Home / / Cyberoam launches DLP solution

Cyberoam launches DLP solution

Unified threat management vendor has added data leakage prevention to its security credentials with a new end point data protection suite

Cyberoam launches DLP solution
Cyberoam's Harish Chib is confident that the new addition of a DLP suite to the vendor's lineup will reassert its total security standing

Unified threat management appliances vendor Cyberoam has moved to tackle the data leakage prevention market with a new solution. The company has unveiled an end point data protection suite to secure corporate data and manage IT assets.

The new solution is an extension to the company's previous security protection that it offers for the gateway to the endpoint and it claims that it reinforces its presence as a complete security provider.

"Blended threats do not distinguish between the gateway and the end point to gain entry. With the launch of the end point data protection suite, Cyberoam will secure organisations at the gateway and the desktop, offering a single, complete security cover for organisations," said Harish Chib, vice president of new business development at Cyberoam.

"Cyberoam is one of the few companies offering data protection and asset management in a single solution globally, meeting customer demand for a comprehensive, easy-to-manage solution," he added.   

Cyberoam says the extensive use of removable storage devices and file sharing applications makes end points the most vulnerable areas, with research statistics showing more than 50% of data loss incidents originating at end points.

The average total cost of a corporate data breach stands at US$6.3m and lost business accounts for 65% of breach costs, according to a study by the Ponemon Institute. End point data protection is thus increasingly being recognised as the critical immediate step in cutting data losses and delivering immediate ROI.

Cyberoam's End Point Data Protection suite consists of four modules - data protection and encryption, device management, application control and asset management. With its policy-driven data protection and asset management, the suite also delivers identity and group-based policy control. It can also be used to log activity which will provide comprehensive control and visibility of data transfer over removable devices, applications, network sharing and printers.





Follow us to get the most comprehensive IT Security news delivered fresh from our social media accounts on Facebook, Twitter, Youtube, and listen to our Weekly Podcast. Click here to sign up for our weekly newsletter on curated technology news in the Middle East and Worldwide.