Vericept Does 360
Vericept announced Vericept Desktop 360-degree, providing content visibility and control to enterprise desktops
DENVER -- Vericept Corporation today announced Vericept Desktop 360-degree, providing content visibility and control to enterprise desktops. With the recent proliferation of laptop theft, intellectual property theft and identity theft, now more than ever, organizations must have visibility and control into where critical documents and customer data resides at all times on their corporate network and must protect this data from being accessed, printed, copied or downloaded without proper authorization.
"With the increased popularity and convenience of utilizing USB drives and iPods(R) as storage devices in addition to laptops, it is no longer sufficient to simply protect data-in-motion over the network," said Dave Parkinson, President and CEO of Vericept. "It is equally critically important to protect stored data as evidenced by the large increase in insider breaches relating to mobile devices. The need for this technology has further been validated by the numerous requests we have received from customers and prospects alike. For this reason, we are proud to once again be first to market with an enterprise-class Desktop solution that fully integrates with Vericept Content 360-degree, and reaffirms both our technology and market leadership."
Part of the Vericept 360-degree Risk Management Platform, Vericept Desktop 360-degree brings 360-degree visibility and control capability to content residing on desktops, laptops and servers without impeding the flow of business. Vericept Desktop 360-degree provides continual content protection either while connected to the network or disconnected on the nomadic fringe and enables organizations to:
Discover where confidential documents reside
Lockdown content from information leakage
Control data loss on desktops, laptops and servers
Control use of removable drives and media such as an iPod(R), USB drive, CD, floppy and disk
Control access, downloading, printing, copying and moving of data by unauthorized users
Protect laptop content even when disconnected
"The content monitoring and filtering space is growing rapidly and as enterprises look to address compliance, defense of intellectual property and other forms of data leakage, it will be imperative to complement network based monitoring and control with a desktop client that can offer similar functionality," said Paul Proctor, Research Vice President for Gartner. "The need to define, project and enforce content protection policies comprehensively across an organization requires this type of architecture."
About the Author
You May Also Like
2024 InformationWeek US IT Salary Report
May 29, 20242022 State of ITOps and SecOps
Jun 21, 2022