How your USB port or Dragon port leaks valuable data
Journey to Blue Ocean
Journey to Blue Ocean, in CEO’s words
April 26, 2019
The 20 Fastest Growing Companies in India
The CEO Magazine – 20 Fastest Growing Companies in India
May 10, 2019

How your USB port or Dragon port leaks valuable data

data theft prevention

Dragon symbolizes blessed and enormous power by your side.
Have you noticed that in last 10 years all the devices we use are seamlessly inter-operable with one another by an amazing invention which world knows as USB ports?

It is a mighty “Dragon” Port in true sense.

Power charging, digital signatures, WiFi dongles, keyboards / mouse, data portability, screen projection, camera, entertainment and so on, this is a silent dragon on our side, we love it. Every device we use is empowered by this dragon port.

Today’s challenges of competitive business requires this Dragon to be tamed and trained especially when you have signed NDA with your customers or you generate IP of designs drawings software code or you have business secrets in digital form.

If your dragon is blind and dumbit harms more than it helps.
In enterprise environment you have to tame and train this dragon LIVING on your mobiles, tablets, laptops and desktops.

The new BLACKbox Prime T does it seamlessly on your dragon ports by dividing them in three categories.

Category A : “Harmless” Dragons

BLACKbox tames these dragons to allow only harmless devices like keyboard, mouse, printer, plotter, etc. This will not allow any transfer, but will allow power charging. This will ensure no possibility of Data Theft through these dragon ports. 85 percent of your users will be riding these harmless dragons.

Category B : “Mean” Dragons

BLACKbox trains these dragons to allow digital signatures, dongles, pen drives, camera, mobile phones, tablets, tokens to function and restrict data flow direction to inward only. They are mean dragons taking in anything but giving out nothing. This will ensure no possibility of Data Theft through these dragon ports. 10 percent of your users will be riding these mean dragons for GST or statutory filings, inwarding data files from suppliers / customers or usage of internet dongles.

Category C : “Say it All” Dragons

BLACKbox trains these dragons to remember and report everything they have done. They will allow outward direction of data flow from your devices, but will report what was copied or taken out. 5 percent of your trusted users or top management users will be riding these dragons for submitting data to your vendors, customers, consultant, external backup or charter accountants. 

Our team has shot this video to explain this concept. Pls check this video link and subscribe to our YouTube channel for more.

Best regards,
Vishal Shah
Founder and CEO,
Synersoft Technologies Pvt Ltd

Leave a Reply

Your email address will not be published. Required fields are marked *

Demo

Want to know More?

Ask for Demo








    captcha

    Check

    IT INFRASTRUCTURE AUDIT

    Reality Check Voucher worth INR 20000 NOW FREE

               








      captcha

      Open chat
      Synersoft Technologies Private Limited
      Hello 👋
      Can we help you?