Compliance Commander – Sentry Print

Features

Complete Protection

Compliance Commander is the only unified solution which protects all ports, protocols, and applications, known and unknown, against confidential data leakage, including:

  • Email / SMTP
  • HTTP (includes web mail)
  • Instant messaging
  • FTP
  • Peer-to-peer (P2P)
  • Telnet
  • Proprietary applications
  • All other ports and protocols, known or unknown.

All file attachments, including Microsoft Office and all other document types (.doc, .ppt, .xls, .pdf, .txt, etc.), are also protected.

Our proprietary Dynamic Application Detection™ technology ensures that your network is future-proofed against any new applications and protocols which may find their way into your network.

Flexible Policy Enforcement

Compliance Commander hands flexible policy enforcement to the administrator. Sensitive content can be simply monitored whereby an event is logged and an alert is sent to the administrator. More effectively, confidential information, such as Social Security numbers, names and addresses, and account numbers, can also be blocked, thereby avoiding violations in the first place. 

Integrated Encrypted Email Server

Compliance Commander's Sentry now includes the integrated Encrypted Email Server which can be optionally enabled to handle only email that contains sensitive data.  Sentry acts as the intelligent gate-keeper for seamlessly handing-off sensitive emails it receives to the Encrypted Email Server.  The Encrypted Email Server then applies appropriate security and encryption to ensure that the outbound content is protected while on public networks.  The process is fast and simple for both senders and recipients.  It works with all email applications and does not require any client software.

Powerful Management Capabilities

Provider™ Smart Client and Web Browser Interface

  • Flexible interface means that administrators can access Compliance Commander from anywhere.
  • Supports multiple administrator accounts with flexible access permissions so that privileges can be granted on a need-to-have basis.
    • Multiples roles with any number of users can be created, each with their own access privileges.
  • Real-time monitoring and event dashboard with customizable alerts.
  • Tree Builder™ allows layered, customized sorting of event data for quick and easy analysis.

Audit and Remediation

  • Ticket Management System tracks violations and manages the remediation process so that common “security holes” can be readily identified and fixed.
  • All events are logged and can be audited for forensic analysis. Events can be sorted, prioritized, and tracked, as part of a complete workflow management process.
  • Case management tool enables administrators to collect similar events and to create a case for further investigation and remediation.

Hierarchical and Revision Managed Policies

  • Support for hierarchical rules makes enforcing consistent policy across large organizations easy and scalable.
    • Makes management of remote and branch offices simple and scalable.
  • Revision management creates a clear audit trail for changed rules and policies.

Powerful Reporting

  • Executive reporting capabilities, using graphs, charts, trends and tables, give high-level summaries for verifying regulatory compliance and for identifying security issues.
  • Business unit reporting addresses mid-level reporting requirements.
  • Flexible and customizable capabilities support demanding IT management reporting.
  • Branch office reports enables compliance reporting on a “location by location” basis.

Flexible Deployment Options

Both hardware and software deployments are offered so that customers can standardize on their own hardware vendor. Software deployment can also provide a more cost-effective approach for organizations which are quickly growing and may soon need to upgrade to larger infrastructure.

Regulatory Compliance

  • Sarbanes-Oxley
  • Gramm-Leach-Bliley Act (GLBA)
  • Payment Card Industry (PCI)
  • CA-SB1386
  • HIPAA

“Content Monitoring and Filtering tools reduce exposure and are useful for forensics, and reports can demonstrate compliance with privacy policies or laws.” - Gartner.

Compliance Commander is a resilient solution for identifying and blocking customer data leaks, which can include: Social Security numbers, names, addresses, account and credit card numbers, or any other confidential information in your databases. The Ticket Management System is an effective tool for managing the remediation process of security issues. Also, compliance violations will readily be identified, thereby improving the transparency of your network security issues. With Compliance Commander’s unified protection architecture, you can rest assured that all ports, protocols, and applications will be protected against customer data leaks- now and in the future - as new applications, wanted or not, hit your network.