Brief introduction into threats current companies are facing and how Safetica helps to eliminate these threats.

Keep confidential data safe inside

Keep critical data private and out of competitors’ hands. Whether R&D project, financial records or third-party construction blueprints, Host-it has your data locked down.

Host-it Zones mirror the individual company environment to more easily save and secure data. You select which data restrictions to apply and where: Can customer records leave the accounting office in cleartext or must they be copied to encrypted removable media? Who can access sales data and uploaded it? It’s your data and now it’s your decision. And when someone attempts to violate a policy restriction, you’ll be immediately warned.

Key features:

  • DLP rules
  • Zones
  • Security policies
  • Device management
  • Encryption

Find and secure your data

Host-IT will search all endpoints, laptops and connected devices for data to protect. By defining multiple search categories such as financial data, blueprints, or even more using detailed terms like “Office 404 Marketing materials”, you can precisely identify the data in need of protection. Once recognized, Host-IT will protect data according to the applicable security policies. New data is covered from the moment of its creation within the established categories.

Key features:

  • Data Classification
  • On-the-fly data protection

Control access to data

Control access to classified data from a single central management console. You can create Zones that mirror your actual business structure, share rules and policies between them and create exceptions when needed.

Key features:

  • Access Control
  • Security Policies

Protect data everywhere

Whether laptop, removable drive, or shared network folder … Host-IT doesn’t limit where data can be protected. You decide on the limits to data movement in every category, restrict copying to secured devices and uploads to selected websites.

Key features:

  • Security Policies
  • Zones
  • Device management
  • Encryption

Get it in context

After an attempted data breach — whether intentional or accidental — you will be instantly notified and sent a detailed incident report. That is just the start as Host-IT can chart endpoint activities over time to uncover larger trends, document suspicious behaviors, and isolate the scope of any incidents.

Key features:

  • All reporting features
  • DLP protocol

Data security management within arms reach

The new Host-IT Management Console keeps data security within arms reach. For a quick overview, start with pre-selected graphs and drill down to detailed records with a single click. A single console keeps it simple for the security manager overseeing Host-IT’s technical deployment and for the CEO deciding who can see the settings and results.

Even when away from your computer, Host-IT will alert you about dangerous incidents via your Blackberry, iPhone or any other email capable device.

Key features:

  • Management Console
  • Quick Alerts