1 / 12

Competitive Overview

Competitive Overview. August 2007. Competitive Product Matrix (CY 2007). . . . . . . . Guardian Edge. . . . . Pointsec. . . PnP device only No port control. . . Utimaco. . . . . Credant. . . Blackberry only. . PGP. . . . . . .

dima
Download Presentation

Competitive Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Competitive Overview August 2007

  2. Competitive Product Matrix (CY 2007)        GuardianEdge     Pointsec   PnP device only No port control   Utimaco     Credant   Blackberry only  PGP       SafeBoot    WinMagic    Safend    SecureWave Hard Disk Removable Storage Port & Device Control Shadowing Smartphone MMC AD Integration Single Management Console The Leader in Endpoint Data Protection

  3. Market Direction – Breadth of Endpoint Controls Data Leakage Prevention (Reconnex partnership) Smartphone Protection (Trust Digital OEM partnership) File Shadowing (GEDC feature Q4 2007) Breadth of Controls Port & Device Control (GEDC) Removable Storage Encryption (GERS) Full Disk Encryption (GEHD) The Leader in Endpoint Data Protection

  4. Market Direction – Integration and Management Deploys quickly and easily (high endpoint success rate) Scales to enterprise (10,000+ seat deployments) Active Directory Integration (fully leverages power of AD) Group Policy Management (endpoint controls by policy) Single Management Console (one interface to all endpoint controls) Integrated Application Platform (seamless integration of endpoint controls) Integration & Management The Leader in Endpoint Data Protection

  5. Market Direction – Endpoint Data Protection Pointsec SafeBoot Utimaco Breadth of Controls PGP Credant WinMagic Integration & Management The Leader in Endpoint Data Protection

  6. Key Differentiators • Pointsec • Installation and initial encryption 60% slower than competitive average* • No centralized reporting of drive encryption status • Must be connected to network during installation • Policies distributed through file shares, not GPOs • Power failure protection on encryption is “where we left off” only • Can’t double-write data to ensure no critical sector is lost • PBA banner and graphics not controlled through policy • Must physically create directory and copy files into the client package directory before installation *Lehigh University benchmark study – see Notes The Leader in Endpoint Data Protection

  7. Key Differentiators • Utimaco • Not on DARRT/SmartBUY list • No self-service password recovery • User must call Help Desk or have Internet access from another machine for Web help • Lacks breadth of endpoint data protection controls • No port control solution • Device control limited to PnP devices • Only FDE application is integrated with the Safeguard Enterprise platform • Pre-boot environment is 16-bit • DOS-like user interface The Leader in Endpoint Data Protection

  8. Key Differentiators • Credant • Not a full disk encryption solution • Does not support Firewire attached removable storage • Supports only Roxio and Nero for CD/DVD encryption • Does not encrypt hibernation file • No user lockout for failed password attempts • Lacks breadth of endpoint data protection controls • No port & device control solution The Leader in Endpoint Data Protection

  9. Key Differentiators • SafeBoot • Claims to be only product to protect data files from corruption when running Microsoft Windows Defrag utility – NOT TRUE! • GuardianEdge encryption driver protects data files from corruption when using Microsoft Defrag or Diskeeper 2007 • No emergency decryption for machines that have not reported to server • Power failure protection on encryption is “where we left off” only • No option to double-write data to ensure no critical sector is lost The Leader in Endpoint Data Protection

  10. Key Differentiators • WinMagic • Claims to be the only FDE solution with two-factor support at pre-boot authentication – NOT TRUE! • GuardianEdge pre-boot authentication supports two-factor • Power failure protection on encryption is “where we left off” only • No option to double-write data to ensure no critical sector is lost • Lacks breadth of endpoint data protection controls • No port & device control solution • PGP • Not on DARRT/SmartBUY list • FDE product lacks self-service off-line key recovery • Lacks breadth of endpoint data protection controls • No port & device control solution The Leader in Endpoint Data Protection

  11. GuardianEdge Advantages • Broadest set of endpoint data protection controls • FDE, Removable Storage, Data Leakage Prevention, Shadowing, Smartphones • Deepest integration with enterprise environments • Active Directory and group policies • Demonstrated track record of high endpoint success rate • Strongest application integration • Unified management and monitoring of data protection controls • DARTT and GSA SmartBUY approved • Vision and Execution • SOA platform extensible to meet evolving data protection needs • Data classification • Mobile Devices • Endpoint encryption services (operating system, hard disk) The Leader in Endpoint Data Protection

  12. Competitive Overview July 2007

More Related