Storage

06:36 AM
Connect Directly
RSS
E-Mail
50%
50%

SecureWave Rolls Out Tools

SecureWave Sanctuary 4.2 offers improved protection against data leakage and malware at the endpoint

LAS VEGAS -- SecureWave, a worldwide leader in endpoint security, today announced Sanctuary 4.2, the latest version of the company’s flagship endpoint security software and the only solution on the market to offer unified policy enforcement for centrally managing and monitoring device and application use on corporate PCs, laptops and servers. Sanctuary provides organizations with a single solution for defining and enforcing policies for acceptable use of removable storage media and applications, enabling administrators to proactively defend against data leakage, introduction and proliferation of malware and other threats. Sanctuary 4.2 boasts advanced custom reporting tools that streamline management reporting and reduce audit headaches, assuring compliance with evolving regulations that govern privacy and internal controls.

“Security threats today are more malicious and pervasive than ever before and many enterprises are simply missing the boat when it comes to arming themselves against these threats. A whitelist approach to locking out applications and devices, like that at the core of SecureWave Sanctuary 4.2, is the only way to ensure the safety and privacy of the data within an organization,” said Jon Oltsik, senior analyst at Enterprise Strategy Group. “With Sanctuary 4.2, administrators are armed not only with SecureWave’s proven tools for endpoint security, but advanced new custom reporting functionality that allows for compliance with internal corporate responsibility guidelines and evolving government regulations.”

SecureWave Sanctuary serves as the most effective first line of defense against advanced, customized attacks because its whitelisting approach prevents both known and unknown malware from executing on corporate endpoints. According to a recent Gartner report, “by the end of 2007, 75 percent of enterprises will be infected with undetected, financially motivated, targeted malware that evaded their traditional perimeter and host defenses.”[1]

SecureWave S.A.

Comment  | 
Print  | 
More Insights
Hot Topics
11
Fall IT Events: On The Road Again With 10 Top Picks
James M. Connolly, Editor in Chief, The Enterprise Cloud Site,  7/29/2014
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
Video
Slideshows
Twitter Feed