We have expertise in both network based and stand alone Data protect, control and management systems or tools in the areas of secure content sharing and distribution that also include desktop management and data filtering solutions.

Data Protect
Protecting data can be in several forms namely during the transfer, when it was received and when it has been opened by the recipient. The first form is usually taken place in a network cable line either via a dedicated or public line. The most popular method used to protect the data is using VPN technologies either using application layer SSL protocol or network layer IPSec approach. Most VPN based systems are hardware based but software based SSL VPN is getting its edges in the field.

The second form is focus on converting the data into a different form/format so that only the intended user will be able to un-cover the data. We call such transfer as “scrambling” the data from plaintext into a converted form called cipher text. Usually a password is required to un-lock the data at the other side of the transfer. Cryptographic based mathematical algorithms such as AES, RSA are used in making such data transfer. Products in this form are mostly stand alone such as Data Loss Protection DLP product series. Protection in this form focuses mainly on the locking/unlocking of the data and not on the data itself, and that is why the third form is emerged as an enhanced way to address the security issues faced by the second form.

The third form is also called a persistent protection to data. The entire protection is on data itself. In other words, it means when data has been actually opened or used by users. What happens when data, in the state of a document or file, has been viewed/opened: read, print, copy, edit, time etc. This last form is the ultimate protection to data and is still not used by most enterprises as the standard way of data communication. The market over such protection is therefore tremendous in future.

Data Control
The third form described in the Data Protect section belongs to the Data Control. Data control decides who, when, where and how the data is accessed. It is the control over the access behaviour of the data by individuals who are using the “Company Confidential CC’ collectively referred to Intellectual Property IP or IP assets. IP in his sense may also refer to normal company documents or files that may seem ordinary to employees but will cause un-wanted or unexpected negative effect once it was obtained by outside parties.

Data Sharing
Once data is protected and under control, then how it can be shared with less risk by users becomes an important question. The sharing can be divided into two ways namely local and remote sharing. Local sharing allows data to be distributed over the network (mainly Intranet) and a software agent is usually required for such sharing. Remote sharing take the form of centralized access meaning the data being protected and controlled is stored at a centralized location called a file server. All accesses to this data storage are fully controlled. A web browser is used for accessing the remote data and conducting the remote sharing. No client installation is required in this sharing approach.

Data Filter
No all data are valid and useful to the enterprise. In order to more effectively select data to be used/accessed by employees, companies use data filtering techniques to isolate the valid or useful data from invalid one. One example is the use of mail filter to separate the junk mails from the valid one. Data filter can be applied to more large scale or higher level to help in intrusion detection and prevention at system level by participating in log analysis and network monitoring. Thus, Data Filter is a broad topic and covers a large range of products in the field.

Desktop Management
Desktop is the environment where users carry on their daily works. Such works include creating/updating important files, performing some simple system maintenance tasks, or making changes to some system resources such as uninstall/re-install programs etc. Properly control how users manage his desktop becomes one of the important tasks of Companies to ensure security, efficiency and control over the use of IT resources of the enterprise.

© Copyright 2011. SZBOWEB Company Limited. All rights reserved.

Disclaimer & privacy Statement