SECURITY- DESIGN- ENGINEERING - SUPPORT - CONSULTING
PROTECT DATA- IMPROVE AVAILABILITY- REDUCE COST- INCREASE PRODUCTIVITY
Based on patent-pending technology, the Fidelis Extrusion Prevention System®, Fidelis XPS™ is the only system able to identify and stop data leakages before they occur. Organizations choose Fidelis XPS to solve their biggest data leakage challenges--protecting intellectual property and identity information, assuring compliance with government and industry privacy regulations, and managing insider use of the internet.
PROTECT Digital Assets
Effective use of an organization's digital assets typically requires sharing them across an extended enterprise in some collaborative process, such as a company's supply chain or a bank's credit-review process. While technology has made collaboration cheaper and easier, it has also made it easier to lose control of the network and valuable intellectual property.
The leakage, or extrusion, of this information imposes real costs to organizations, their partners, and their shareholders. In addition to direct financial costs, competitive advantage, brand impact, reputation risks, and civil liabilities can be substantial.
Fidelis Security Systems is a leading provider of extrusion prevention systems that stop data leakage, mitigating the risks organizations face in the protection of their digital assets. The Fidelis Extrusion Prevention System®, Fidelis XPSTM, provides the first direct control to prevent the extrusion, or unauthorized disclosure, of digital assets. Rather than using the indirect approach of focusing on controlling user behavior through access control, Fidelis XPS focuses on the digital assets themselves. Through a network appliance, it enables companies to actually mitigate their risks by implementing a policy-based approach to prevent the transfer of digital assets, rather than merely reporting on compliance with internal policies and external regulations.
Fidelis XPS provides multiple tools to protect digital assets:
* All-network channels prevention: Prevent data leakage across all channels on all ports on the network at gigabit speeds.
*Pre-built profiles: Choose from a plug-and-play suite of policies that protect critical digital assets without data registration for fast deployment and a lower total cost of ownership.
*Smart Identity ProfilingTM : Accurately recognize identity information without labor-intensive data registration. This powerful profiling and validation engine minimizes the occurrence of both false positives and false negatives resulting in fast deployment and easy maintenance.
PROTECT Digital Assets: Intellectual Property
From manufacturing product designs to source code to business knowledge stored
electronically, intellectual property has become digitized across organizations
and has provided great productivity increases.
MANAGE Insider Use of the Internet
Today's networked environments--with most of an organization's information available in digital format and the prevalence of new technology communication "channels" such as instant messaging, peer-to-peer, and webmail--have contributed greatly to productivity. But the risks of unacceptable use of the network as a resource have also grown greatly. With broader access to information and new, usually uncontrolled channels of communications, insiders have often found ways to undertake activities on the network that are not conducive with their organizations' policies.
Whether it is a financially stressed or disgruntled employee, a contractor or other third party with access to your network, or just carelessness in adherence to your acceptable use policy, an insider can pose a great threat to your organization. The viewing of inappropriate content and materials and use of unauthorized channels and technologies can result in significant legal liability and financial risk, negatively impact your employees' productivity, and consume precious IT resources like bandwidth and storage.
To date, most enterprises have only placed controls on the web and e-mail gateways to
prevent violations of their acceptable use policy. However, almost half of all network traffic bypasses these two control points, making it easier for insiders to subvert these control points and send out inappropriate materials, typically via "back channels" like instant messaging, peer-to-peer technologies, and rogue web traffic. Because developers of such consumer technologies are motivated to make their applications pervasive, they have been specifically designed to subvert firewall controls with port-hopping and tunneling. Traffic flowing in these "back channels" is unmonitored and cannot be proxies.
Fidelis Security Systems is a leading provider of extrusion prevention systems that stop data leakage, mitigating the risks organizations face from management of insider use of the internet. The Fidelis Extrusion Prevention System®, Fidelis XPSTM, is a network appliance designed to manage and enforce your acceptable use policy with a range of pre-built policies that allows organizations to identify and block any session if a policy has been violated, in real time at gigabit speed.
Unlike proxy servers that see only a specific protocol on specific ports, Fidelis XPS monitors the content flowing across all network channels on all ports, alerting and/or preventing acceptable use violations on all content flowing across the network. Fidelis XPS implements your acceptable use policy on all channels on all ports, thereby mitigating liabilities and productivity impact.
Send mail to
questions or comments about this web site.