Product Name: Centennial Software DeviceWall Content Aware Edition


• Prevents unwanted transfer of data to or from USB memory sticks, portable hard drives, smart phones and MP3 players

• User access can be blocked, limited to read-only or unlimited

• Can encrypt all data transferred to external devices

• Records individual device connections and the most popular files accessed on portable devices

• Identifies true file types, even if the user has renamed the files or changed the filename extensions

System Requirements:

• Server requires: Pentium Class processor;

? 128 MB of RAM; 512 MB of hard disk space;

? Windows 2000, XP or 2003 (32-bit editions)

? Domain-based network, Apache Web Server or Microsoft IIS 5.0

• Client requires: Windows 2000 (service pack 4), XP or 2003

Price: $43 per managed device

Product Name: Entrust IdentityGuard 9.0


• Authentication options include user name and password, IP geolocation, machine/device, questions and answers, out of band one-time password (delivered via voice, SMS or e-mail), grid cards, one-time password tokens.

• Companies can choose how they want their users to authenticate, based on user type, risk assessment and the application being used

• Can be accessed remotely or by Windows desktop and applications deployed on the extranet

• Authenticators administered through one Web-based console

System Requirements:

• Works on a variety of systems, including IBM and BEA application services

Price: US$8 per user for one license, with discounts for buying large quantitites. Average selling price is US$1.40 per user.

Product Name: NetOp Process Control


• Uses a white list to decide which programs and processes are allowed to run on each PC on the network

• Assigns individual rights to each PC so different employees have access to the applications and Internet tools they need to do their jobs.

• Acts as a supplement to installed firewalls and virus protection

• Checks the integrity of applications attempting to communicate with a PC and notifies administrators if applications have been modified

• Hides computers ports to prevent attacks and port scans

System Requirements

• Intel Pentium 233 MHz or higher

• RAM: 32 MB plus operating system requirement

• 10 MB of hard disk space

• Windows Vista, XP or 2000 professional edition

• At least one network adapter

Pricing not provided

Related Download
Cybersecurity Conversations with your Board Sponsor: CanadianCIO
Cybersecurity Conversations with your Board – A Survival Guide
Download Now