Cyberoam Endpoint Data Protection delivers policy-driven data protection and asset management in a single solution. Identity and group-based policies for data protection and encryption along with activity logging, provides comprehensive control and visibility of data transfer over removable devices, applications, network sharing and printers. Cyberoam's Data Protection and Encryption allows administrators to create user identity or group-based data protection policies for removable devices such as USB devices and CD/DVDs, as well as for network sharing, Instant Messengers, emails and printing. Encryption of the entire removable device or file encryption at the time of transfer offers strict or flexible control. Administrators can control file transfer with the file name or extension in addition to taking shadow copies of transferred, modified or deleted files. Cyberoam Device Management allows or blocks removable devices like USB drives, storage devices, CD/DVDs, MP3 players, digital cameras, serial ports, parallel ports, modems, bluetooth, wireless card, and more based on individual users or groups. It allows policies based on time of the day, when outside the network in addition to defining expiring time for the temporary policies. Cyberoam's Application Control offers granular policy-based controls, allowing or blocking access to pre-defined and customizable lists of applications, including web, instant messengers, P2P, gaming and more. Organizations can thus, protect sensitive data, control malware entry while enhancing employee productivity. Cyberoam's Asset Management module for Windows offers automated tracking of hardware and software asset location, configuration, version tracking, and historical information, allowing streamlined IT infrastructure management. Further, it offers patch management and updates of operating system and deployment of application software and security solutions.
||Free to try
||Microsoft SQL Server Desktop Engine/Microsoft SQL Server 2005