Welcome to the Data Protection Demo Center. Here you will find a series of On-Demand videos that demonstrate the power and flexibility of our Data Protection solutions and products. In a few short minutes we’ll answer these questions for you: What is it? How does it work? How can I use it in my environment?

Demo-in-Detail

These 15-20 minute demo-in-detail videos walk you through the entire step-by-step process of how the Lumension® products and solutions will make your endpoints more secure and productive.

Lumension® Device Control

Follow our Product Management team as they walk you through the Lumension® Device Control guided demo. Learn how to mitigate intentional and accidental data loss to meet compliance while not impeding your day-to-day business operations. Go through the step-by-step process of: discovering every device connected to your endpoint, assessing your security policy needs, implementing your security policies based on groups and exceptions, and monitoring and reporting on your compliance.

Click to Play

Get Your FREE TRIAL


Solving Your Business Challenges

These 5-10 minute video vignettes address specific business and security challenges that the Lumension® products and solutions can help you address.

Securing Your USB Flash Drives

Challenge: USB flash drives can help make us more productive, but can result in data loss or theft. Organizational policies governing their use are difficult to enforce.

Question: How does one provide users with a simple way to encrypt USB sticks?

Solution: Lumension Endpoint Management and Security Suite: Device Control - Encryption -- protects against accidental loss or theft of data on removable storage devices.

 

Practical Policy Implementation

Challenge: Rolling out a new security capability is difficult and risks either leaving gaps -- which may result in data leakage -- or inadvertently impacting user productivity.

Question: How does one roll out a new removable device security regime appropriately?

Solution: Lumension Endpoint Management and Security Suite: Device Control - Global Policy - start in “audit mode” and roll out your security policy in methodical manner, adjusting as appropriate as you move forward.

How to Grant or Deny USB Access in
Less than a Minute

Challenge: USB flash drives help make us more productive, but could result in data loss or theft -- and many tools used to control access are either too simple or too complex.

Question: How does one get control over USB stick usage without resorting to drastic measures?

Solution: Lumension Endpoint Management and Security Suite: Device Control - Access Control -- granular control of port and device access using a powerful yet easy-to-use Wizard-based workflow.


Controlling Device Usage

Challenge: USB flash drives help make us more productive, but unconstrained use could result in data loss or theft.

Question: How does one create and enforce security policies regarding the use of removable storage devices?

Solution: Lumension Endpoint Management and Security Suite: Device Control - Granular Control -- building on a years of experience and customer feedback to provide a deep set of capabilities.

Avoiding Device Blind Spots

Challenge: Removable storage devices like USB flash drives and CDs / DVDs are powerful, productivity-enhancing tools -- but their use within organizational networks is largely unseen and unknown. This could result in data loss or theft.

Question: How does one gain visibility into device usage within the organization?

Solution: Lumension Endpoint Management and Security Suite: Device Control - Device Discovery - provides the visibility needed to understand what devices are in use by whom and where.


One Suite Solution

All of the above product modules and solutions are delived via the Lumension® Endpoint Management and Security Suite.

Lumension® Endpoint Management and Security Suite

Spend 30 minutes with Rich Hoffecker, Sr. Product Manager, as he walks you through a guided demo of the Lumension® Endpoint Management and Security Suite platform. Learn more about the underlying technology that delivers a complete, multi-layer endpoint security solution and get a detailed walk-through of core platform features, such as the Dashboard, Installation Manager, Asset Discovery and Agent Deployment, Integrated Management Console, Inventory Management, Endpoint Management, Remote Systems Management, Active Directory Sync, Wake-on LAN, Endpoint Policy Management, and Reporting.

Click to Play

Get Your FREE TRIAL