Integration. StormShield secures endpoint connectivity, protects
sensitive data, applications, and the operating system from computer
attacks, and controls users' operations, all via a single agent on
each PC. Consistent security policies can be defined from a single
central console and applied to every endpoint resource.
Behavior-driven detection. Since antivirus and antispyware solutions
rely on signatures - meaning they must recognize an attack in order
to defeat it - hackers have both time and numbers on their side. To
counter this, StormShield relies on behaviors, not signatures.
Suspicious or dangerous software operations are automatically detected
and blocked, without any disruption of the user's or the IT
administrator's work.
Role-based policies. StormShield enables organizations to tailor
access in a variety of ways to meet their needs. Taking user roles
and context into account, policies can be instantly changed so only
authorized users, for instance, can write sensitive information on
removable storage devices. Similarly, with a context-aware system,
mobile workers, connecting through a public hotspot, will have limited
access to business applications until the VPN session is established.
Flexible protection. Balancing the need for IT protection, evolving
business requirements, and scarce IT administration resources is a
challenging exercise. StormShield's flexibility allows the
organization to decide the level of protection that it wants to
enforce on each PC, from automatic protection based on behavioral
analysis and system hardening to fine-grained, rule-based protection
defined by an IT administrator.
"The white paper issued by IDC clearly shows that SkyRecon is ahead of the
curve when it comes to providing security for network endpoints," said Ravy
Truchot, SkyRecon CEO. "As the white paper states, the use of laptops is
growing at a significant rate, which increases the potential for a security
breach. Companies need to understand that securing those mobile endpoints
and protecting the data they contain is a very different challenge from
what is needed to secure a network of desktop systems. There are
similarities, but the differences are huge, especially the threat of laptop
theft as employees opt to telecommute from their local café."
According to the IDC white paper, an IT security policy can no longer be
restricted to the physical perimeter of the organization but must also
consider the virtual perimeter encompassing mobile devices and the users of
these devices -- the endpoint.
For a copy of the IDC SkyRecon report, visit www.skyrecon.com.
About SkyRecon Systems Inc.
SkyRecon Systems is a premier provider of integrated endpoint protection
platforms. SkyRecon's product suite enables computer usage control and
business continuity at the endpoint. With its patented, kernel-based
technology, SkyRecon delivers proactive application, system and data
protection, without relying on a signature-based approach.
More information on SkyRecon Systems can be found at www.skyrecon.com.
SkyRecon Systems Inc., 2033 Gateway Place, Suite 500, San Jose, CA 95110.
Tel. (877) 239 3057.
Contact Information: Press Contact: Sean Martin VP of Marketing smartin@skyrecon.com