Your SlideShare is downloading. ×

ErasePro Flyer English

240

Published on

ErasePro ensures that deleted files are not recoverable - on demand, on schedule, at the time your hardware is sold, scrapped or assigned to another user. …

ErasePro ensures that deleted files are not recoverable - on demand, on schedule, at the time your hardware is sold, scrapped or assigned to another user.

Further Details: http://cynapspro.com/US/products/erasepro

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
240
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. ErasePro ErasePro deletes your data any time securely and final Deleted files are by no means destroyed, even after you have emptied the recycle bin. ErasePro ensures that deleted files cannot be recovered, whether they are located on the internal hard drive or on an external storage device. Us- ers have the option to securely delete documents - including their shadow copies - immediately or to destroy all de- leted files regularly based on a schedule. When PCs or notebooks are sold or discharged, ErasePro makes sure that you only get rid of the hardware. The integration in the Windows context menu makes secure deletion an easily and readily available option. YOUR BENEFITS SELECTED FEATURES You only hand over files on an external stor- Secure deletion of files, directories and age device, that you really want to pass on. drives. When your PC or notebook is assigned to Support for internal and external storage me- another employee, when it is sold or reaches dia. the end of its life, you can be sure that any Support for various data erasion methods sensitive or private data is no longer accessi- such as simple overwriting, random order, ble. Peter-Gutmann-Method. Secure deletion based on a predefined sched- ule allows the prompt restoration of acciden- Optimization of the erasion speed. tally deleted objects Scheduled deletion of specific directories Policies for the deletion of objects in recycle such as TEMP, recycle bin, etc.. bins or temp directories are centrally man- End of Life Management. aged to ensure that secure deletion does not depend on user actions. Freeware # Enterprise Software Deletion # Destruction Of course there are freeware tools for individ- Anyone who thinks, that is enough to simply ual users, but without central administration, delete files in order to remove them from your you can not consistently apply business rules, hard disk or a USB stick, makes a grave mis- you have no control and no overview. ErasePro take. Even after emptying the Recycle Bin, the is managed centrally in the cynapspro console data is still available in you Windows system. and is available for all employees at all times. Deleting a file only removes the reference to The biggest guarantee for the consistent use of the data from the operating system and re- security software is ease of use. With a right leases the storage space, but the data itself is mouse click on the file, you can select "delete" not deleted. or "securely delete". Done. Don't leave deletion to chance. , Define guide- lines and make sure they are enforced.
  • 2. cynapspro Endpoint Data Protection cynapspro develops software solutions for reliable endpoint data protection in the enterprise network and covers the following areas: DevicePro prevents data loss through open ports and external storage devices. CryptionPro encrypts and protects your company data on mobile storage media – fully automated. CryptionPro HDD protects your company data by en- crypting the hard drive. ApplicationPro blocks unwanted applications and prevents the use of unlicensed software. ErasePro ensures that deleted files are not recover- able. PowerPro cuts energy costs and reports suspicious activity. The following features distinguish all cynapspro pected data abuse or loss, cynapspro knows which solutions: files have been accessed, by whom and when. Intuitive Management Console Minimal System Requirements The single user-friendly Management Console is Apart from a SQL database (the free MSDE or SQL largely self-explanatory and only a minimum of train- Server 2005 Express edition are fully sufficient), there ing is required. The clear and concise structure allows is no additional software required, such as the IIS the compilation of complex setting with just a few Server or .NET client. Consequently, no new vulner- mouse clicks. abilities are introduced by installing additional back office software and memory and CPU utilization is Real-Time Management minimal. All changes to access permissions will be immediately pushed out to the clients and stored in the cynapspro Secure Kernel Driver Technology database. Users don’t need to restart their machines The secure cynapspro® kernel driver technology is or even connect to the company network in order to loaded into the operating system during the boot upgrade their usage rights. sequence and thus ensures that the service running on the client is not visible to the end user. It can only Rights Management at Group Level, User Level or be stopped or uninstalled by an authorized Adminis- Computer Level trator. Reduce your administrative effort. Manage individual access rights directly with the respective users, Integration with Third Party Applications groups or computers. An XML interface allows the allocation of access per- missions from an existing customer Helpdesk or Ser- Synchronization of User Directories vice Desk implementation in a fully automated way, Existing users and user group definitions from Micro- leveraging existing processes, approval workflows, soft Active Directory or Novell eDirectory are im- notifications and management reports. There will be ported by the cynapspro server thus reducing the no need for service desk workers to use an additional workload for defining user groups for Access Client console. Lists (ACLs) as well as the sources of error. Distributed Environments Full Audit Log Several mutually replicating cynapspro servers pro- Password-protected, detailed access statistics with vide load balancing capabilities in enterprise environ- filter and sort order functionality. In case of sus- ments. Free Trial Version Contact On the cynapspro website, we offer a full version cynapspro GmbH of our software for download, including a free 5- Am Hardtwald 1 user license. D-76275 Ettlingen Please contact us if you are interested in testing Tel.: +49 7243 / 945-250 our software in a larger environment. Email: contact@cynapspro.com Internet: www.cynapspro.com March 2010 - Copyright cynapspro GmbH 2010—All rights reserved.

×