Laptop Security
Continuing with our technology and security aspects related to laptops, most enterprises like yours are upset with data theft and leakage through laptops.
Laptops can be company-owned or on a BYOD basis. They are used outside the company's network and exposed to security threats in public networks, home networks, etc. There are two challenges to be taken seriously when you want to achieve Data Theft or Leakage Prevention on laptops.
Laptop Security Challenges
Challenge 1: Segregation of Security Eligible Enterprise Data
Laptop encloses voluminous personal data in terms of entertainment, photos along with enterprise data. Your need is only to secure enterprise data from Theft and Leakage. Attempt to secure all the data irrespective, whether it is personal or enterprise, will severely affect laptop performance and user may object to it if security policies are applied on personal data.
Challenge 2: Mix-up of personal and enterprise data, making it difficult only to apply security policies on laptops
Users may have a severe objection if their data is subjected to vigilance and control policies. It is impossible to selectively apply policies on personal and enterprise data as users tend to a mix-up on saving enterprise data with personal data and vice versa.
They do not have any prerequisite to stop it. Our technology, as explained in the previous slide, separates enterprise data in a data-tight (like air-tight or water-tight) manner; during the session of accessing enterprise data, it implements all data leakage and theft prevention policies on USB, emails and the Internet. This ensures that your staff can utilize enterprise data and the organization is not concerned about data loss, theft or leakage. Not only this, but all limits are automatically removed when personal data is accessed. It works great when the enterprise allows devices on a BYOD basis where employees are assured of free use of personal sessions without tracking, monitoring, or restricting the use of enterprise sessions under all monitoring and organization policies.
To understand how BLACKbox prevents theft or leakage of data, let us first understand the situations that can cause data theft, competitive exploitation, or NDA liability trigger.
BLACKbox intelligently solves this challenge in a foolproof manner. Its technology is known as a duo, which first separates laptop storage into individual and enterprise compartments. It separates these compartments in an enormously data-tight (like air-tight or water-tight) manner. Once implemented, enterprise data can't be accessed from the personal session and vice versa. Now, you can map only enterprise data with your cloud or data center.
Duo technology will not allow users to mix up personal and enterprise data. It will ensure that only enterprise data is subjected to all security and control policies.
Situations
Situation 1 : Data Theft over USB from Laptop
A user can easily take away your designs, drawings, documents, cost sheets, business information, customer data etc, by USB drive through a laptop. It can be misused for competitive exploitation, or you may be liable for an NDA breach. We are 100% sure that 99% of enterprises need to be equipped to plug such serious loopholes. Think about your enterprise. Are you among those 99% vulnerable enterprises?
Situation 2 : Data Leakage or Theft in email attachments or Blind Carbon Copy
Users can easily attach data and send it out by email from their laptop, mobile or desktop. Not only that, but users can also send Blind Carbon Copy to leak or steal data." This is how it works. A confidential report, tender bid, design, or accounts data is sent to senior management, and BCC is sent to a competitor. Senior management would never realize that such confidential data is also sent to competitors as BCC is invisible. We are 100% sure that 99% of enterprises can't stop data theft through their email system. Think about your enterprise. Are you among those 99% vulnerable enterprises?
Situation 3 : Data theft or leakage over the Internet
Every enterprise has to provide the Internet to users as a resource for doing their job. Full access to the Internet is essential for specific jobs in sales, marketing, research, technical, and procurement areas. Enterprise understands the necessity of unrestricted Internet access to users but worries about data leakage or theft over the Internet from mobile, laptop and desktop. Firewalls cannot stop data theft over the Internet for users whose Internet is not restricted due to work requirement reasons. We are 100% sure that 99% of enterprises need a solution to prevent data theft over the Internet. Think about your enterprise. Are you among those 99% vulnerable enterprises?