Call a Specialist Today! 844-960-3902

Call a Specialist Today! 844-960-3902

Data Loss Prevention
IPS Made Simple

InterGuard Data Loss Prevention - The only solution with NO Hardware Required

InterGuard Data Loss Prevention
Data Loss Prevention
InterGuard DLP, 1 Year, 1-10 Users
*Price per user. Minimum quantity is 1.
#ATIDLP-ARR-1-10
Our Price: $127.00
InterGuard DLP, 1 Year, 11-25 Users
*Price per user. Minimum quantity is 11.
#ATIDLP-ARR-11-25
Our Price: $99.00
InterGuard DLP, 1 Year, 26-100 Users
*Price per user. Minimum quantity is 26.
#ATIDLP-ARR-26-100
Our Price: $87.00
InterGuard DLP, 1 Year, 101-500 Users
*Price per user. Minimum quantity is 101.
#ATIDLP-ARR-101-500
Our Price: $77.00
InterGuard DLP, 1 Year, 501-1,000 Users
*Price per user. Minimum quantity is 501.
#ATIDLP-ARR-501-1000
Our Price: $67.00
InterGuard DLP, 1 Year, 1,001+ Users
*Price per user. Minimum quantity is 1,001.
#ATIDLP-ARR-1001+
Our Price: $57.00

Click here to jump to more pricing!

Overview:

InterGuard provides Data Loss Prevention for your organization - regardless of where your employees or your critical information reside. It can scan every file on every PC in your organization to uncover where confidential Data At Rest resides as well as prevent confidential Data In Motion from leaking out (via email / attachments, USB devices, web postings, etc.). In today's increasingly mobile world, where employees and contractors alike demand instant access to corporate assets and confidential information from remote locations, protecting that information can be extremely difficult. Traditional network-based solutions have porous perimeters. Removable media? Webmail? Instant Messaging? All these escape the control of many of our competitors. Thus, they offer only limited "data loss prevention".

InterGuard Data Loss Prevention is superior because it can identify and protect sensitive information no matter where it's being accessed. It operates preemptively to keep your organization continuously ahead of today's constantly evolving threat landscape. InterGuard is installed at the desktop level and reports back over encrypted HTTPS protocols, instead of over the network. This is crucial since it streamlines the process of detecting and blocking any unauthorized attempts to move data outside the organization. Simply put, InteGuard builds a protective circumference around each computer in your organization, rather than just network traffic. This means InterGuard is more effective and comprehensive in securing your confidential data than network-based solutions.

InterGuard uncovers your risks by scanning all of the PCs in your organization to show you where confidential information resides (Data At Rest).

InterGuard prevents confidential Data In Motion from leaking out of your organization via webmail, attachments, web postings or USB devices.

How Data Loss Prevention Works

How Data at Rest Works

Single Agent Architecture:

InterGuard's patented Single Agent architecture allow you to identify, track, and control who accesses your data, what data they access, and what they can and cannot do with that data. Most importantly, all of this is done with an application that can be deployed and configured in a matter of minutes with a minimum of allocated resources. Other DLP solutions? They can take weeks or months to install, require training courses for policy creation and create significant strains (financial and operational) on the organization.

Confidential data is often lost through errors and oversights, rather than malicious intent. For example, the wrong recipient is mistakenly added to a group email containing sensitive company financial data or customer credit card information. InterGuard not only blocks the email from getting into the wrong hands, it is also configured to "coach and educate" employees to adopt due care and best practices, as set by your company. It lets users and administrators choose the appropriate tradeoff between a high detection rate on one hand and a low level of false positives on the other.

Removable Media Monitoring & Control:

InterGuard's integrated Removable Media Monitoring and Control strikes the ideal balance between protection of a business's assets and the efficiency of day-to-day operations. InterGuard blocks the copying of any file to removable media (USB drive, iPod, external hard drive) based on the file's content, and the employee's job function. So, an employee's computer or user profile can be set, using InterGuard, to allow copying of email, attachments and attempts to write to removable media, but not spreadsheets with confidential company financials. This is much more targeted and so more effective than competitive solutions, which frequently employ an "all or nothing" approach when it comes to removable media.

Easy to Use and Install:

InterGuard's patented software architecture runs on computers across the organization, even those computers that never connect to the corporate network. InterGuard can be installed in minutes, without the need for dedicated hardware, and managed centrally from any web browser. It is flexible and scalable. It can operate as on-demand Software as Service, or behind your company's firewall. InterGuard makes real-time security decisions to detect and prevent threats to the confidential data inside your organization.

DLP Features:

InterGuard is the leader in Data Loss Prevention software. You will be able to view and block sensitive data from leaving via email, web forms and removable media as well as data saved on local drives (even remote laptops). Policies you can easily customize via a wizard based on the user, computer or type of data.

Data in Motion - Email

Data in Motion - Email

Whether data is saved locally or is being transmitted via an email or removable media source.

Data in Motion - USB

Data in Motion - USB

Datalock can scan and block information from leaving your organization or from being stored in an unsecure manner.

Data at Rest

Data at Rest

Since DataLock is installed on the endpoint, it works just the same whether your PCs are on network, connected to the Internet remotely, or even if completely unconnected.

Simple Policy Creation

Simple Policy Creation

Customizable policies.

Real Time Notifications

Real Time Notifications

Receive email notifications.

Works On & Off Network

Works On & Off Network

As an endpoint agent, DataLock works whether PC is on or off network.

InterGuard User Interface (click on images to enlarge)

Policy Violations

Policy Violations

Override

Override

Policy Management

Policy Management

DLP Benefits:

  • Minimal upfront investment and simple licensing and ordering process
  • Quick deployment to jumpstart your business
  • Reduces administrative overhead to lower operational costs
  • Supports existing business processes
  • Grows with your needs
  • Reduces business risk by responding in real-time
  • Easily installs and deploys for low TCO
  • Generates increased value from current security investments
  • Helps ease regulatory compliance efforts with centralized analysis and reporting
  • Helps satisfy audit requirements
  • Ensures customer data privacy and integrity
  • Scales to thousands of customers or business units
  • Intergrates with Active Directory
  • Works in terminal server and Citrix environments

Technology:

InterGuard deploys and updates without requiring end-user involvement. Its small client footprint and low memory utilization do not impact end-user function or performance. InterGuard is installed silently and invisibly using any preferred software deployment tool. After that, InterGuard runs undetectably, so users won’t notice it operating on their computers, or be able to uninstall or disable it. InterGuard can be deployed in any size organization or government agency. All parameters can be customized. InterGuard is managed from a single management console, simplifying deployment and decreasing administration costs. This console provides detection, blocking, logging, auditing and alerting.

InterGuard is built on Awareness Technologies’ patented Single Agent technology. Once installed on each client computer, it operates invisibly and undetectably, executing locally all the functions of the software. This computing delivers high performance on each client without impacting the corporate network. The agent communicates using secure internet protocol, allowing all data to be accessed and settings configured using any web browser.

InterGuard delivers high performance on each client without impacting the corporate network.

InterGuard can operate either on a dedicated server within your organization, or on a fully-hosted central management and service provisioning platform. Delivered as a “Software-as-a-Service” (SaaS), it features an intuitive, Web-based user interface and uses robust and resilient fully-hosted architecture to support the management and protection of confidential data within your organization. InterGuard can easily be integrated with existing back-office systems to support existing business processes and provide a host of capabilities specifically tailored to increase the security of your data, all with minimal upfront investment and low administrative and support costs.

InterGuard generates comprehensive high-level reports on your organization’s computer activity, including on individual employees. This provides management and IT administrators with insight into whether or not employees are complying with security policy, and furthermore identify potential risks to confidential data. The reports provide valuable forensics through InterGuard’s log data and distributed infrastructure. This data provides security managers with knowledge about the nature of internal threats and potential responses, enhancing their understanding and control over internal challenges to the organization’s data.

System Requirements:
Hardware Requirements:
  • 733 MHz CPU or faster
  • 1238 MB RAM
  • 20 MB hard drive space
Software Requirements:
  • Windows XP
  • Windows 2000
  • Windows Vista

Videos:

Please click the video below to learn more about how InterGuard's Data Loss Prevention can hep your organization with internal data leakage:

DLP video

Frequently Asked Questions:

Q. Where do I log in?

Answer: You can log in at www.sonarcentral.com

Q: I can only see data from the last two days; how can I view older data?

Answer: By default, the user interface will show the last two days of data. If you would like to see data recorded prior to that all you need to do is expand the date range to show data beyond two days. When viewing Recorded Data or the Dashboard, you will see a 'To' and a 'From' date field on the top right side of your account window. Simply enter the desired dates and click the green 'Go' button. The window will refresh and display the new data based on your new date selection.

Q: I don’t see any screenshots; how can I configure the software to take screenshots?

Answer: The software has two utilities that can record screenshots of the monitored user’s activity; Smart Camera and Alert Words. Each requires that you configure settings to trigger screenshots. You may not see any screenshots, because there may not be any triggers configured in the Smart Camera or Alert Words settings.

You can configure either Smart Camera or Alert Words by going to the Settings section of your account and selecting Recording & Blocking. On the right of the Recording & Blocking page you will see several on/off switches for the various monitors, included Smart Camera and Alert Words. Make sure that the desired monitor is on. By clicking the Settings link next to Smart Camera or Alert Words you can configure their settings.

Q: How can I view data from only one user?

Answer: Your account has an Advanced Filter that can be used to narrow down the recorded data. You can use it to display only data from a specific computer or Windows user logon. To display the advanced filter while viewing Recorded Data or the Dashboard, click the “Advanced Filter” link located on the top right of the window. There are a variety of filter options with a drop down menu next to each. If you want to filter by computer, click the dropdown next to Computer, and select the desired name. If you want to filter by Windows username, do the same, but select the dropdown next to Logon. Then click the green Go button. Your Advanced Filter settings will remain in place until you log off your account or change the Advanced Filter Settings.

Additionally, when viewing Recorded Data, there is a grouping tool. The left most frame of the Recorded Data section displays grouping options. By selecting an item displayed in grouping, your Recorded Data will be filtered by those criteria. You can change the criteria in grouping by clicking the “Group by” button located just above the grouping frame. Amongst the various criteria, you will find a option for Computer or Logon. By selecting one of these options you can use grouping tool to display data based on computer or Windows username.

Q: Websites are not being blocked; how do I block websites?

Answer: The software’s website blocking feature is on by default, however you will need instruct the software as to what website to block. Go to the Settings section of your account and select Recording & Blocking. You will see several on/off switches for the various monitors, including Block Websites. If it is not already configured, click On next to Block Websites. This will open a new window where you can configure the software’s website blocking utilities. You can block based on website categories or by entering a website domain (facebook.com for example). The software can also be configured to scan the text of websites and block sites that contain words phrases that you have selected. Lastly you can configure the software to block all websites, and allow sites that you have selected. For specifics on each blocking utility please consult the user guide available in the help section of your account, or watch our instructional video by clicking here.

Q: How can I export my data?

Answer: When viewing Record Data, click on the “Export” button located above the grouping and summary frames, and then chose the desired export type and the desired format. There are two kinds of exports; summary and detail. The summary export is an overview that will provide the basic information about the recorded data, but it will not include details of recorded events. This export is very similar to what is displayed in the summary frame.

The Detail export will list each recorded event individually and include the details.

In the case of both export types, only the events that are currently being displayed according to your date and advanced filter settings will be exported. Please note that export only respects the date and advanced filter; it does not respect any grouping options. Data will be exported regardless of your Group By selections.

Q: How can I view summaries or reports of the recorded data?

Answer: If you are interested in summaries and reports based on your recorded data, take a look at the Dashboard in your account. The Dashboard contains a variety of different summaries and reports; we call these items Widgets. Each widget can be displayed in a variety of formats, graph, table, pie chart, etc.

There are six widgets displayed by default. However there are many more Widgets available to you. You can select which widgets you would like to display on your dashboard by clicking Manage in the Dashboard section of your account. A new window will pop up listing the available widgets in the left frame and the currently visible widgets in the right frame. Currently visible widgets are the ones that will be displayed on your dashboard. To add a widget to your dashboard select it from the Available list and click the right facing arrow. To remove a widget from your dashboard select it from the Currently Visible list and click the left facing arrow. When you are done adding or removing widgets, click the Ok button. For more specific details on each widget, please consult the user guide available in the help section of your account.

Q: How can I create different recording and blocking policies for different monitored users?

Answer: You can accomplish this by using Groups in your Recording & Blocking settings. Groups are a simple way to create unique Recording Options rule-sets and assign Windows users or entire computers to the each rule-set. This means you can designate unique recording options for each Windows user or group of Windows users, each computer or group of computers, or a combination of Windows users and computers.

To manage groups, go to the Settings section of your account and select Recording & Blocking. You will see a Groups section in the middle of the page. To create a new Group, enter the name of the new Group in the Add Group text box and click the Add button. New Groups contain no members. To add members to the group, highlight the desired Group then click on the Members tab on the right. This will display the members of the group, however if it is a new group it will be blank. To add members, click the Add Member Button. A search utility will open up that will allow you to search for computers or Windows users recorded by our software. Simply select the desired items and click the Add button. Users and computers can only be in one group at one time, so when you add a member to a group, that member is also being removed from its previous group.

Since each group has its own unique settings, simply apply the desired settings to your new group and only members of that group will be affected.

Q: How can I silently deploy the software to computers on my company network?

Answer: Awareness Technologies can build an unattended (silent) executable for your account. This unattended executable does not require any user interaction and will not display an installation wizard. It installs in the back ground and registers the software automatically. We offer an unattended executable so that you may have some flexibility in your deployment.

There are a variety of tools that an administrator can use to deploy executables to computers on their network. Just about all methods will work find with our unattended executable. If you don’t already have a deployment tool, we generally recommend PsExec which is available for free from Microsoft System Internals. It is a lightweight simple command line utility that doesn’t require any software to be pre-installed on the target computers. For more information on PsExec, please see the link below:

Please contact your sales rep or account manager for more information on how to obtain an unattended executable built for your account or for more information on using PsExec to deploy our software.

Q: How long does it take for recorded data to show up in my account?

Answer: After an event has been recorded the software will attempt to upload the data to your account right away. The amount of time that this takes will vary depending on the bandwidth and system resources available at that time, but generally it only takes a minute or two. If the computer is being used offline, recorded data is still captured and is stored until by the software until the computer goes back online.

Different data types are recorded at different intervals, so some data types will show up in your account sooner than others. For example, websites are recorded when the user leaves a website or when the internet browser window is closed while keystroke records are updated every several minutes, therefore it is possible to see a recorded website show up in your account before any keystrokes recorded from that same user activity.

Q: How long is the data stored in my account?

Answer: All of the recorded data is stored in your account for at least 14 days at no charge. It will remain in your account until it becomes 14 days old, or until you delete it. If you want to keep the data longer, you can purchase Data Storage subscription. Data Storage can be purchased in your account by going to the Settings section and selecting Subscriptions.

Q: How do I change my password?

Answer: To change your password, go to the Settings section of your account and select User Access. Click the Edit Password button.

Documentation:

Download the DLP Overview (PDF).

Pricing Notes:

InterGuard Data Loss Prevention
Data Loss Prevention
InterGuard DLP, 1 Year, 1-10 Users
*Price per user. Minimum quantity is 1.
#ATIDLP-ARR-1-10
Our Price: $127.00
InterGuard DLP, 1 Year, 11-25 Users
*Price per user. Minimum quantity is 11.
#ATIDLP-ARR-11-25
Our Price: $99.00
InterGuard DLP, 1 Year, 26-100 Users
*Price per user. Minimum quantity is 26.
#ATIDLP-ARR-26-100
Our Price: $87.00
InterGuard DLP, 1 Year, 101-500 Users
*Price per user. Minimum quantity is 101.
#ATIDLP-ARR-101-500
Our Price: $77.00
InterGuard DLP, 1 Year, 501-1,000 Users
*Price per user. Minimum quantity is 501.
#ATIDLP-ARR-501-1000
Our Price: $67.00
InterGuard DLP, 1 Year, 1,001+ Users
*Price per user. Minimum quantity is 1,001.
#ATIDLP-ARR-1001+
Our Price: $57.00