Contatto
00 Produkte EP Bühne IMG

EgoSecure Data Protection



Everything runs as before, but securely. All-round protection for all your devices, applications and sensitive company data. Your data remains secure. While digital networking and device diversity offer more flexibility, they also increase the risk of malware, data loss, and theft. Traditional firewall and antivirus protection is no longer enough to close security gaps.

of global security decision-makers report at least one successful attack in the last 12 months.1 In German companies, the figure is 67%. 37% of incidents are caused by human error, 34% by insufficiently secured endpoints.2

of all incidents are based on breaches of compliance policies by users.4 70% of these have more user rights than they need to perform their function.5

is the estimated global damage.3

 1 Forrester Analytics Global Business Technographics® Security Survey, 2018 | 2 IDC 2018 | 3 Cybersecurity Ventures 2017 | 4 Ponemon-Institut 2016 | 5 Harward Business Review 2017

GET IT BALANCED

The reasons for insufficient protective measures often lie in the fear of long implementation processes, lack of user acceptance and disruption of business operations. Totally unfounded, because there is another way!

PRODUCT

Matrix42 EgoSecure Data Protection

Icon-EDP-shield-globe
INTELLACT AUTOMATION & INSIGHT ANALYSIS

Control by whom and where your data is used


With just a mouse-click you get a graphically prepared overview of all data flows in the network and automatically trigger appropriate protective measures.


  • Insight Analysis –  determines the overall situation of your company network with regard to data security so that you can derive the optimum protective measures. The analysis results are available to you as a clearly structured dashboard. Conclusions about the activities of individual users are not possible. The reports can be generated automatically and sent by e-mail.


  • IntellAct Automation – analyzes the insight and audit data for you and triggers appropriate protective measures based on pre-defined rules. It also offers the option of comparing the data with normal values to automatically identify anomalies or critical situations. This automation makes the work of your administrators easier and significantly minimizes the response time. The integration into the Matrix42 Workflow Studio allows you to trigger further actions and processes depending on the status.
Icon-EDP-shield-settings
ACCESS CONTROL

Full control over all devices, interfaces and cloud data


Monitor and control the use of devices (e.g. USB sticks, CDs, printers) or interfaces (e.g. Firewire, USB) on endpoints to ensure the security of your data. Audit-proof according to Basel II, Sarbanes-Oxley and PCI compliant.


  • Effective device access control – protects you against attacks and abuse of access rights. Define who can use which devices (e.g. USB sticks, CDs, TV tuners) or interfaces (e.g. WLAN, Firewire, USB) and to what extent. You not only prevent misuse and data loss, but also prevent malware from entering the corporate network via the interfaces (e.g. BadUSB).


  • Access control for cloud services and storage  – in the cloud, data is accessible everywhere. With Cloud Access Control, you control which employees may use which cloud services and to what extent.


  • Keep data transfer channels under control – Data transfer is possible in many ways, the official way through the company network is only one - Bluetooth, WiFi, Smart Phones and USB-Devices are the most common alternatives. Device & Access Control lets you control which employees have access to which data transfer devices, i.e. which routes data leaves your company.
Icon-EDP-shield-check
SECURE AUDIT

Transparently trace data flows and detect weak points early on


Audit provides real-time visibility into data flows within your organization, identifies vulnerabilities and documents forensic information to ensure compliance.


  • You meet the requirements for logging of the EU General Data Protection Regulation (EU-GDPR articles 30, 33) and at the same time protect the personal rights of your employees. The logging data is protected by 4- or 6-eye principle (in compliance with the personnel).
Icon-EDP-shield-add
APPLICATION CONTROL

You retain control over all your applications - shadow IT is history


  • With Application Control you determine which users are allowed to start which programs.


  • You also successfully put a stop to shadow IT. You prevent malware from entering the company network via your endpoints through unauthorized and, above all, incorrectly licensed installations.


  • In this way you avoid liability risks and economic damage during audits. Many viruses can also be blocked in this way, usually faster than anti-virus solutions can detect them.

Control with data encryption


Encryption encrypts storage media, directories, clouds, individual files or entire hard disks on-the-Fly, without loss of productivity, your users will not notice. You determine which authorized persons are granted access. With the mobile app, your data can be decrypted on external devices and in the cloud on mobile devices or external systems. Additional authentication protects encrypted hard disks when removing hardware or bypassing Windows logon. In this way, you also guarantee the protection of personal data in accordance with EU-GDPR Article 32.


  • Cloud Storage & Network Share Encryption – encrypt folders and files in cloud storage (e.g. OneDrive, GoogleDrive, Dropbox) or any network share. The encryption keys remain in your organization and are never stored in the cloud, a distinct advantage over encryption solutions offered by the cloud storage services themselves.


  • Full Disk Encryption – laptops can be lost or stolen and your sensitive data remains protected. Full Disk Encryption ensures that only authorized users have access to the device and data. Smart cards and eTokens can be used for increased security. Full Disk Encryption is FIPS 140-2 Level 1 certified and supports Advanced Encryption Standard New Instructions (AES-NI).




  • Permanent Encryption - encrypt files no matter what the medium (external storage media, network, local hard drives, cloud storage, etc.) Encrypted data remains encrypted even when transferred via other transfer channels (e.g. as an email attachment or web upload). You can easily reopen the data on third-party and mobile devices using a password or PKI token through the Mobile Encryption Component. 


  • Local Folder Encryption - protects your data in case of loss of devices and storage media, but also in case of collaborative access of several users to the same device. Sensitive data is also protected against access by employees with administrator rights.


  • Removable Device Encryption - Mobile storage devices, such as USB flash drives, are getting smaller and smaller and more powerful, making them increasingly easy to lose or steal. With Removable Device Encryption, they encrypt the files to be protected with methods that can be combined in multiple ways and ensure that the data cannot be used by unauthorized persons.


  • Android & iOS Encryption - iOS and Android devices provide file-based protection on internal storage, storage cards and cloud accounts. Decryption is done by entering a password.


  • Preboot Authentication (PBA) - the door stays closed - prevent Windows login and associated encryption from being manipulated or bypassed by starting USB/CD or replacing the operating system. In case of theft, this also prevents any bitlocker protection from being levered out during startup.


ADD-ONS

Increase your productivity

Produkte EDR Teaser IMG
Add-On
Endpoint Detection & Remediation (EDR)
The automated preventive and post-infection protection for your endpoints and data - even for unknown malware.
Produkte DLP Teaser IMG
Add-On
Data Loss & Leakage Prevention (DLP)
Advanced protection against data theft and unauthorized access to sensitive company data.

ADDED VALUES

Good reasons to choose
Matrix42 EgoSecure Data Protection


Take advantage of flexible deployment methods. Matrix42 EgoSecure Data Protection can be deployed from the cloud, on premise in your own infrastructure or in a hybrid model.

FOR YOUR COMPANY
Icon-Mehrwerte-Icon-General-add-circle
Automatic encryption of data on all devices without disturbing users
Icon-Mehrwerte-Icon-General-add-circle
Only authorized users access sensitive data
Icon-Mehrwerte-Icon-General-add-circle
In accordance with the EU General Data Protection Regulation (GDPR Art. 25, 32, 33 und 34)
Icon-Mehrwerte-Icon-General-add-circle
Compliance with the BSI minimum standards for data security
Icon-Mehrwerte-Icon-General-add-circle
Data protection-compliant behaviour analysis and auditing
Icon-Mehrwerte-Icon-General-add-circle
Exchange of data only via authorized persons and channels
FOR YOUR IT
Icon-Mehrwerte-Icon-General-add-circle
Less complexity through simple application and device control
Icon-Mehrwerte-Icon-General-add-circle
Full transparency regarding data movement and possible weaknesses
Icon-Mehrwerte-Icon-General-add-circle
Less risk, less work, higher level of protection
Icon-Mehrwerte-Icon-General-add-circle
Easy installation and quick configuration
Icon-Mehrwerte-Icon-General-add-circle
Faster implementation of privacy policies, e.g. data storage in the cloud
Icon-Mehrwerte-Icon-General-add-circle
Less effort for the support team

Matrix42 is a member of

SUCCESS STORIES

Case Studies of satisfied customers

Company Logo Bayerisches Zentrum für Angewandte Energieforschung e. V. (ZAE Bayern)
Case Study
Protection against sophisticated cyber attacks
Easy to maintain and use, ideal for non-profit organizations with a small IT team.
Company Logo KWM Karl Weisshaar Ing. GmbH
Case Study
KWM WEISSHAAR controls security from a central console
The integration of Workspace Management and IT Security ensures greater efficiency and secure endpoint management for over 500 employees.