Formerly "Safend Data Protection Suite"

More than 60 percent of corporate data lives not on servers but on laptops, tablets, and other vulnerable devices. That’s right: the usual server-oriented gateway solutions and written (i.e. easy to ignore) security policies won’t cover even half of your data—or your butt.

The Wave alternative is to guard each individual endpoint. The Wave Data Protection Suite goes wherever your devices go, on or off your network, online or offline. Which means it protects your data from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots, hardware keyloggers. All the stuff your nightmares are made of. And it’s managed with a single console.

  • Finalist, “Best Data Loss Prevention,” 2012 SC Magazine Award
  • Winner,  2012 Global Excellence Awards in endpoint security
  • Five stars from SC Magazine
  • Multiple industry certifications

Compliance made simple

The Data Protection Suite enforces security policies automatically. Careless or just plain busy end users can’t ignore the rules. It even comes with security policies preconfigured to meet PCI, HIPAA, SOX, and other regulations. And with its array of logs and reporting tools, proof of compliance can be as easy as printing out a report.

Built in-house for better performance and stability

Unlike competing products (Symantec’s, McAfee’s), ours is built entirely in-house—not with third-party components that leave multiple softwares running in the background. So your machines won’t slow down or, worse, crash.

All at a price you can live with

Partly because we keep it simple, our Data Protection Suite costs less than competing products. For example, its single-agent architecture means that you can add any module in the suite without adding more software to run it. You just buy the license and turn it on. And of course we give you a deal when you buy the whole suite.

Data loss prevention    Inspector

For the age of the mobile device, an affordable, truly custom solution to content control, whether users are on or off the company network, online or offline. Preconfigured security policies make compliance automatic.

Formerly "Safend Inspector"

In a mobile world, endpoint security is the only security

Virtually every other so-called solution to data loss sits on a fixed gateway—as if there’s a wall around your data. How quaint! Thanks to mobile devices, email, and the like, the wall is gone. The Wave alternative is to sit at the endpoint: protecting your laptops, tablets and smartphones. Our Inspector product goes wherever they go. On or off the company network, whether sent inside the organization or outside to a partner … it doesn’t matter. If someone goes home and tries to upload company data to Facebook using the company laptop, Inspector will stop or warn them.

Control exactly who can do what

Inspector lets you decide which people and which data need minding, and which can have more freedom. First you define which data you consider sensitive—for example, patient names or credit card numbers. Then you define how each class of information is going to be controlled when it tries to leave a machine, whether by email, third-party app, Cloud storage like Dropbox, memory stick … the whole range of danger points. Inspector will block, encrypt or warn about any transfer—or not, depending on who’s trying to do it.

Don’t spend too much

Inspector is the most affordable endpoint solution, by far. Well, there is only one other endpoint monitoring product anything like ours: it’s by Symantec. We think it’s absurdly expensive.

Key Features: 

Easy security compliance

  • Preconfigured security policies address specific compliance standards, such as PCI, HIPAA, and Basel-II
  • Detailed logs and reports on security incidents and administrative actions

Data protection

  • Enforces a data-centric security policy across multiple channels, whether the machine is connected to your organization’s network or a home network, or used offline; add more channels on demand using Application Data Access Control
  • Multi-tiered anti-tampering capabilities guarantee permanent control over your endpoints
  • Security policies can force users to justify questionable actions and thereby avoid potential harm
  • Content-aware data labeling and encryption for email means classified emails and attachments are clearly labeled as such and encrypted if necessary

Simplicity

  • Automatically synchronizes with Microsoft Active Directory and Novell eDirectory
  • The whole Data Protection Suite is based on the same agent, so if you start with one or two products and want to add another, all you need to do is apply the new license

No compromises

  • Unlike competing products, Inspector—and the rest of the Data Protection Suite—was built entirely in-house, not with third-party components, for better usability and system stability
  • Multiple data identification techniques can be combined to fine-tune control in a way that won’t disrupt legitimate business. Select users can classify information, providing IT with feedback on accuracy of its data classifications.

Mobile Data Protection

  • Helps prevent the spread of sensitive data to unapproved mobile devices
  • Allows IT to control mobile device enrollment process and limit number of devices per user
  • Supports iOS, Android, Windows Phone – the mobile devices your employees are most likely to show up to work with 

Reliable encryption    Encryptor 

Laptops are easy to lose or steal. With Encryptor, any sensitive data on them (or on your desktops, for that matter) can’t be read by the wrong people. So a lost laptop is just a lost laptop—not a news story.

Formerly "Safend Encryptor"

Self-encrypting drives are coming, but in the meantime ...

Self-encrypting hard drives are the future, but most companies can’t get there overnight. Even so, your organization may be legally required to encrypt sensitive data.

Encryptor gets you through the transition. It encrypts drives that can’t do the job themselves, and does it automatically. It also logs the fact in a central database. That’s proof of compliance—no need to disclose that lost laptop full of social security numbers, because no one can read them.

Encrypt in 2 hours, without wrecking your machines

Encryptor is fast, smart, and careful. Most encryption software blindly encrypts everything, including the operating system and program fields. It takes forever: 8 or more hours for each laptop or desktop. Worse, encrypting an operating system is dicey. Sometimes the machine turns into a brick (oops).

Our solution is simple: don’t encrypt the operating system. Encryptor knows the difference between user and system content. That mean less encryption time: 2 to 4 hours max. And no bricks.

Your end users will never know the difference

Encryptor’s m.o. means encryption and decryption hardly touch your machines’ performance. But also, competing products force everyone to get used to a new login screen. With Encryptor, you can still log in just once, using the same old Windows interface. Your people will literally never know that there’s a new authentication process in place. This keeps things simple for the help desk too: no need for special password recovery procedures.

Key Features: 

Easy security compliance

  • Detailed logs and reports on security incidents, encryption status, and administrative actions

Data protection

  • Multi-tiered anti-tampering capabilities
  • Automatically synchronizes with Microsoft Active Directory and Novell eDirectory
  • Encryption keys are centrally generated and securely stored on the server before encryption is initialized

Simplicity

  • Windows login: no end-user training
  • Generic AD domain password reset process
  • Scalable to manage more than 75,000 agents; add more servers seamlessly
  • The whole Data Protection Suite is based on the same agent, so if you start with one or two products and want to add another, all you need to do is apply the new license

No compromises

  • Unlike competing products, Encryptor—and the rest of the Data Protection Suite—is built entirely in-house, not with third-party components, for better usability and system stability
  • Machine performance is maintained by avoiding encryption and decryption of system or program files that do not require protection

Endpoint monitoring    Protector 

By logging every movement of data in and out of your organization, Protector makes everything your people are doing with their devices 100 percent visible. It’s built-in accountability.

Formerly "Safend Protector"

Keep your people in line

Around 70 percent of security breaches and data thefts are inside jobs (Vista research). A lot of that is just carelessness or, let’s be frank, defiance: for busy people, security can feel like a headache.

Protector enforces your security strategy. It blocks users from connecting to unauthorized devices or using unauthorized interfaces (including those scary portable hot spots). And when the action is authorized, it enforces encryption, automatically guiding the user through the right steps.

Compliance doesn’t have to mean no data sharing

Encryption usually makes it hard to share sensitive data. But we’ve fixed that. First, Protector gives you fine control over who does what: you can give a lot of freedom to people who need it, and very little to people who don’t. Second, it logs every movement of data in and out of your organization—it’s the only product available that can track and log offline activity on encrypted removable devices.

It’s about bringing full visibility to what your people are doing with their devices. With this kind of built-in accountability, you don’t have to worry when business needs call for a more relaxed approach.

Key Features: 

Easy security compliance

  • Security policies are preconfigured for specific regulatory compliance standards, such as PCI, HIPAA, and SOX
  • Forensic logs of all data moving in and out of your organization

Data protection

  • Prevents hybrid network bridging by blocking Wi-Fi, Bluetooth, Modems, or IrDA while a PC is connected to the wired corporate LAN (other vendors offer this only via a single-function product; it’s just one feature of Protector)
  • Blocks or detects both USB and PS/2 hardware keyloggers
  • Turns U3 USB drives into regular USB drives while attached to your endpoints, protecting against auto-launch programs by blocking autorun
  • Detects and restricts devices by device type, device model, or unique serial number
  • Controls transfer of files both to and from external storage devices according to the file types
  • Encrypts data in motion on removable storage devices, external hard drives, and CD/DVDs
  • Integrates with select 3rd party antivirus applications to trigger virus scan on storage devices
  • Tracks file transfers to/from Data Protection Suite encrypted devices offline
  • Wi-Fi control by MAC address, SSID, or the security level of the network
  • Protects thin clients and shared host virtual environments, supporting Citrix XenApp and Terminal Services environments

Simplicity

  • Automatically synchronizes with Microsoft Active Directory and Novell eDirectory
  • The whole Data Protection Suite is based on the same agent, so if you start with one or two products and want to add another, all you need to do is apply the new license

No compromises

  • Unlike competing products, Protector—and the rest of the Data Protection Suite—was built entirely in-house, not with third-party components, for better usability and system stability
  • You choose your security strategy; Protector just implements it
  • Your people can still share data with ease—robust auditing and logging gives you accountability without restrictions

Security compliance    Reporter 

Reporter identifies common security breaches—and gives you the analysis you need to make sense of them. It also makes compliance as easy as sending a email or clicking “print.”

 Formerly "Safend Reporter"

See the patterns that mean trouble

Knowing when your data has been accessed by removable storage devices and wireless ports is important. Reporter does that. But it also gives you the analysis you need to make sense of these incidents. It lets you chunk or chop up the information in a variety of ways, making it far more likely that you’ll see suspicious anomalies and patterns of behavior—such as individuals or departments that routinely flout security policies. And it does it in a clear graphical format that you don’t have to be an IT pro to understand.

Compliance can be as easy as clicking “print”

The need to comply with SOX, HIPAA, PCI, notice of breach, FISMA, BASEL II, UK Data Protection Act, and other regulations means reporting is no longer optional. With Reporter’s comprehensive, scheduled reports, you can be sure that you’re covered. Demonstrating compliance can be as easy as printing out a single page showing that all your machines were encrypted on a certain date.

Buy it once: it works with every Data Protection Suite module

Our competitors sell different reporting modules for each of their products. Call it genius or common sense, but we designed Reporter to work equally well with every Wave Data Protection Suite module. Add as many as you like as your security needs evolve—you won’t need more reporting software. And it’s only $5 a seat (or less) to begin with.

Key Features: 

Easy security compliance

  • Runs graphical reports periodically and sends results via email to predefined recipients
  • Continuous tracking of security status
  • Reports can be packaged to PDF or XLS for further distribution and offline viewing

Data protection

  • Provides both a high-level overview and detailed information on endpoint encryption status
  • Shows security incidents by type, user, and organizational unit
  • Gives an overview of the most common security incidents
  • Identifies endpoints that do not have a valid policy applied to them
  • Generates a detailed list of all physical devices that were used within a defined time frame

Simplicity

  • The whole Data Protection Suite is based on the same agent, so if you start with one or two products and want to add another, all you need to do is apply the new license
  • Easy-to-understand dashboard format

No compromises

Unlike competing products, Reporter—and the rest of the Data Protection Suite—was built entirely in-house, not with third-party components, for better usability and system stability