Used Cyberoam Endpoint Data Protection for Windows?


Please contact the developer for pricing information.

Editors’ Review

Download.com staff
This solution provides robust policy-driven data protection and comprehensive asset management for endpoints. It offers granular control over data transfer, device access, and application usage.
Enlarged image for Cyberoam Endpoint Data Pr…
Cyberoam Endpoint Data Protection 0/12
  • Pros

    • Policy-driven data protection and encryption
    • Identity and group-based policy enforcement
    • Granular control over removable devices
    • Automated hardware and software asset tracking
    • Application control for productivity and security
  • Cons

    • Primarily focused on Windows environments
    • Configuration may require significant administrative effort

Used Cyberoam Endpoint Data Protection for Windows?


Explore More


Full Specifications

GENERAL
Release
Latest update
Version
3.21.0723
OPERATING SYSTEMS
Platform
Windows
Operating System
  • Windows 7
  • Windows XP
  • Windows 10
  • Windows Vista
  • Windows 2003
  • Windows NT
  • Windows 2000
Additional Requirements
Microsoft SQL Server Desktop Engine/Microsoft SQL Server 2005
POPULARITY
Total Downloads
6,259
Downloads Last Week
0

Report Software

Program available in other languages


Last Updated


User Reviews

5/5

9 User Votes


Developer’s Description

Get policy-driven data protection and asset management in a single solution.
Cyberoam Endpoint Data Protection delivers policy-driven data protection and asset management in a single solution. Identity and group-based policies for data protection and encryption along with activity logging, provides comprehensive control and visibility of data transfer over removable devices, applications, network sharing and printers. Cyberoam's Data Protection and Encryption allows administrators to create user identity or group-based data protection policies for removable devices such as USB devices and CD/DVDs, as well as for network sharing, Instant Messengers, emails and printing. Encryption of the entire removable device or file encryption at the time of transfer offers strict or flexible control. Administrators can control file transfer with the file name or extension in addition to taking shadow copies of transferred, modified or deleted files. Cyberoam Device Management allows or blocks removable devices like USB drives, storage devices, CD/DVDs, MP3 players, digital cameras, serial ports, parallel ports, modems, bluetooth, wireless card, and more based on individual users or groups. It allows policies based on time of the day, when outside the network in addition to defining expiring time for the temporary policies. Cyberoam's Application Control offers granular policy-based controls, allowing or blocking access to pre-defined and customizable lists of applications, including web, instant messengers, P2P, gaming and more. Organizations can thus, protect sensitive data, control malware entry while enhancing employee productivity. Cyberoam's Asset Management module for Windows offers automated tracking of hardware and software asset location, configuration, version tracking, and historical information, allowing streamlined IT infrastructure management. Further, it offers patch management and updates of operating system and deployment of application software and security solutions.

Download.com
Your review for Cyberoam Endpoint Data Protection