00 Produkte EP Bühne IMG

EgoSecure Data Protection

Everything runs as before, but securely. All-round protection for all your devices, applications and sensitive company data. Your data remains secure. While digital networking and device diversity offer more flexibility, they also increase the risk of malware, data loss, and theft. Traditional firewall and antivirus protection is no longer enough to close security gaps.

of global security decision-makers report at least one successful attack in the last 12 months.1 In German companies, the figure is 67%. 37% of incidents are caused by human error, 34% by insufficiently secured endpoints.2

of all incidents are based on breaches of compliance policies by users.4 70% of these have more user rights than they need to perform their function.5

is the estimated global damage.3

 1 Forrester Analytics Global Business Technographics® Security Survey, 2018 | 2 IDC 2018 | 3 Cybersecurity Ventures 2017 | 4 Ponemon-Institut 2016 | 5 Harward Business Review 2017


The reasons for insufficient protective measures often lie in the fear of long implementation processes, lack of user acceptance and disruption of business operations. Totally unfounded, because there is another way!


Matrix42 EgoSecure Data Protection

Control by whom and where your data is used

With just a mouse-click you get a graphically prepared overview of all data flows in the network and automatically trigger appropriate protective measures.

  • Insight Analysis –  determines the overall situation of your company network with regard to data security so that you can derive the optimum protective measures. The analysis results are available to you as a clearly structured dashboard. Conclusions about the activities of individual users are not possible. The reports can be generated automatically and sent by e-mail.

  • IntellAct Automation – analyzes the insight and audit data for you and triggers appropriate protective measures based on pre-defined rules. It also offers the option of comparing the data with normal values to automatically identify anomalies or critical situations. This automation makes the work of your administrators easier and significantly minimizes the response time. The integration into the Matrix42 Workflow Studio allows you to trigger further actions and processes depending on the status.

Full control over all devices, interfaces and cloud data

Monitor and control the use of devices (e.g. USB sticks, CDs, printers) or interfaces (e.g. Firewire, USB) on endpoints to ensure the security of your data. Audit-proof according to Basel II, Sarbanes-Oxley and PCI compliant.

  • Effective device access control – protects you against attacks and abuse of access rights. Define who can use which devices (e.g. USB sticks, CDs, TV tuners) or interfaces (e.g. WLAN, Firewire, USB) and to what extent. You not only prevent misuse and data loss, but also prevent malware from entering the corporate network via the interfaces (e.g. BadUSB).

  • Access control for cloud services and storage  – in the cloud, data is accessible everywhere. With Cloud Access Control, you control which employees may use which cloud services and to what extent.

  • Keep data transfer channels under control – Data transfer is possible in many ways, the official way through the company network is only one - Bluetooth, WiFi, Smart Phones and USB-Devices are the most common alternatives. Device & Access Control lets you control which employees have access to which data transfer devices, i.e. which routes data leaves your company.

Transparently trace data flows and detect weak points early on

Audit provides real-time visibility into data flows within your organization, identifies vulnerabilities and documents forensic information to ensure compliance.

  • You meet the requirements for logging of the EU General Data Protection Regulation (EU-GDPR articles 30, 33) and at the same time protect the personal rights of your employees. The logging data is protected by 4- or 6-eye principle (in compliance with the personnel).

You retain control over all your applications - shadow IT is history

  • With Application Control you determine which users are allowed to start which programs.

  • You also successfully put a stop to shadow IT. You prevent malware from entering the company network via your endpoints through unauthorized and, above all, incorrectly licensed installations.

  • In this way you avoid liability risks and economic damage during audits. Many viruses can also be blocked in this way, usually faster than anti-virus solutions can detect them.

Control with data encryption

Encryption encrypts storage media, directories, clouds, individual files or entire hard disks on-the-Fly, without loss of productivity, your users will not notice. You determine which authorized persons are granted access. With the mobile app, your data can be decrypted on external devices and in the cloud on mobile devices or external systems. Additional authentication protects encrypted hard disks when removing hardware or bypassing Windows logon. In this way, you also guarantee the protection of personal data in accordance with EU-GDPR Article 32.

  • Cloud Storage & Network Share Encryption – encrypt folders and files in cloud storage (e.g. OneDrive, GoogleDrive, Dropbox) or any network share. The encryption keys remain in your organization and are never stored in the cloud, a distinct advantage over encryption solutions offered by the cloud storage services themselves.

  • Full Disk Encryption – laptops can be lost or stolen and your sensitive data remains protected. Full Disk Encryption ensures that only authorized users have access to the device and data. Smart cards and eTokens can be used for increased security. Full Disk Encryption is FIPS 140-2 Level 1 certified and supports Advanced Encryption Standard New Instructions (AES-NI).

  • Permanent Encryption - encrypt files no matter what the medium (external storage media, network, local hard drives, cloud storage, etc.) Encrypted data remains encrypted even when transferred via other transfer channels (e.g. as an email attachment or web upload). You can easily reopen the data on third-party and mobile devices using a password or PKI token through the Mobile Encryption Component. 

  • Local Folder Encryption - protects your data in case of loss of devices and storage media, but also in case of collaborative access of several users to the same device. Sensitive data is also protected against access by employees with administrator rights.

  • Removable Device Encryption - Mobile storage devices, such as USB flash drives, are getting smaller and smaller and more powerful, making them increasingly easy to lose or steal. With Removable Device Encryption, they encrypt the files to be protected with methods that can be combined in multiple ways and ensure that the data cannot be used by unauthorized persons.

  • Android & iOS Encryption - iOS and Android devices provide file-based protection on internal storage, storage cards and cloud accounts. Decryption is done by entering a password.

  • Preboot Authentication (PBA) - the door stays closed - prevent Windows login and associated encryption from being manipulated or bypassed by starting USB/CD or replacing the operating system. In case of theft, this also prevents any bitlocker protection from being levered out during startup.


Increase your productivity

Matrix42 Endpoint Detection & Remediation
Endpoint Detection & Remediation (EDR)
The automated preventive and post-infection protection for your endpoints and data - even for unknown malware.
Data Loss & Leakage Prevention (DLP)
Data Loss & Leakage Prevention (DLP)
Advanced protection against data theft and unauthorized access to sensitive company data.


Good reasons to choose
Matrix42 EgoSecure Data Protection

Take advantage of flexible deployment methods. Matrix42 EgoSecure Data Protection can be deployed from the cloud, on premise in your own infrastructure or in a hybrid model.

Matrix42 is a member of

Get Your 30 Days Free Trial

Prova gratis.

Matrix42 EgoSecure Data Protection

Inizia la tua prova gratuita


Case Studies of satisfied customers

Logo Landkreis Regensburg
Caso di studio
External storage media are automatically encrypted, secure and compatible with the endpoint management solution.
Company Logo Bayerisches Zentrum für Angewandte Energieforschung e. V. (ZAE Bayern)
Caso di studio
Protezione contro sofisticati attacchi informatici
Logo Landratsamt Würzburg
Caso di studio
I dispositivi sono automaticamente criptati, la sicurezza dei dati sui dispositivi finali è assicurata