Vericept Does 360 - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Government // Cybersecurity

Vericept Does 360

Vericept announced Vericept Desktop 360-degree, providing content visibility and control to enterprise desktops

DENVER -- Vericept Corporation today announced Vericept Desktop 360-degree, providing content visibility and control to enterprise desktops. With the recent proliferation of laptop theft, intellectual property theft and identity theft, now more than ever, organizations must have visibility and control into where critical documents and customer data resides at all times on their corporate network and must protect this data from being accessed, printed, copied or downloaded without proper authorization.

"With the increased popularity and convenience of utilizing USB drives and iPods(R) as storage devices in addition to laptops, it is no longer sufficient to simply protect data-in-motion over the network," said Dave Parkinson, President and CEO of Vericept. "It is equally critically important to protect stored data as evidenced by the large increase in insider breaches relating to mobile devices. The need for this technology has further been validated by the numerous requests we have received from customers and prospects alike. For this reason, we are proud to once again be first to market with an enterprise-class Desktop solution that fully integrates with Vericept Content 360-degree, and reaffirms both our technology and market leadership."

Part of the Vericept 360-degree Risk Management Platform, Vericept Desktop 360-degree brings 360-degree visibility and control capability to content residing on desktops, laptops and servers without impeding the flow of business. Vericept Desktop 360-degree provides continual content protection either while connected to the network or disconnected on the nomadic fringe and enables organizations to:

  • Discover where confidential documents reside
  • Lockdown content from information leakage
  • Control data loss on desktops, laptops and servers
  • Control use of removable drives and media such as an iPod(R), USB drive, CD, floppy and disk
  • Control access, downloading, printing, copying and moving of data by unauthorized users
  • Protect laptop content even when disconnected

"The content monitoring and filtering space is growing rapidly and as enterprises look to address compliance, defense of intellectual property and other forms of data leakage, it will be imperative to complement network based monitoring and control with a desktop client that can offer similar functionality," said Paul Proctor, Research Vice President for Gartner. "The need to define, project and enforce content protection policies comprehensively across an organization requires this type of architecture."

Vericept Corp.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
11 Things IT Professionals Wish They Knew Earlier in Their Careers
Lisa Morgan, Freelance Writer,  4/6/2021
News
Time to Shift Your Job Search Out of Neutral
Jessica Davis, Senior Editor, Enterprise Apps,  3/31/2021
Commentary
Does Identity Hinder Hybrid-Cloud and Multi-Cloud Adoption?
Joao-Pierre S. Ruth, Senior Writer,  4/1/2021
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Successful Strategies for Digital Transformation
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll