SlideShare a Scribd company logo
1 of 2
Download to read offline
CryptionPro HDD
CryptionPro HDD protects confidential data by encrypting the hard disk drive

CryptionPro HDD ® provides comprehensive protection for your portable computer through encryption, It prevents
unauthorized access to the notebook and thus to the stored data or even access to the corporate network by unau-
thorized users. Should the notebook fall into hostile hands, the data is protected even when the hard disk is re-
moved. CryptionPro HDD ® ensures perfect protection for all mobile data with a combination of enhanced access
protection (pre-boot authentication) and hard disk encryption (software and hardware-based).

Missing Laptops cause Massive Damage

About 55 percent of IT managers indicate that their company has already lost at least one mobile computer either
through negligence or theft. And 46 percent reported that this had led to a loss of data. In only 75 percent of the
cases, the company could prove that the data on the computer was encrypted. This, however, is very important for
compliance reasons. If data gets into the hands of an unknown and thus unauthorized person through the loss of a
computer, the company is obliged to notify all people concerned - a massive image loss combined with a huge finan-
cial risk.


YOUR BENEFITS                                                    SELECTED FEATURES
   Protection for you company data in case of                        Software-based Full Disk Encryption (FDE)
   theft, loss or unauthorized access attempts.                      Transparent encryption with strong algo-
   Compliance with local and international data                      rithms (AES, Triple-DES, Blowfish)
   protection laws
                                                                     Pre Boot Authentication System
   Centralized audit reporting for fast and sim-
   ple IT audits                                                     Support for a variety of authentication meth-
   Central management tools for maintenance                          ods: transparent mode, Windows credentials
   and administration                                                mode, Smartcard mode
   Central management tools for deployment                           Support for all Tokens and Smartcards
cynapspro                                                           Endpoint Data Protection

cynapspro develops software solutions for reliable
endpoint data protection in the enterprise network
and covers the following areas:
DevicePro prevents data loss through open ports and
external storage devices.
CryptionPro encrypts and protects your company
data on mobile storage media – fully automated.
CryptionPro HDD protects your company data by en-
crypting the hard drive.
ApplicationPro blocks unwanted applications and
prevents the use of unlicensed software.
ErasePro ensures that deleted files are not recover-
able.
PowerPro cuts energy costs and reports suspicious
activity.

The following features distinguish all cynapspro                    pected data abuse or loss, cynapspro knows which
solutions:                                                          files have been accessed, by whom and when.

Intuitive Management Console                                        Minimal System Requirements
The single user-friendly Management Console is                      Apart from a SQL database (the free MSDE or SQL
largely self-explanatory and only a minimum of train-               Server 2005 Express edition are fully sufficient), there
ing is required. The clear and concise structure allows             is no additional software required, such as the IIS
the compilation of complex setting with just a few                  Server or .NET client. Consequently, no new vulner-
mouse clicks.                                                       abilities are introduced by installing additional back
                                                                    office software and memory and CPU utilization is
Real-Time Management                                                minimal.
All changes to access permissions will be immediately
pushed out to the clients and stored in the cynapspro               Secure Kernel Driver Technology
database. Users don’t need to restart their machines                The secure cynapspro® kernel driver technology is
or even connect to the company network in order to                  loaded into the operating system during the boot
upgrade their usage rights.                                         sequence and thus ensures that the service running
                                                                    on the client is not visible to the end user. It can only
Rights Management at Group Level, User Level or                     be stopped or uninstalled by an authorized Adminis-
Computer Level                                                      trator.
Reduce your administrative effort. Manage individual
access rights directly with the respective users,                   Integration with Third Party Applications
groups or computers.                                                An XML interface allows the allocation of access per-
                                                                    missions from an existing customer Helpdesk or Ser-
Synchronization of User Directories                                 vice Desk implementation in a fully automated way,
Existing users and user group definitions from Micro-               leveraging existing processes, approval workflows,
soft Active Directory or Novell eDirectory are im-                  notifications and management reports. There will be
ported by the cynapspro server thus reducing the                    no need for service desk workers to use an additional
workload for defining user groups for Access Client                 console.
Lists (ACLs) as well as the sources of error.
                                                                    Distributed Environments
Full Audit Log                                                      Several mutually replicating cynapspro servers pro-
Password-protected, detailed access statistics with                 vide load balancing capabilities in enterprise environ-
filter and sort order functionality. In case of sus-                ments.

Free Trial Version                                                  Contact
On the cynapspro website, we offer a full version                   cynapspro GmbH
of our software for download, including a free 5-                   Am Hardtwald 1
user license.                                                       D-76275 Ettlingen
Please contact us if you are interested in testing                  Tel.: +49 7243 / 945-250
our software in a larger environment.                               Email: contact@cynapspro.com
                                                                    Internet: www.cynapspro.com

                                March 2010 - Copyright cynapspro GmbH 2010—All rights reserved.

More Related Content

What's hot

TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
Symantec
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
HassaanSahloul
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
webhostingguy
 
Citadon Hosting Services
Citadon Hosting ServicesCitadon Hosting Services
Citadon Hosting Services
webhostingguy
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD Proposal
Todd Deshane
 

What's hot (20)

Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
 
Norman Patch and Remediation
Norman Patch and  RemediationNorman Patch and  Remediation
Norman Patch and Remediation
 
MBESProductSheet (1)
MBESProductSheet (1)MBESProductSheet (1)
MBESProductSheet (1)
 
unit5final
unit5finalunit5final
unit5final
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from Symantec
 
Barrister Enterprise Server Support
Barrister Enterprise Server SupportBarrister Enterprise Server Support
Barrister Enterprise Server Support
 
The Multiple Use Cases for Persystent Suite
The Multiple Use Cases for Persystent SuiteThe Multiple Use Cases for Persystent Suite
The Multiple Use Cases for Persystent Suite
 
Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...
 
C90 Security Service
C90 Security ServiceC90 Security Service
C90 Security Service
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept Document
 
Ldc
LdcLdc
Ldc
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Citadon Hosting Services
Citadon Hosting ServicesCitadon Hosting Services
Citadon Hosting Services
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD Proposal
 
ProStore Remote Backup Solution
ProStore Remote Backup SolutionProStore Remote Backup Solution
ProStore Remote Backup Solution
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet Template
 

Similar to CryptionPro Hdd Flyer English

Tools of noc
Tools of nocTools of noc
Tools of noc
munawarul
 

Similar to CryptionPro Hdd Flyer English (20)

Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del RansomwareWebinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Security from the Inside
Security from the InsideSecurity from the Inside
Security from the Inside
 
Radmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimizationRadmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimization
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQ
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
cynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guidecynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guide
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
A Guide to Secure Remote Access with Splashtop.pdf
A Guide to Secure Remote Access with Splashtop.pdfA Guide to Secure Remote Access with Splashtop.pdf
A Guide to Secure Remote Access with Splashtop.pdf
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 

More from cynapspro GmbH

More from cynapspro GmbH (18)

Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
 
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
 
cynapspro endpoint data protection 2010 - technical specifications
cynapspro endpoint data protection 2010 - technical specificationscynapspro endpoint data protection 2010 - technical specifications
cynapspro endpoint data protection 2010 - technical specifications
 
cynapspro endpoint data protection - user guide
cynapspro endpoint data protection -  user guidecynapspro endpoint data protection -  user guide
cynapspro endpoint data protection - user guide
 
cynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro endpoint data protection 2010 - Bedienungsleitfadencynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro endpoint data protection 2010 - Bedienungsleitfaden
 
Cynapspro data endpoint protection - Anbindung von Drittsysteme
Cynapspro data endpoint protection - Anbindung von DrittsystemeCynapspro data endpoint protection - Anbindung von Drittsysteme
Cynapspro data endpoint protection - Anbindung von Drittsysteme
 
cynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro data endpoint protection 2010 - Installationsleitfadencynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro data endpoint protection 2010 - Installationsleitfaden
 
CryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschCryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutsch
 
DevicePro Flyer deutsch
DevicePro Flyer deutschDevicePro Flyer deutsch
DevicePro Flyer deutsch
 
CryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschCryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutsch
 
PowerPro Flyer deutsch
PowerPro Flyer deutschPowerPro Flyer deutsch
PowerPro Flyer deutsch
 
ErasePro Flyer deutsch
ErasePro Flyer deutschErasePro Flyer deutsch
ErasePro Flyer deutsch
 
Cryption proflyer de
Cryption proflyer deCryption proflyer de
Cryption proflyer de
 
ApplicationPro Flyer deutsch
ApplicationPro Flyer deutschApplicationPro Flyer deutsch
ApplicationPro Flyer deutsch
 
Screenshots von DevicePro 2009
Screenshots von DevicePro 2009Screenshots von DevicePro 2009
Screenshots von DevicePro 2009
 
Screenshots von DevicePro 2009
Screenshots von DevicePro 2009Screenshots von DevicePro 2009
Screenshots von DevicePro 2009
 
DevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
DevicePro Ultimate 2009 - Efficient Data Loss Prevention SolutionDevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
DevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
 
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das UnternehmenDevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

CryptionPro Hdd Flyer English

  • 1. CryptionPro HDD CryptionPro HDD protects confidential data by encrypting the hard disk drive CryptionPro HDD ® provides comprehensive protection for your portable computer through encryption, It prevents unauthorized access to the notebook and thus to the stored data or even access to the corporate network by unau- thorized users. Should the notebook fall into hostile hands, the data is protected even when the hard disk is re- moved. CryptionPro HDD ® ensures perfect protection for all mobile data with a combination of enhanced access protection (pre-boot authentication) and hard disk encryption (software and hardware-based). Missing Laptops cause Massive Damage About 55 percent of IT managers indicate that their company has already lost at least one mobile computer either through negligence or theft. And 46 percent reported that this had led to a loss of data. In only 75 percent of the cases, the company could prove that the data on the computer was encrypted. This, however, is very important for compliance reasons. If data gets into the hands of an unknown and thus unauthorized person through the loss of a computer, the company is obliged to notify all people concerned - a massive image loss combined with a huge finan- cial risk. YOUR BENEFITS SELECTED FEATURES Protection for you company data in case of Software-based Full Disk Encryption (FDE) theft, loss or unauthorized access attempts. Transparent encryption with strong algo- Compliance with local and international data rithms (AES, Triple-DES, Blowfish) protection laws Pre Boot Authentication System Centralized audit reporting for fast and sim- ple IT audits Support for a variety of authentication meth- Central management tools for maintenance ods: transparent mode, Windows credentials and administration mode, Smartcard mode Central management tools for deployment Support for all Tokens and Smartcards
  • 2. cynapspro Endpoint Data Protection cynapspro develops software solutions for reliable endpoint data protection in the enterprise network and covers the following areas: DevicePro prevents data loss through open ports and external storage devices. CryptionPro encrypts and protects your company data on mobile storage media – fully automated. CryptionPro HDD protects your company data by en- crypting the hard drive. ApplicationPro blocks unwanted applications and prevents the use of unlicensed software. ErasePro ensures that deleted files are not recover- able. PowerPro cuts energy costs and reports suspicious activity. The following features distinguish all cynapspro pected data abuse or loss, cynapspro knows which solutions: files have been accessed, by whom and when. Intuitive Management Console Minimal System Requirements The single user-friendly Management Console is Apart from a SQL database (the free MSDE or SQL largely self-explanatory and only a minimum of train- Server 2005 Express edition are fully sufficient), there ing is required. The clear and concise structure allows is no additional software required, such as the IIS the compilation of complex setting with just a few Server or .NET client. Consequently, no new vulner- mouse clicks. abilities are introduced by installing additional back office software and memory and CPU utilization is Real-Time Management minimal. All changes to access permissions will be immediately pushed out to the clients and stored in the cynapspro Secure Kernel Driver Technology database. Users don’t need to restart their machines The secure cynapspro® kernel driver technology is or even connect to the company network in order to loaded into the operating system during the boot upgrade their usage rights. sequence and thus ensures that the service running on the client is not visible to the end user. It can only Rights Management at Group Level, User Level or be stopped or uninstalled by an authorized Adminis- Computer Level trator. Reduce your administrative effort. Manage individual access rights directly with the respective users, Integration with Third Party Applications groups or computers. An XML interface allows the allocation of access per- missions from an existing customer Helpdesk or Ser- Synchronization of User Directories vice Desk implementation in a fully automated way, Existing users and user group definitions from Micro- leveraging existing processes, approval workflows, soft Active Directory or Novell eDirectory are im- notifications and management reports. There will be ported by the cynapspro server thus reducing the no need for service desk workers to use an additional workload for defining user groups for Access Client console. Lists (ACLs) as well as the sources of error. Distributed Environments Full Audit Log Several mutually replicating cynapspro servers pro- Password-protected, detailed access statistics with vide load balancing capabilities in enterprise environ- filter and sort order functionality. In case of sus- ments. Free Trial Version Contact On the cynapspro website, we offer a full version cynapspro GmbH of our software for download, including a free 5- Am Hardtwald 1 user license. D-76275 Ettlingen Please contact us if you are interested in testing Tel.: +49 7243 / 945-250 our software in a larger environment. Email: contact@cynapspro.com Internet: www.cynapspro.com March 2010 - Copyright cynapspro GmbH 2010—All rights reserved.