Endpoint Protector - Razorthorn Security (2024)

Endpoint Protector - Razorthorn Security (1)

Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices.

Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, HIPAA etc.

Our DLP solution is available as hardware and virtual appliance, and as cloud infrastructure (Amazon Web Services, Microsoft Azure and Google Could).

We are committed to helping our customers’ concerns, such as:
– Data loss / Data leakage / Data theft
– Uncontrolled use of devices in the workplace
– Regulatory compliance
– Protection of intellectual property

Endpoint Protector Modules

Endpoint Protector - Razorthorn Security (2)

Content Aware
Protection

Scanning data in motion

Monitor, control and block file transfers. Detailed control through both content and context inspection.

Endpoint Protector - Razorthorn Security (3)

Device
Control

USB & peripheral port control

Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.

Endpoint Protector - Razorthorn Security (4)

Enforced
Encryption

Automatic USB encryption

Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.

Endpoint Protector - Razorthorn Security (5)

eDiscovery

Scanning data at rest

Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans.

Content Aware Protection

Content and Context Scanning
Enable an advanced inspection mechanism for a more accurate detection of sensitive content such as PIIs. Context customization is available.

Blacklists and Whitelists
Create blacklists based on predefined content, custom content, file names, or generate whitelists to avoid redundancy and increase productivity.

File Tracing and Shadowing
Record all file transfers or attempts to various online applications and other exit points. Have a clear view of actions by saving a copy of the files.

Reports and Analysis
Monitor activity related to file transfers with a powerful reporting and analysis tool. Logs and reports can also be exported to SIEM solutions.

Compliance (GDPR, HIPAA, etc.)
Become compliant with industry rules and regulations like PCI DSS, GDPR, HIPAA etc. Avoid fines and other prejudices.

Offline Temporary Password
Temporarily allow file transfers to computers disconnected from the network. Ensure security and productivity.

Transfer Limit
Set a transfer limit within a specific time interval. It can be either based on the number of files or file size. E-mail alerts when the limit is reached are available.

Optical Character Recognition
Inspect content from photos and images, detecting confidential information from scanned documents and other similar files.

DLP for Thin Clients
Protect data on Terminal Servers and prevent data loss in Thin Client environments just like in any other type of network.

DLP for Printers
Policies for local and network printers to block printing of confidential documents and prevent data loss and data theft.

Print Screen and Clipboard Monitoring
Revoke screen capture capabilities. Eliminate data leaks of sensitive content through Copy & Paste / Cut & Paste, enhancing the data security policy.

Threshold for Filters
Define up to which number of violations a file transfer is allowed. It applies to each type of content or to the sum of all violations.

Device Control

Device Types and Specific Devices
Set rights – deny, allow, read only, etc. – for Device Types or Specific Devices (using VID, PID and Serial Number).

Custom Classes and Trusted Devices
Rights can be created based on classes of devices making management easier for products from the same vendor.

Outside Hours and Outside Networks
Device Control Policies can be set to apply when outside normal working hours. Also, the policies can be set to apply when outside the company’s network.

File Tracing and Shadowing
Record all file transfers or attempts to various USB storage devices, providing a clear view on users’ actions, and save a copy of files that were transferred to controlled devices.

Set Rights Granularly
Device Rights can be configured globally, per group, computer, user and device. Use default settings or adjust as needed.

Active Directory SyncTake advantage of AD to make large deployments simpler. Keep entities up to date, reflecting the network groups, computers and users.

Users and Computers Information
Gain a better visibility with information such as Employee IDs, Teams, Location, accurate contact details and more (IPs, MAC Addresses etc.)

Offline Temporary Password
Temporarily allow device access to computers disconnected from the network. Ensure security and productivity.

Create Email Alerts
Predefined and Custom email alerts can be set up to provide information on the most important events related to device use.

Dashboard and Graphics
For a quick visual overview of the most important events and statistics, graphics and charts are available.

Reports and Analysis
Monitor all activity related to device use with a powerful reporting and analysis tool. Logs and reports can also be exported.

SIEM Integration
Logs and events can be automatically forwarded to any SIEM solution for a more comprehensive overview.

Enforced Encryption

Automatic and Manual Deployment
Both automatic and manual deployment is available.

Complex Master and User Passwords
The password complexity can be set as needed. The Master Password provides continuity in circ*mstances like users’ password resets.

Secure and easy to use
Password-based, easy to use and very efficient.

Trusted Devices or Read Only
Authorize only encrypted USB devices and ensure all data copied on removable storage devices is automatically secured. The option to allow Read Only rights until encryption is needed is also possible.

eDiscovery

Content and File Type
Filters can be created based on custom content such as keywords and expressions, or file names based on the file name and extension.

Full Scan or Custom Location
Filters can be created based on predefined locations. Avoid redundant scanning for data at rest with targeted content inspections.

Encrypt and Delete
Data at rest containing confidential information can be encrypted to prevent unauthorized employees’ access, or deleted if it is detected on unauthorized endpoints.

Manual and Automatic Scan
In addition to the Clean and Incremental Scans, Automatic Scans can be scheduled – either one time or recurring (weekly or monthly).

Compliance (GDPR, HIPAA etc.)
Become compliant with industry rules and regulations like PCI DSS, GDPR, HIPAA etc. Avoid fines and other prejudices.

SIEM Integration
Leverage Security Information and Event Management products by externalizing logs. Ensure a seamless experience across security products.

Report and Analysis
Monitor logs relating to scanning data at rest and take remediation actions as needed. Logs and reports can also be exported to SIEM solutions.

Endpoint Protector - Razorthorn Security (2024)
Top Articles
Latest Posts
Article information

Author: Sen. Ignacio Ratke

Last Updated:

Views: 5816

Rating: 4.6 / 5 (56 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Sen. Ignacio Ratke

Birthday: 1999-05-27

Address: Apt. 171 8116 Bailey Via, Roberthaven, GA 58289

Phone: +2585395768220

Job: Lead Liaison

Hobby: Lockpicking, LARPing, Lego building, Lapidary, Macrame, Book restoration, Bodybuilding

Introduction: My name is Sen. Ignacio Ratke, I am a adventurous, zealous, outstanding, agreeable, precious, excited, gifted person who loves writing and wants to share my knowledge and understanding with you.