Answering the Challenges facing today’s CISO

“Security and risk management leaders focused on endpoint and mobile security must choose products and technologies that blend information-centric protections into a ‘defense in depth’.”

“By 2020, more than 60% of organisations will invest in multiple data security tools,
up from approximately 35% in 2017.”

Source: Gartner

ENDPOINT

Secret Net Studio for DATA

Information Centric Endpoint
protection platform

Secret Net Studio Trusted
Environment

Pre-OS integrity control

Our holistic approach to endpoint
security is the answer

data_text

The Secret Net Studio Trusted Environment component is installed beneath the operating system. It operates with reserved CPU core which is separated from the OS using Intel virtualisation technology. Trusted Environment has full access to OS kernel memory so it prevents any potentially malicious OS-level events.

To find out more please contact us

Benefits of the solution include:

  • Classification-based data security
  • Users are involved in IT security culture
  • Controlled information output from the system

KEY FEATURES

Centralised deployment and management

  • Centralized deployment, update, and maintenance.
  • Single point of administration and management.
  • Delegated hierarchical policies
  • Convenient grouping of protected objects.
  • Federated reporting and responding.

Context-aware Access control

Data access is based not only on user rights, but is further governed by resource confidentiality (files, directories, devices, printers, network interfaces, etc.)
Printout and other exposure of classified information is brought under control.

Monitoring and investigation

Advanced event logging helps you generate practical reports and drill down into essential details to investigate security incidents and determine attack vectors.
Secret Net Studio for DATA also keeps copies of all files/documents sent to printers or external devices which facilitates investigation of potential information leaks.

Device
control

Secret Net Studio for DATA checks hardware integrity settings when external devices are connected or disconnected, as well as during the operation. A wide range of devices, including webcams, mobile phones, 3G modems, network cards, flash drives, and Printers are supported. You can also use different response scenarios, depending on what action is requested of specific devices.

Security event
Management

  • Centralised management of all security-related events.
  • Group-based hierarchical alerting and reporting.
  • Policy-based event acknowledgement and response actions.

Firewall

Monitoring network protocols and filtering suspicious packages against predefined rules on the level of applications, users or user groups. Signing network traffic for MiTM attacks protection.

Encrypted
Containers

You can create encrypted data containers on your disk or removable media. Encrypted containers appear as virtual units, while encryption keys can be stored safely on external devices.

Enhanced
Login

User authentication can be further enhanced with two-factor authentication using hardware tokens. For domain users, you can use certificates as well.

The Secret Net Studio Trusted Environment component is installed beneath the operating system. It operates with reserved CPU core which is separated from the OS using Intel virtualisation technology. Trusted Environment has full access to OS kernel memory so it prevents any potentially malicious OS-level events.

To find out more please contact us

Benefits of the solution include:

  • Classification-based data security
  • Users are involved in IT security culture
  • Controlled information output from the system

KEY FEATURES

Processes protection

  • Protection from process unauthorized shutdown.
  • Trusted Environment observes list of protected processes, which are impossible to shutdown.

Integrity control

  • Driver and process integrity monitoring. Verification of protected processes from hypervisor layer. Prevention from modification of driver’s code in the memory.
  • Trusted Environment performs periodic integrity checks of certain processes in the memory and blocks driver’s memory from modifications.

Drivers protection

  • Protection from unauthorised driver unloading.
  • Trusted Environment checks if the unloading driver is in the list of protected drivers and blocks the unloading operation. Trusted Environment checks if the loading driver is in the drivers white list, then allows the loading operation.