Their worst fears were realized when they became aware of content breaches, and they knew they had to quickly find a better way to secure their 300+ workstations and remote employees’ laptops. The breach revealed that the manufacturer needed a solution that would allow them to control the usage of USB devices, and provided better visibility into the entire network’s activity. The firm chose to implement Interfocus.
Our defense industry client introduced Interfocus on employee laptops and immediately realized two key benefits:
- Administrators had complete visibility into what was happening throughout the network. Interfocus Activity Logs were used to view compliance report compromises. These reports provided information on file access, including who opened the file, at what time, and what they did with the file (open, modify, rename), so the firm could take immediate corrective action.
- Interfocus also helped control USB usage. The company was finally able to control (choose whether to set to block or restrict to read only) individual external devices and identify data copied to (and from) external USB drives.
Our client now has a complete solution to uncover, analyze, and quickly remediate today’s complex and dynamic security threats. With its comprehensive and easy-to-use dashboard, Interfocus supports their endpoint security life cycle from management through detection, investigation, and mitigation.
Ready to identify and stop threats where they start—at the endpoint? Learn more about Interfocus.