Data Loss Prevention

BLACKbox is India's ultimate Data Loss Solution for Small and Medium Enterprises. This video demonstrates how accidental or intentional deletion can stop the business continuity of an enterprise. It also demonstrates how to identify users who intentionally delete data to disrupt the enterprise's operations.

To understand how BLACKbox prevents data loss, let us first understand the situations that can cause data loss or business discontinuity.

 

Situations

Situation 1 : The Accidental or Intentional Deletion of data

A user can delete data accidentally or intentionally and disrupt your operations. You wonder who deleted it and when it was deleted. We are 100% sure that 99% of enterprises can't instantly recover data deleted by users and can't determine who deleted the data from network drives. Think about your enterprise. Are you among those 99% vulnerable enterprises?

Situation 2 : A Ransomware Attack.

Though you might have provided all possible defence in terms of firewall or antivirus, there is always a zero-day break out when ransomware breaks out, and your data is encrypted. We are 100% sure that 99% of enterprises can't recover data after ransomware strikes and re-do the work. Think about your enterprise. Are you among those 99% vulnerable enterprises?

Situation 3 :  Accident, Disaster, or Hardware Failure

A disaster, laptop theft, or hardware failure can lead to data loss. We are 100% sure that 99% of enterprises still need a set process for laptop backups and automated out-of-premise backups. Think about your enterprise. Are you among those 99% vulnerable enterprises?

If you own BLACKbox, you are one of that 1% of enterprises unaffected by accidental or intentional deletion. BLACKbox maintains an Active Global Recycle Bin, which is not accessible to users and is accessible only to the admin. You can instantly restore deleted data. Not only that, but also, you will be notified who deleted the data. We are 100% sure that 99% of enterprises do not have this facility and suffer. Suppose users delete the data intentionally or accidentally. If you own BLACKbox, you are one of the 1% of enterprises that do not lose data due to ransomware, even if their firewall or antivirus fails. BLACKbox maintains two data zones for your data: a bit-locked zone, known as Vault and an un-bit-locked zone, known as Workspace. Every day, it facilitates two processes. Firstly, manually or automatically, BLACKbox can move unused files for a certain number of days to Vault, but it is still accessible to users. Secondly, BLACKbox files the entire Workspace (where users are working) on a time machine, say, today, yesterday, one day before yesterday, two days before yesterday and so on till you want. Let's say ransomware strikes; your vault data is unaffected as it is in the bit-locked zone. Your workspace data will be affected. No problem; you can shift the entire Workspace to yesterday and continue your work with minimum data loss. We are 100% sure that 99% of enterprises are not prepared to deal with post-ransomware situations. There needs to be more than an antivirus or firewall. If you own BLACKbox and subscribe to its DCDR and duo facility, you are one of that 1% of enterprises unaffected by Disaster, hardware failure and laptop theft or damage. With an optional subscription to our DCDR services, a backup of BLACKbox, server, or laptops is sent out of the premise in compressed and encrypted form. Only the designated person will have a decryption key to restore the data. We are 100% sure that 99% of enterprises do not have automated systems to preserve their data out of premises.

Who Should Buy it ?

Features of BLACKbox With Data Center for Disaster Recovery

Selective Data Backup of Servers

BLACKbox software connects to the BLACKbox data center and regularly takes backups of selected data on servers with versioning. If the server is crashed or infected, the enterprise can recover data from the data center. If the server is infected by ransomware, the enterprise gets previous versions of data to minimize downtime.

Admin Access to Data at Central Location

Admin role at the enterprise can check the data backup in a single screen for all the servers, restore selected data for designated user/application, and go backwards on the previous version for specific data files for designated laptop.

Team Vision & Mission | Advisors

 

BLACKbox Duo, BLACKbox Duo Lite and BLACKbox DCDR can be used for Data Loss and Theft Prevention on laptops and provide disaster response facilities. Many SMEs have large files generated by specialized software they use. Such large files require extraordinary resources like BLACKbox Turbo or BLACKbox Twin Turbo, our technological applications for SSD caching through BLACKbox SSD Cache.

 Difference

 

Console Not Being bought

1. “support@blackbox.in” needs to be contacted to register a new mobile device.

2. “support@blackbox.in” needs to be contacted to define/modify any policy in personal and professional profile and change.

Console Being Bought

1. A new mobile device can be registered by the client.

2. Client can define policies for personal and professional profiles.

BLACKbox M-Duo

M-Duo helps organizations achieve business continuity goals by

  • Indian Enterprises have a growing population of smartphone users who carry enterprise data and work on them.
  • Most users access enterprise email systems through Mobile Phones or Tablets. These mobile phones or tablets can be company-given or BYOD (bring your device).
  • These mobile phones, owned by a company or employee, contain sensitive information and the IPR of the Enterprise.
  • Leakage (Theft) of these digital assets from mobile phones or tablets will damage the Enterprise’s competitive interests.

Online Backup of Branch Office Computers in the Data Center with Versioning for Professional Drive

BLACKbox software connects to the BLACKbox data center and regularly takes backups of data on branch office computers with versioning. The enterprise can recover data from the data center if a branch office computer is stolen, crashed, or infected. If a branch office computer is infected by ransomware, the enterprise gets previous versions of data to minimize downtime.

Features of BLACKbox M-Duo

BLACKbox M-DUO VALUE PROPOSITION FOR BYOD

BLACKbox 3D is a server-side deployment, and BLACKbox M-Duo is a device-side deployment. M-Duo controls native email applications, data storage, and mobile phone or tablet internet browsers. Attachment or email data is always stored on the enterprise storage part of the device, which cannot be accessed from personal email, browser, etc. This solution is more effective and gives more control when the company owns the device and is loaded with pure Android. We recommend Samsung phones loaded with an OS above 4.3 for the best results and the highest controls. If the company owns a mobile, we can provide extra controls on the camera and VPN and enforce enterprise policies for devices owned by the company.

BLACKbox M-DUO VALUE PROPOSITION FOR ENTERPRISE OWNED ANDROID OR SAMSUNG PHONE

Restrictions on Camera, Video Recording, Audio Recording, Screen Capture, Configuration of Personal Email Accounts, USB data transfer, Bluetooth Data Transfer, Usage of SD Card, Usable Applications, Internet Site Restrictions, Predefined VPN, and Custom wallpaper can be exercised. This requires factory resetting the phone.

Execution Strategy

Our execution strategy incorporates proven methodologies, qualified personnel, and a highly responsive approach to managing deliverables. Following is a step-by-step narration of BLACKbox implementation.

Project Deliverables and Execution Steps

Software Activation: On receipt of the PO and payment, the software will be activated in 2 working days.

Data Readiness: During the above delivery period, the customer must arrange for mobile devices loaded with Android 5 or above, iOS 6 or above and Samsung 4.3 or above.

Device Profiling: Post-activation of BLACKbox M-Duo, the agent will be installed remotely, minimum policy will be deployed on BYOD devices / iOS devices, or full policy will be loaded on company-owned Android / Samsung devices. For Enterprise owned mobile devices, profiling will be done for desired restrictions on mobile phones.

Ongoing Call Center Support: Post installation, customer can contact the STPL call center for remote support.

How does BLACKbox Turbo T help enterprises achieve business continuity goals?

BLACKbox Turbo T helps organizations achieve business continuity goals by

  • Forced Centralization of Data
  • Automatic Backup and Versioning of Data
  • Pushing the Data-on-Data Center to provide for Disaster Response

How does BLACKbox Turbo T help enterprises to ensure competitiveness?

BLACKbox Turbo T helps organization to ensure its competitiveness by

  • Protecting Data Theft over USB, Email, or the Internet
  • Enabling organizations to devise systems that can detect Data Theft attempts

How does BLACKbox Turbo T help enterprises maintain business continuity in the event of hardware failure?

BLACKbox Turbo T helps an organization maintain business continuity even with hardware failure

  • By bundling twin devices of identical configuration over direct network cable connection with real-time syncing of devices
  • By in-built Breath on Breath Technology to instantly switch over to a redundant device in the event of hardware failure of the primary device