UNTUK PENJELASAN LEBIH DETAIL MENGENAI CYBEROAM & HARGA, HUBUNGI KAMI
Product sudah berhasil ditambah ke cart.

Cyberoam EPDP

Data Protection and Encryption

Data Protection and Encryption

Insider access to sensitive documents and accidental or malicious file transfer is a major cause of data loss. With the Cyberoam Data Protection and Encryption, organizations can control data transferred to removable devices, printers, or attachments in emails or over Instant Messengers. They can control document operations, document sharing and save shadow copies at the time of specified actions to the document. Organizations can eliminate the risk of data loss on account of lost removable devices by encrypting removable devices and files at the time of copying them to a device. They can ensure that data in devices is accessible only to authorized users through decryption requirement for encrypted files.

detail

Device Management

Device Management

Removable devices are the most common routes to data leakage because of their small size, considerable storage capability and difficulty in tracing. Cyberoam's Device Management module allows organizations to trace and control all removable devices at their endpoints. Organizations can allow access only to whitelisted devices - USB devices, storage ports, network/Wi-Fi devices, communication interface devices, dial-up devices and others.

detail

Application Control

Application Control

Unrestricted application usage can result in the use of unauthorized, illegal and malware-laden applications, causing data loss, productivity loss, legal liability and network outages. The Application Control module allows organizations to prevent data loss by allowing or blocking access to specified applications. Application logs allow them to view the type and time of applications used at endpoints across the organization.

detail

Asset Management

Asset Management

Distributed offices and rise in malware attacks are opening organizations to higher levels of threats, leaving IT teams in a fire-fighting mode. Cyberoam's Asset Management module for Windows enables organizations to streamline their IT infrastructure management with centralized and automated hardware and software asset management that includes inventory, patch and update management. This allows organizations to control hardware and software costs while lowering malware penetration and meeting the requirements of security compliance.

detail