Novell Expands Encryption
Novell expands encryption capabilities with ZENworks endpoint security management
WALTHAM, Mass. -- Novell today announced the availability of ZENworks® Endpoint Security Management with expanded encryption functionality and local language support. This policy-based security solution offers improved encryption for personal data management, removable storage and white-listed devices, as well as increased security for fixed disks. With ZENworks Endpoint Security Management, enterprise customers have granular control over their endpoint ports and devices allowing them to confidently protect and secure their corporate data.
“Encryption is becoming a critical necessity for business,” said Chris Christiansen, Program Vice President, Security Products & Services at IDC. “Companies in all industries are facing an onslaught of compliance regulations, as well as security threats, that demand they protect their data from unauthorized access. Integrated encryption functionality and password policies secure corporate assets from endpoint threats that are increasing with mobile computing. These tools are also essential for helping IT administrators enforce corporate and regulatory compliance requirements ensuring that confidential information remains appropriately encrypted at all times and is always properly handled and accessed only by authorized individuals.”
Available in nine languages, including English, French, German, Italian, Portuguese, Spanish, Chinese and Japanese, ZENworks Endpoint Security Management offers expanded USB control for non-storage peripheral devices like mouses and printers, allowing administrators to dictate device access to the network using criteria such as manufacturer name and device model number. With this enhanced solution, companies can also disable “autorun” and “autoplay” features which can protect their corporate networks against the increasing threat of data theft using USB and MP3 devices, known as “thumbsucking” and “podslurping.”
Novell Inc. (Nasdaq: NOVL)
About the Author
You May Also Like
Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024