYAL OAK – Securing your companies data for mobile users is paramount to operating a comprehensive information security program. The loss of sensitive data from laptops, removable media and smart phones is a growing concern among business owners.
As privacy laws and regulations come of age, auditors are asking the tougher questions and holding companies to tougher compliance standards. In response to this growing demand Check Point software technologies acquired Protect Data in November. Protect Data was founded in 1988 and is the industry leader in mobile data security.
Pointsec PC is the only endpoint data encryption solution certified to meet the security needs of the financial industry. Pointsec PC is BITS Financial Services security laboratory certified. Pointsec is also Common Criteria ISO-IEC 15408 EAL4 Certified. Pointsec PC Crypto Module is also certified under Federal Encryption processing Standard FIPS 140-2 Certificate No. 770.
Pointsec is a multi-platform solution supporting Windows, Linux, Palm OS and Smart Phones (Symbian, Windows CE/WM5). Pointsec can be integrated with your exiting authentication schema and supports two factor and single sign-on solutions.
Very simply Pointsec protects your data by encrypting the physical media of the device. Regardless of the platform PC, Mobile Laptop, Palm OS, Symbian OS, Windows Mobile5 Pointsec modifies the boot sectors and boot loader of a Windows PC and/or Mobile device. Since the encryption module takes place before the OS loads (Pre-boot) it is impossible to circumvent the encryption process.
The Pre-boot process requires user authentication before loading. Our best practices are to integrate this with the RSA SecurID SID800 Hardware Token. This provides true two factor authentication for both the Pre-boot process and Windows Authentication. Once the Pointsec encryption module is loaded (Pre-boot) all disk encryption is performed on the fly and is transparent to the host operating system.
Management of the Pointsec deployment is performed from the Pointsec Enterprise Workstation (EW) console. Encryption profiles can be stored to a central network file share and later downloaded to user PC?s, Laptops, Symbian Phones, Palm OS?s and Smartphones (Windows Mobile5). Smart Phone and Palm devices are updated via Activesync or intellisync or can be deployed using Open Mobile Alliance (OMA) or Over the Air (OTA) technologies.
This security policy (profile) also contains helpdesk password recovery keys. So just in case one of your users loses their RSA Token or key fob the helpdesk can unlock the encrypted disk through a series of challenge and response codes that were embedded during the initial disk encryption and pre-boot loader process. The network share also stores recovery points and policy install logs for all managed devices.
Once the Pointsec installation process begins the install must complete, the device can be shutdown and rebooted the installation process will proceed with the disk encryption in the background upon reboot. The Pointsec software can encrypt the disk at approximately 3GBytes per hour. Therefore a typical laptop with a 60GByte drive will take approximately 20 hours to encrypt. The Pointsec drivers are very smart and the process can be stopped and restarted after numerous system shutdowns and reboots without any data loss. The system also utilizes only unused CPU cycles and will automatically adjust itself.
Ongoing administration involves modifying the corporate profile via the Pointsec EW Console which can be invoked from any Pointsec PC on the network. Changes are saved to the network share and pull from all clients during their next synchronization interval.
Pointsec will help keep your organization out of the headlines. Pointsec full disk encryption will keep you from becoming tomorrow?s news. With Pointsec?s centralized management and tamper-proof endpoints, there are no special procedures. Users just login at startup. All the end-users data is protected automatically and transparently. Pointsec is easy to use and requires little administrator and end-user training. The total cost of ownership is very low while deployment is almost effortless.
For more information, telephone Intelligent Connections at (248) 837-1400. Or email to [email protected]
a>>




