X
Cloud Solution Support
Kindly fill / correct the following fields
Name *
Email *
Phone Number *
Organization *
Additional Information
X
Your request has been submitted successfully. An account manager will email you within one business day to confirm your request.
Cloud Solution

Awareness Technologies
The Awareness Technologies (ATI) SaaS Solution integrates Web Filtering, Employee Monitoring, Data Loss Prevention and Laptop Recovery from a single agent managed from a single control console. Endpoint architecture works perfectly for mobile users on laptops and smartphones.
Get more done, wherever you’re working Let us show you how the cloud is the perfect match for the modern workplace
Live Chat
Main Features
  • Scans emails and attempts to write to removable media for policy violations: mishandling or misappropriation of confidential data, Intellectual Property, trade secrets, and Non-Public Personal Information [All email (including both corporate email accounts and webmail like Gmail and Hotmail), Instant messaging & All attached files].
  • Automatically scans all PCs in your organization to find where confidential information resides.
  • Blocks any communication with confidential data.
  • Prevents accidental disclosure and malicious theft of sensitive data.
  • Monitor and control the transfer of sensitive information to removable storage devices Easy, intuitive policy-creation.
  • Overcomes any attempt to encrypt before sending unauthorized data.
  • Protects data in any format, even if copied, pasted or compressed.
  • Recognizes file type changes.
  • Define and manage data protection policies.
  • Generate reports to meet compliance requirements.
  • Can be deployed silently over the network in minutes with no user prompts.
The Next Generation of Security

Imagine offering your customers, from the smallest SMB to the largest enterprise, a solution that tracks all employee activity and can literally stop data leakage to USB drives, webmail accounts and social medial sites. And because of the power of the cloud — these services can be delivered for a flat monthly fee and work even when the customer’s machine is NOT connected to the network.

Historically, security products (like anti-virus, firewalls and other external threat security products) have all started out as point solutions, leaving companies to deal with the headaches that come with multiple technologies and multiple vendors. Over time those solutions began to consolidate into a Unified Threat Manager (UTM) -- a single solution for complete protection. Another key trend has been the movement away from complex and costly acquired technology towards easy to use SaaS-based solutions. Repeating the mistakes of the past, however, internal threat security solutions are currently dominated by hardware-based single-point solutions, leaving companies with the worst of all worlds.

Accordingly, InterGuard was architected to address this problem by incorporating both key evolutionary themes resulting in a complete internal threat UTM delivered in a SaaS format. And since the damage from internal threats (such as loss of sensitive data, employee productivity and laptop theft/loss) are caused at the endpoint, InterGuard is deployed on the endpoint - making it capable of delivering an unparalleled level of visibility and control - both on and off of the network.

The only solution with NO Hardware Required

InterGuard provides Data Loss Prevention for your organization - regardless of where your employees or your critical information reside. It can scan every file on every PC in your organization to uncover where confidential Data At Rest resides as well as prevent confidential Data In Motion from leaking out (via email / attachments, USB devices, web postings, etc.). In today's increasingly mobile world, where employees and contractors alike demand instant access to corporate assets and confidential information from remote locations, protecting that information can be extremely difficult. Traditional network-based solutions have porous perimeters. Removable media? Webmail? Instant Messaging? All these escape the control of many of our competitors. Thus, they offer only limited "data loss prevention".

InterGuard Data Loss Prevention is superior because it can identify and protect sensitive information no matter where it's being accessed. It operates preemptively to keep your organization continuously ahead of today's constantly evolving threat landscape. InterGuard is installed at the desktop level and reports back over encrypted HTTPS protocols, instead of over the network. This is crucial since it streamlines the process of detecting and blocking any unauthorized attempts to move data outside the organization. Simply put, InteGuard builds a protective circumference around each computer in your organization, rather than just network traffic. This means InterGuard is more effective and comprehensive in securing your confidential data than network-based solutions.

InterGuard uncovers your risks by scanning all of the PCs in your organization to show you where confidential information resides (Data At Rest).

InterGuard prevents confidential Data In Motion from leaking out of your organization via webmail, attachments, web postings or USB devices.

Single Agent Architecture

InterGuard's patented Single Agent architecture allow you to identify, track, and control who accesses your data, what data they access, and what they can and cannot do with that data. Most importantly, all of this is done with an application that can be deployed and configured in a matter of minutes with a minimum of allocated resources. Other DLP solutions? They can take weeks or months to install, require training courses for policy creation and create significant strains (financial and operational) on the organization.

Confidential data is often lost through errors and oversights, rather than malicious intent. For example, the wrong recipient is mistakenly added to a group email containing sensitive company financial data or customer credit card information. InterGuard not only blocks the email from getting into the wrong hands, it is also configured to “coach and educate” employees to adopt due care and best practices, as set by your company. It lets users and administrators choose the appropriate tradeoff between a high detection rate on one hand and a low level of false positives on the other.

Removable Media Monitoring & Control

InterGuard's integrated Removable Media Monitoring and Control strikes the ideal balance between protection of a business’s assets and the efficiency of day-to-day operations. InterGuard blocks the copying of any file to removable media (USB drive, iPod, external hard drive) based on the file's content, and the employee’s job function. So, an employee’s computer or user profile can be set, using InterGuard, to allow copying of email, attachments and attempts to write to removable media, but not spreadsheets with confidential company financials. This is much more targeted and so more effective than competitive solutions, which frequently employ an “all or nothing” approach when it comes to removable media.

Easy to Use and Install

InterGuard’s patented software architecture runs on computers across the organization, even those computers that never connect to the corporate network. InterGuard can be installed in minutes, without the need for dedicated hardware, and managed centrally from any web browser. It is flexible and scalable. It can operate as on-demand Software as Service, or behind your company’s firewall. InterGuard makes real-time security decisions to detect and prevent threats to the confidential data inside your organization.