ControlGuard monitors access


ControlGuard monitors access

Microscope contributor


One of the biggest fears of any IT administrator is to manage the demands of staff that want to connect into the business from numerous external locations.

 The growth in handheld computers and mobiles has made a mockery of most security systems designed to contain and protect within the boundaries of a network.

 With people wanting to connect from almost anywhere there is real pressure to make sure that only the right staff can get access to the sensitive data.

In response to that pain point a number of products have appeared and among those is ControlGuard’s Endpoint Access Manager.

The reason why it stands out above its competitiors is because of tits ability to cope with almost anything that a customer wants to throw at it.

Ity is possible to control, monitor and log the information that is downloaded between a host if devices including iPods and thumb drives as well as onto pther platforms including smart phones and PDAs.

As you would expect it also heads off the threat from traditional media including DVDs and CDs and external hard drives.

The reason why all of the above is so crucially important it because as the goverbnment can tell you it is not only embarrasing but dangerous to lose data.

It is no longer just good enough to talk about security policies what the powers that be want to see is that the policies have been enforced and that there are systems in place to ensure that they are robust.

ControlGuard has to compete not just against rival products but against the fear that lurks inside everyone that makes them worry that the protection they are relying on is not going to be up to the job.

Manage to get the ticvks in those boxes – and it looks like the vendor has enough testimonials to prove it can – and from a reseller perspective this makes it a much easier sale.

The pitch:

Keeping control over access

The channel:

Check with vendor

The link:


Join the conversation Comment



    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.