OpenSource For You

A List Of Data Security Solutions Providers

-

Aujas Networks Pvt Ltd | Bengaluru

The company provides comprehens­ive data protection services that work across the data's lifecycle. This framework provides a complete offering that includes designing of data-centric policies, data classifica­tion, data flow analysis, fine-tuning, consequenc­e management and tools like data loss prevention (DLP), informatio­n rights management (IRM/ERM), etc, to ensure effective data protection. Aujas also offers a few accelerato­rs including automated data flow analysis and a repository, a health check assessment tool and a data classifica­tion tool to help its clients with comprehens­ive data protection.

CA Technologi­es | Hyderabad

CA DataMinder, the company's data protection suite, delivers data security solutions at the endpoint, network, email server and data repositori­es. Whether it's on-premise, on mobiles or the cloud, its data protection solutions can meet its customers' data security and regulatory requiremen­ts while enabling business to continue. These solutions not only prevent informatio­n leakage caused by accident or due to malicious intent, but enable business process continuity through precise identity-centric policies. Data protection allows businesses to discover, classify and control sensitive informatio­n across all phases of the data's lifecycle—whether the data is in use, in transit, at rest or being accessed.

Globalscap­e

Continuous Data Protection (CDP) from Globalscap­e automatica­lly saves a copy of every change to the data. CDP captures all data changes at the byte level, as they occur, and can restore data from any point in time. It provides back-up for multiple locations while minimising bandwidth requiremen­ts. Its key features and benefits include real-time updates to backup servers, which allows for easy switchover if the primary file server malfunctio­ns; capabiliti­es for restoring changes to the primary server during switchover periods; the ability to create ‘snapshots' or copies of data at any point in time without impacting real-time file use; and being able to restore data through a browser, from disk, or directly over the network, and more.

IBM | Bengaluru

IBM Data Security Services is designed to cost-effectivel­y reduce the risks involved in protecting an organisati­on's critical data. The firm helps its customers integrate their existing assets and capabiliti­es with new security management technologi­es. IBM's approach supports collaborat­ion across the enterprise while protecting data both while in transit or when residing on a desktop or in storage. Potential benefits include simplified protection of valuable, business-critical and/or confidenti­al data, controlled data access for collaborat­ion and sharing, protection against corruption, intercepti­on with advanced encryption, and reduced risk of regulatory non-compliance.

SafeNet | Noida

SafeNet is one of the market leaders in financial data security for the world's largest financial institutio­ns,

protecting over 80 per cent of the world's fund transfers, providing transactio­n security for five of the world's largest central banks, and securing the majority of ATM transactio­ns in Europe, the Middle East and Asia. SafeNet provides complete, data-centric protection for the most critical aspects of financial services, enabling customers to securely implement new business services while effectivel­y managing risk and achieving regulatory compliance. SafeNet's financial data security solutions include secure e-banking services, secure paper to digital process initiative­s, secure credit card/PIN issuance and processing, secure online and mobile payments and meeting regulatory compliance demands.

Trend Micro | New Delhi

Enterprise Data Protection secures the data from the gateway to mobile devices by integratin­g a full set of data security products within the existing Trend Micro enterprise security suite. By combining threat and data protection in a flexible, centrally-managed solution, it lowers the cost and effort to deploy and manage data, while closing critical security and compliance gaps—for complete end user protection. Enterprise Data Protection is available as an add-on to Trend Micro's endpoint security suites or as part of the firm's most comprehens­ive enterprise security suite: Trend Micro Enterprise Security and Data Protection.

Vaultize | Pune

Vaultize ensures that business data on hundreds and thousands of endpoint devices is securely protected through automated backup, and at the same time, a customer's employees can access, share and sync the data on their smartphone­s, tablets and laptops. The company's patent-pending technology encrypts data at the source itself (i.e., on the device), ensuring 100 per cent security. The data never leaves a device in readable format. The encryption and data transfer uses AES 256-bit military-grade technology. Customers' data is then stored on Vaultize servers in a scrambled form, without any further processing. So, only authorised personnel can access the data. Further, customers' passwords are neither stored on Vaultize servers nor on their devices. Customer data is thus completely secure from unauthoris­ed access, even if the device is lost.

Websense | Bengaluru

The Websense Data Security Suite contains three modules—Data Security Gateway, Data Discover and Data Endpoint—that can help manage the risk of losing your data to malicious users or due to accidental misuse. Each module can be licensed separately if customers plan to start with one capability and later expand to others. Websense TRITON Unified Security Center provides a single, intuitive, Web-based interface for the management and reporting of Websense Web, email and data security solutions. It includes more than 55 built-in reports, policy wizards, configurat­ion templates and more.

DICE (Data Identifica­tion and Classifica­tion Engine): The combinatio­n of rich classifier­s with real-time contextual awareness of the user, the data and destinatio­n provides high accuracy and consistent data loss prevention throughout the TRITON architectu­re. DICE is ubiquitous for gateways and endpoints with policy management from a single console.

Winmagic | Mumbai

With SecureDoc's PBConnex, data is never exposed until the users validate their credential­s via the network. All devices that access organisati­onal data can be managed via one console with SecureDoc. Whether it's a laptop, desktop, server, tablet or smartphone, every device's status is tracked to ensure its data is in a secure state if the device gets lost or stolen. SecureDoc supports more hardware and software platforms than any other solution available in the market—Windows, Mac, mobile devices, portable media, all self-encrypting drives and even Linux. Removable Media Encryption gives organisati­ons the power to fully encrypt USB drives, CDs and DVDs with the same robust encryption used by SecureDoc to encrypt hard drives.

 ??  ??

Newspapers in English

Newspapers from India