1 / 7

The Leader in Endpoint Data Protection

Hard Disk and Removable Storage Competitive Update. The Leader in Endpoint Data Protection. Brad Zehring Steve Finegan Sr. Product Managers 10/07/2008. Competitive Hard Disk Overview. Full Support  Some Support O No Support X. Enhanced competitiveness:.

nuala
Download Presentation

The Leader in Endpoint Data Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hard Disk and Removable Storage Competitive Update The Leader in Endpoint Data Protection Brad Zehring Steve Finegan Sr. Product Managers 10/07/2008

  2. Competitive Hard Disk Overview Full Support  Some Support O No Support X Enhanced competitiveness: *Requires separate license for GuardianEdge Advanced Authentication

  3. Check Point Single client, but 5 management consoles Shared network drives for deployment and reporting No directory services integration No self-service access recovery No client lockout Sophos LDAP sync for AD, not native No off network registration No self-service access recovery No client lockout McAfee LDAP sync for AD, not native No disk forensics integration No simple user registration No self-service access recovery Extremely complicated management console Hard Disk Competitors Highlights

  4. Competitive Removable Storage Overview Full Support  Some Support O No Support X Enhanced competitiveness: *Requires separate license for GuardianEdge Advanced Authentication

  5. Check Point No single console for HD/RS/DC Minimal AD integration No self-extracting archives No email or FTP Password by device only, not file Only 128-bit encryption Can not encrypt NTFS drives Can’t protect data with certificates Volume based encryption Sophos LDAP sync for AD, not native No access utility for CD/DVD No self-extracting archives No email or FTP No two-factor authentication support on non-Utimaco computers No administrative segregation between OUs McAfee Minimal AD integration Sync required Only brings across users and groups Can’t re-encrypt data on machines without the software Can’t encrypt data identified on devices not defined as “removable” – excludes USB / FireWire drives, and even some RS devices Lumension Minimal AD integration Sync required Only brings across users and groups No single console for HD/RS/DC Difficult policy control Encryption not FIPS certified Single password per device only No self-extracting archives Can’t encrypt data identified on devices not defined as “removable” – excludes USB / FireWire drives, and even some RS devices No two-factor authentication support Volume based encryption Removable Storage Competitors Highlights

  6. GE Hard Disk Encryption Single management interface All endpoint data protection applications Active Directory, eDirectory, and non-domain PCs Consolidated Reporting Consistent Policy management The only native AD integration Maximum use of existing infrastructure and training investments Deploy and manage policy at any level of the directory hierarchy – OUs, groups, machines Simple, easy management interface By far the most straightforward and easy to use management interface of the leading FDE vendors Self-assisted access recovery for lost passwords The first vendor in the space to implement self-service challenge / response in the form of Authenti-Check™ Fastest, simplest deployment model with user self-registration No complicated setup required on the part of the administrator to deploy users, groups and machines GE Removable Storage Encryption Single management interface All endpoint data protection applications Active Directory, eDirectory, and non-domain PCs Consolidated Reporting Consistent Policy management The only native AD integration Maximum use of existing infrastructure and training investments Deploy and manage policy at any level of the directory hierarchy – OUs, groups, machines Best-in-class Device/Media Coverage USB hard drives and CDs/DVDs, as well as USB flash drives, SD cards, CF cards, floppy disks, iPods, etc. Best-in-class Portability Encrypt and decrypt data from computers without the software Send by email or put on FTP servers or network shares Transfer entire directory structures Enforce two-factor authentication on non-GERS computers Key Differentiators

  7. The Leader in Endpoint Data Protection

More Related