Newsletter
IT and data security solutions added value distribution

Find more information on the product website.

About Egosecure

Egosecure have been the innovation leader in the field of comprehensive data security for more than 10 years. The first product was developed and released in 2005 in Ettlingen, Baden Wurttemberg (Germany), where the company is located. Since then it was able to win more than 2,000 customers of all sizes and many sectors.
EgoSecure Data Protection combines the analysis of the data flow and the protection of data in one solution. For analysis of the data flow is offered the INSIGHT module. The protection of data can be configured individually with the 20 PROTECTION MODULES, which are based on the C.A.F.E MANAGEMENT PRINCIPLE.

Integrated functions graph:

ego-secure-functions
Buzzwords: encryption of HDD/removable media/folder/cloud/network/mail/android/ios, pre-boot, content filter, access control to cloud, device management, PC audit, MDM, application control, secure erase no restore

Find more information on the product website.

About Rohde & Schwarz Cybersecurity 

Rohde & Schwarz Cybersecurity protects companies and public institutions worldwide against espionage and cyberattacks. The company develops and produces high-end encryption products, next-generation firewalls, network traffic analytics and endpoint security software as leading-edge technical solutions for information and network security requirements.

The awarded “made in Germany” IT security solutions range from compact all-in-one products to bespoke solutions for critical infrastructures.

BitBox (Browser in the Box)

BitBox

The virtual environment for secured and comfortable web browsing. Browsing the Internet has become an absolutely necessity in today’s work environments. But our computers also process confidential and critical information such personal and company-internal data. Using the Internet offers huge benefits, but is also subject to constantly changing threats.

Ever since the Internet has become active with the advent of Web 2.0, the balance between threats and benefits has been lost. “Active content” has become a standard part of modern web sites. Websites are more and more indistinguishable from full blown native applications. Programming interfaces like JavaScript, Java, ActiveX or VBScript provide a means for accessing the computer and its resources such as its file system or webcam. Trojans and viruses can abuse such powerful tools e.g. to steal confidential data. Companies and authorities alike are facing a dilemma: to substantially limit the use of the Internet or to find a way of living with existing threats.

Two versions available:

  • BitBox – Single user version freely available for private persons
  • BitBoxTS – Browser in the Box for Terminal Servers

Buzzwords: isolated browser, downloaded file scanning, secure cut&paste, complete isolation of intranet from internet, secure browsing, encapsulated browser, virtual machine

More about solution and implementation: BitBox

TrustedDesktop

TrustedDesktop is a secure virtualized desktop solution with practical information flow control. Its basic principle is strong isolation of critical applications and corporate workflows as well as reliable enforcement of security policies. Its innovative technology enables comprehensive and auditable lifecycle protection of all enterprise data. The overall system ensures that protected information is only processed by trustworthy components. Any data leakage due to malicious or accidental errors is effectively prevented.

Buzzwords: secure virtualized desktop, DLP, VPN client, file encryption, full disk encryption, secure kernel, trusted virtual domain, TPM, printing control, device control, information flow control

More about solution and implementation: TrustedDesktop

About Sophos

IT security products have become as complex as the networks they’re trying to secure. Sophos knows that the solution to complexity is not more complexity.  Sophos began producing antivirus and encryption products nearly 30 years ago. Today their products help secure the networks used by 100 million people in 150 countries and 100,000 businesses, including Pixar, Under Armour, Northrop Grumman, Xerox, Ford, Avis, and Toshiba. Sophos products allow you to secure every endpoint of your network, from laptops to virtual desktops and servers, to web and email traffic and mobile devices.

Sophos Endpoint Protection

sophos endpoint protection

Next-generation endpoint security for today’s businesses and tomorrow’s threats. Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux systems against malware and advanced threats, such as targeted attacks. Sophos next-generation endpoint protection integrates innovative technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease. It also adds web filtering, application control, device control and more directly into the lightweight endpoint agent, so your organization’s policies are enforced anywhere your users go.


Buzzwords:
next-gen protection, AV, application control, device control, antiransomware, zero-day protection, web and application exploit blocking, behavioral analytics, malicious traffic detection, web control, data control

More about solution and implementation:   Sophos endpoint protection

Sophos Intercept X

Ransomware is the number one malware attack affecting organizations today. It encrypts your files and holds them hostage until the ransom is paid, causing massive disruption to business productivity.

Sophos Intercept X features CryptoGuard, which prevents the malicious spontaneous encryption of data by all forms of ransomware—even trusted files or processes that have been hijacked. And once ransomware gets intercepted, CryptoGuard reverts your files back to their safe states.

Buzzwords: antiransomware, ransomware protection, file hostage, cryptoguard, malicious spontaneous encryption prevention, attack forensic analysis, exploit prevention

More about solution and implementation: Sophos Intercept X

Sophos Central

Sophos-Cloud Manage endpoint security and mobile devices from one unified cloud console. Sophos Central is the only fully integrated security solution that protects your corporate IT infrastructure and all of your end users’ devices with integrated endpoint security, mobile device management (MDM), server protection, and secure web gateway into a seamless solution. The web-based management console lets your IT administrators monitor your security status through a single pane of glass view.

Buzzwords: security heartbeat, AV, application control, device control, anti ransomware, zero-day protection, web and application exploit blocking, behavioral analytics, malicious traffic detection, web control, data control, synchronized security for network and endpoint

More about solution and implementation: : Sophos Central

Sophos Clean

sophos clean  

Add more expertise to your endpoint protection. How do you know if your endpoint protection is actually working? Your security could have missed a virus and be unaware that you’re under attack. With Sophos Clean you can do an additional scan, find security breaches, and get rid of them.

 

Buzzwordsmalware removal, AV verification, second opinion scanning, remediation

More about solution and implementation : Sophos Clean 

Sophos server security

networkprotection Protect your virtual and physical servers without sacrificing performance. Sophos Server Protection effectively protects your server environment from malicious attacks while keeping your servers running at peak performance. Designed to secure mission critical servers, Sophos Server Protection integrates server application whitelisting with advanced anti-malware and HIPS. Protection for your Windows, Linux and UNIX systems and optimized for virtual environments.

Buzzwords: server application whitelisting/lockdown, server protection on any platform (windows, linux, unix), HIPS, VMware vShield

More about solution and implementation: :Sophos server security

About Tripwire

Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises, service providers and government agencies around the world to detect, prevent and respond to cyber security threats

 Tripwire enterprise

Real-time threat detection, security automation and business context.Tripwire-Enterprise

Real-time Change Intelligence: Get real-time threat detection and notification at the speed of change. Tripwire® Enterprise delivers change audit and threat detection with high precision, business context and insight for what to do about it.

System Hardening and Compliance Enforcement: Tripwire Policy Manager delivers proactive configuration hardening based on compliance requirements, reduces audit preparation time and cost, and provides audit-ready reporting with evidence of compliance, remediation and exception management.

Security Automation and Remediation: Configuration errors need corrective measures. Tripwire Remediation Manager delivers automation and guidance for rapid repair of broken or security misconfigurations, and integrates with SIEMs, IT-GRC, workflow systems, change management systems and more.

Buzzwords: File integrity management (FIM), secure configuration management (SCM), security automation and remediation, system hardening, vulnerability management, real-time change intelligence, SANS20, baselining, PCI DSS, ISO, adaptive threat protection

  • Tripwire SecureScan
  • Tripwire SecureCheq
  • Tripwire CCM Express