The C.A.F.E. principle
The large number of devices used to store data, launch software and open files can pose threats. Notebooks, tablets, smartphones, external hard disks, USB drives and even digital cameras can be used as data storage. More and more employees use not only corporate devices, but also their private once within the network – this phenomenon called “bring your own device” (BYOD) is a rather hot topic at the moment. While the high flexibility and variety of devices is very convenient for the users, this situation is a nightmare for any IT-security officer. Companies are not only facing a great variety of devices, but also deal with all kinds of data paths – users transport mobile devices, transmit data via the internet, use cloud services or communicate via today’s modern communication platforms, such as Skype. Protecting all of these data paths poses great challenges.
C.A.F.E. Management – comprehensice security and efficient systems operations
The C.A.F.E. Management principle focuses on all devices and all data paths and solves the data security problems through the intelligent combination of the following functionalities:
CONTROL: Defines which user is authorized to use which data paths. Only those employees who need sensitive data for their work have access to these data.
AUDIT: Logs provide evidence if users violate laws and regulations to ensure that they handle data with care – an important requirement to ensure IT compliance.
FILTER: Separates critical data types from uncritical ones and blocks data types that are unwanted within the company.
ENCRYPT: The C., A. and F. components ensure that only authorized employees have access to data and applications which are relevant for their work. 100% all-round protection is provided by encrypting authorized data, since encryption also protects against intentional data theft or the negligent loss of data.
MANAGEMENT: The intelligent central management ensures the easy installation and administration of functionalities and a high degree of usability. This integrated and efficient security principle is complemented by antivirus software, mobile device management functionality, the integration of iOS and Android devices, secure cloud applications and power management.