Storage

03:03 AM
Connect Directly
RSS
E-Mail
50%
50%

Marshal Launches Endpoint Security Tools

Marshal extends multi-layered security strategy to protect the endpoint

ATLANTA -- Secure email and Internet gateway security provider Marshal today announced Marshal EndPoint Security, a policy-based enforcement solution that allows only authorized removable media devices to connect to corporate desktops, thereby preventing data leakage and theft. Available on June 1, Marshal EndPoint Security is the result of Marshal's strategic partnership with endpoint security specialist, Centennial Software.

Marshal's launch of its endpoint security solution is the latest in a series of announcements that shows Marshal expanding on its strong software heritage. Last month, Marshal announced a security appliance (MailMarshal e10000), a service provider edition of its MailMarshal email management software (MailMarshal SPE) and its intention to offer a managed security service later this year.

Marshal EndPoint Security will enable organizations to monitor and control what information goes in and out of the company via their removable media devices. While USB storage devices are a business enabler, the fact that they can be used to take vast amounts of corporate data outside the security perimeter is a real business risk that needs to be addressed head-on. Marshal EndPoint Security allows companies to enforce policies and protect sensitive corporate information from data leakage and theft at the endpoint.

"Locking down and monitoring the devices at the outer edge of the network such as desktop clients, for example, to prevent sensitive data from leaving the company on a USB stick, is critical today for businesses of all sizes," said Jon Collins, service director at analyst house Freeform Dynamics. "Organizations should look to adopt strategies that consider perimeter-level content filtering solutions -- for example, at the Internet or the gateway -- in close association with mechanisms for endpoint security, such that risks associated with both user-generated and external content may be treated in the most appropriate manner, wherever they should manifest themselves in the corporate environment."

Marshal Inc.

Comment  | 
Print  | 
More Insights
Slideshows
Cartoon
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
Video
Twitter Feed