Contact us
Free Trials

Endpoint Data Protection

Everything runs as before, but securely. Comprehensive protection for all your devices, applications, and sensitive company data.

Explore why Matrix42 Endpoint Data Protection gives you the security you need


Secure Endpoints – Secure Data – Higher user productivity

Comprehensive endpoint protection


Access all the defensive tools you need to protect your endpoints. Data is automatically encrypted against unauthorized users. Unsecure access and applications are automatically blocked. Through transparent displays of all the dataflows within your company, you can detect abnormalities, weaknesses, and initiate behavior-based countermeasures.

Safety without disruption


Protects your business without changing the way you work. Users will not experience any interruption to their workflow and your IT team will not be burdened with additional training. This is popular with users and relieves your support and IT teams of additional tasks. Everything runs as before, but at a higher security level.

Transparent Security


Secure Audit enables detailed dataflow visibility and shows possible weaknesses in the protection settings. Using forensic analysis, IntellAct evaluates the facts collected by Insight Analysis and can automatically trigger appropriate protective measures.

CAPABILITIES

Control where and by whom your data is used


With a single mouse-click you get access to a graphical overview of all dataflows in the network and the ability to automatically trigger appropriate protective measures.


  • Insight Analysis: Determines the overall status of your company network with regard to data security so that you can apply the optimal protective measures. The analysis results are available to you within a clearly structured dashboard. Conclusions cannot be drawn concerning the activities of individual users. The relevant insight reports can be generated automatically and sent by e-mail.


  • IntellAct Automation: Analyzes the insight and audit data for you and triggers appropriate protective measures based on pre-defined rules. It also offers the option of comparing the data with normal values to automatically identify anomalies or critical situations. This automation simplifies work for administrators and significantly reduces response times. Integration into the Matrix42 Workflow Studio allows you to trigger further actions and processes depending on network status.

Full control over all devices, interfaces and cloud data


Monitor and control the use of devices (e.g. USB sticks, CDs, printers) or interfaces (e.g. Firewire, USB) on endpoints to ensure the security of your data. Audit-proof according to Basel II, Sarbanes-Oxley and PCI compliant.


  • Effective device access control: Protects you against attacks and access right abuse. Define who can use which devices (e.g., USB sticks, CDs, TV tuners) or interfaces (e.g., WLAN, Firewire, USB) and to what extent. You not only prevent misuse and data loss, but also stop malware from entering the corporate network via the interfaces (e.g., BadUSB).


  • Access control for cloud services and storage: In the cloud, data is accessible everywhere. With Cloud Access Control, you control which employees can use which cloud services and to what extent.


  • Keep data transfer channels under control: Data can be transferred in many ways, in addition to the official corporate network, such as via Bluetooth, WiFi, Smart Phones and USB-Devices. Device & Access Control lets you control which employees have access to which data transfer devices, i.e., the routes via which data leaves your company.

Transparently trace data flows and detect weak points early on


Audit provides real-time visibility into data flows within your organization, identifies vulnerabilities and documents forensic information to ensure compliance.


  • You meet the requirements for logging of the EU General Data Protection Regulation (EU-GDPR articles 30, 33) and at the same time protect the personal rights of your employees. The logging data is protected by the 4- or 6-eye principle (in compliance with the relevant personnel).

You retain control over all your applications - shadow IT is history


  • With Application Control you determine which users are allowed to open which programs.


  • You also successfully put a stop to shadow IT. You prevent malware from entering the company network via your endpoints through unauthorized and, above all, incorrectly licensed installations.


  • In this way you avoid liability risks and financial penalties during audits. Many viruses can also be blocked in this way, usually faster than anti-virus solutions can detect them.

Control with data encryption


Seamless Anywhere Encryption protects storage media, directories, clouds, individual files or entire hard disks on-the-fly, without adversely affecting user productivity. You determine which authorized users are granted access. With the mobile app, your data can be decrypted on external devices and in the cloud on mobile devices or external systems. Additional authentication protects encrypted hard disks when removing hardware or bypassing Windows logon. In this way, you also guarantee the protection of personal data in accordance with EU-GDPR Article 32.


  • Cloud Storage & Network Share Encryption: Encrypt folders and files in cloud storage (e.g. Microsoft OneDrive, Google Drive, Dropbox) or any shared network. The encryption keys remain in your organization and are never stored in the cloud, a distinct advantage over encryption solutions offered by cloud storage service providers.


  • Full Disk Encryption: Laptops can be lost or stolen and your sensitive data remains protected. Full Disk Encryption ensures that only authorized users have access to the device and data. Smart cards and eTokens can be used for increased security. Full Disk Encryption is FIPS 140-2 Level 1 certified and supports Advanced Encryption Standard New Instructions (AES-NI).




  • Permanent Encryption: Encrypt files no matter what the medium (external storage media, network, local hard drives, cloud storage, etc.) Encrypted data remains encrypted even when transferred via other transfer channels (e.g. as an email attachment or web upload). You can easily reopen the data on third-party and mobile devices using a password or PKI token through the Mobile Encryption Component. 


  • Local Folder Encryption: Protects your data in case of device or storage media loss, but also where several users have access to the same device. Sensitive data is also protected against access by employees with administrator rights.


  • Removable Device Encryption: Mobile storage devices, such as USB flash drives, are getting smaller and more powerful, making them increasingly easy to lose or steal. With Removable Device Encryption, files are protected with methods that can be combined in multiple ways, ensuring that data cannot be accessed by unauthorized users.


  • Android & iOS Encryption: iOS and Android devices provide file-based protection of internal storage, storage cards and cloud accounts. Decryption is enabled by entering a password.


  • Preboot Authentication (PBA): The door stays closed - prevent Windows logins and associated encryption from being manipulated or bypassed by starting USB/CD, or replacing the operating system. In case of theft, this also prevents any bitlocker protection from being levered out during startup.


ADD-ONS

Increase your productivity

Matrix42 is a member of

Get Your 30 Days Free Trial

Try for free.

Matrix42 Endpoint Data Protection

Start your free trial

SUCCESS STORIES

Case Studies of satisfied customers

Company Logo Bayerisches Zentrum für Angewandte Energieforschung e. V. (ZAE Bayern)
Case Study
Protection against sophisticated cyber attacks