Product Name: Centennial Software DeviceWall Content Aware Edition
Features:
• Prevents unwanted transfer of data to or from USB memory sticks, portable hard drives, smart phones and MP3 players
• User access can be blocked, limited to read-only or unlimited
• Can encrypt all data transferred to external devices
• Records individual device connections and the most popular files accessed on portable devices
• Identifies true file types, even if the user has renamed the files or changed the filename extensions
System Requirements:
• Server requires: Pentium Class processor;
? 128 MB of RAM; 512 MB of hard disk space;
? Windows 2000, XP or 2003 (32-bit editions)
? Domain-based network, Apache Web Server or Microsoft IIS 5.0
• Client requires: Windows 2000 (service pack 4), XP or 2003
Price: $43 per managed device
Product Name: Entrust IdentityGuard 9.0
Features:
• Authentication options include user name and password, IP geolocation, machine/device, questions and answers, out of band one-time password (delivered via voice, SMS or e-mail), grid cards, one-time password tokens.
• Companies can choose how they want their users to authenticate, based on user type, risk assessment and the application being used
• Can be accessed remotely or by Windows desktop and applications deployed on the extranet
• Authenticators administered through one Web-based console
System Requirements:
• Works on a variety of systems, including IBM and BEA application services
Price: US$8 per user for one license, with discounts for buying large quantitites. Average selling price is US$1.40 per user.
Product Name: NetOp Process Control
Features:
• Uses a white list to decide which programs and processes are allowed to run on each PC on the network
• Assigns individual rights to each PC so different employees have access to the applications and Internet tools they need to do their jobs.
• Acts as a supplement to installed firewalls and virus protection
• Checks the integrity of applications attempting to communicate with a PC and notifies administrators if applications have been modified
• Hides computers ports to prevent attacks and port scans
System Requirements
• Intel Pentium 233 MHz or higher
• RAM: 32 MB plus operating system requirement
• 10 MB of hard disk space
• Windows Vista, XP or 2000 professional edition
• At least one network adapter
Pricing not provided