Bellridge-Kanguru Endpoint Protector - Content Aware Protection

Kanguru Endpoint Protector - Content Aware Protection


Centrally Control and Filter Content Within Your Organization

 

Quick Overview:


Content Aware Protection (CAP) provides a superb defense against sensitive data leaking outside of your establishment, through the use of robust content filtering. Ensure that sensitive data never leaves your network, whether copied on devices, clipboard, or through applications, online services and even as screen captures.

 

CAP enables administrators to develop security policies regarding Cloud-based services, browsers, email clients, media and other services to protect against careless employee behavior which can often contribute to data loss.

 

 

Advanced Features:

 

    •  Filter content across all platforms

    •  Specify policies and manage rules by extension levels

    •  Set passive or active reportings

    •  Create definitions to allow or deny content

    •  Generate CAP reports

 
 

Technical Specifications:

Model Number KEP-CAP-Series
Device Control (DC) Compatibility Windows XP, Vista, 7, 8, 10, OS X
License Type Subscription
Service Type 100% Cloud Based



Content Aware Protection (CAP)


Kanguru Endpoint Protector: Content Aware Protection (CAP) provides robust supervisory control over an organizations' web-based content, protecting against data loss that could result from human error.

Instant Messaging, Email, Social Media and Cloud Services all offer great, efficient connectivity for your organization to communicate and conduct business, but they also invite vulnerabilities to sensitive data. Content Aware Protection enables administrators to create policies, silently or actively audit, and generate reports on any content that should not be leaving the organization.

 


Easy to Use


Kanguru Endpoint Protector Content Aware Protection provides an easy-to-use dashboard for convenient and secure administration. From one convenient console, administrators can define and enforce policies, silently monitor activity, take action, block devices, and even log and report actions.

 


About Device Control (DC)


Protect sensitive information from leaving your organization by filtering across all types of web-based media: 

  •  
    • •  Web Browsers
    • •  Cloud Services: (i.e., Dropbox, GoogleDrive, etc.)
    • •  Social Media (Facebook, Linkedin, etc.)
    • •  USB Devices
    • •  IM Clients (Skype, etc.)
    • •  File-Sharing Applications
    • •  Email Clients
    • •  Attachments



  • Specify Policies, Inspect and Enforce Compliance

       

      Set organization-wide administrative policies from one central location and manage rules:

     
    • •  Inspect data transfers
    • •  Detect transactions (credit card, etc.)
    • •  Detect keywords based on custom dictionaries
    • •  Inspect clipboard and deactivate print screen capabilities




    Set Passive or Active Reporting

       

      Exercise passive or active reporting to audit activities:

       

    • •  Choose to block immediately, or silently report activities
    • •  Learn when, how and who is attempting to take data outside of the network




    Generate Detailed Auditing Reports

       

      Report on conformance & violations of policies

       

    • •  Export audits to MS Excel as a .csv file
    • •  Passive and Active Reporting




    Create Definitions

       

      Create your own auditing definitions and a custom dictionary of pre-defined content to allow or deny specific content.

       

    • •  Keyword filtering
    • •  Filter different filetypes and extension levels: .JPEG,.PNG,.CPP, etc.
    • •  Generate Content Aware Protection reports using Regex (Regular Expressions)

 
 

Which Secure Drive is Best for You?
All Kanguru Defender USB devices are:
  • AES 256-Bit Hardware Encrypted
  • Easy to Use
  • Tamper-Proof
  • TAA Compliant
  • Remotely Manageable
  • Protected by BitDefender Anti-Virus
Designed and Developed By Media3