SkyRecon Intros V5 of Endpoint Security Product
SkyRecon announces StormShield 5.0 unified endpoint security
SAN JOSE, Calif. -- SkyRecon Systems, (www.skyrecon.com) the premier provider of integrated, proactive endpoint security solutions, today announced the release of version 5.0 of its unified endpoint security product StormShield™. As a natural complement to existing endpoint anti-virus products, StormShield offers the most system and data protection layers available in a single lightweight agent and single management console. Key to version 5 is the compliance auditing and reporting tools surrounding the dynamic policy management capabilities.
SkyRecon's StormShield solution protects businesses from the real threats of data leakage, data theft, system misuse, unauthorized access, and zero-day attacks. Not cobbled together through acquisition or disparate technology integrations, StormShield was designed and built from its inception to be a single, lightweight security agent with multiple protection layers working together to protect both the system and the data. The integrated StormShield services include device control, file-based content encryption, application control, host-based intrusion prevention (HIPS) and firewall, wireless security, and network access control (NAC).
Automatically using the appropriate services together at the right time for the right situation, StormShield's system protection layer combined with the data protection layer ensures that sensitive data stays secure and in the hands of the business -- not a hacker or competitor.
"StormShield addresses each critical aspect of endpoint protection, providing protection for both the endpoint system itself and the data that the system hosts and has access to," said Sean Martin, CISSP, SkyRecon VP of Marketing. "StormShield protects both physical and virtual enterprise endpoints, including mobile laptops that are routinely taken beyond the often-protected physical perimeter of an organization -- therefore introducing greater risk of attack, data loss, and misuse."
About the Author
You May Also Like