Vericept Does 360

Vericept announced Vericept Desktop 360-degree, providing content visibility and control to enterprise desktops

InformationWeek Staff, Contributor

August 2, 2006

2 Min Read
InformationWeek logo in a gray background | InformationWeek

DENVER -- Vericept Corporation today announced Vericept Desktop 360-degree, providing content visibility and control to enterprise desktops. With the recent proliferation of laptop theft, intellectual property theft and identity theft, now more than ever, organizations must have visibility and control into where critical documents and customer data resides at all times on their corporate network and must protect this data from being accessed, printed, copied or downloaded without proper authorization.

"With the increased popularity and convenience of utilizing USB drives and iPods(R) as storage devices in addition to laptops, it is no longer sufficient to simply protect data-in-motion over the network," said Dave Parkinson, President and CEO of Vericept. "It is equally critically important to protect stored data as evidenced by the large increase in insider breaches relating to mobile devices. The need for this technology has further been validated by the numerous requests we have received from customers and prospects alike. For this reason, we are proud to once again be first to market with an enterprise-class Desktop solution that fully integrates with Vericept Content 360-degree, and reaffirms both our technology and market leadership."

Part of the Vericept 360-degree Risk Management Platform, Vericept Desktop 360-degree brings 360-degree visibility and control capability to content residing on desktops, laptops and servers without impeding the flow of business. Vericept Desktop 360-degree provides continual content protection either while connected to the network or disconnected on the nomadic fringe and enables organizations to:

  • Discover where confidential documents reside

  • Lockdown content from information leakage

  • Control data loss on desktops, laptops and servers

  • Control use of removable drives and media such as an iPod(R), USB drive, CD, floppy and disk

  • Control access, downloading, printing, copying and moving of data by unauthorized users

  • Protect laptop content even when disconnected

"The content monitoring and filtering space is growing rapidly and as enterprises look to address compliance, defense of intellectual property and other forms of data leakage, it will be imperative to complement network based monitoring and control with a desktop client that can offer similar functionality," said Paul Proctor, Research Vice President for Gartner. "The need to define, project and enforce content protection policies comprehensively across an organization requires this type of architecture."

Vericept Corp.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights