You think you are safe, don’t you? You use “encrypted” USB keys for your data transfers – who would dare to open them? Safeguard your computer with encryption software and strong passwords. Through the firewall, through the router – you are invincible! Or maybe not. Computer threats evolve fast.
According to Symantec’s Internet Security Threat Report (ISTR), in 2010 alone, 89% of computers worldwide have been exposed to at least one malware attack. In 2011 this number was expected to increase again. This will probably result in an increasing amount of business data being sent from employees’ laptops via USB sticks and mobile phones over insecure networks to corporate domain-based servers. It is becoming more and more difficult to protect this data from being copied or deleted in a way that allows easy recovery. You need to have salesforce data recovery and backup and use it in the best way.
Data protection is a top priority for any company. According to the latest US National Cyber Security Alliance study, 47% of respondents have had personal information stolen in the last year, resulting in losses of between $100-$500k per person on average. The network security market size was an estimated $42 billion in 2010. This number is expected to increase significantly over the next few years due to the increasing number of people working remotely (estimated at 4-5 million by 2014) and hence needing access to corporate domains while abroad (via Virtual Private Networks or insecure networks). With an increased number of data loss incidents in the news, companies are increasingly looking to protect their information using data loss prevention (DLP) software.
The bad news is that current DLP tools require you to scan your computer or smartphone before bringing it onto an internal network, which means you need to know what kind of data you have and where it is located on your device. And knowing what’s on your laptop can be very difficult, especially if you share a computer with other family members such as teenagers who install lots of programs and then forget about them after they’ve moved their friends’ videos off into oblivion.
But there is good news: we developed Remobo — a new approach for establishing trust between computers/smartphones when trying to communicate with each other. Remobo lets you know what kind of data is being transferred when computers/smartphones try to connect before any actual data can be leaked and gives complete remote control over howhow the target computer operates after establishing trust. This means that if your laptop is ever stolen or compromised somehow without you realizing it, authorities will be able to access only the files you want them to access.
How does Remobo work?
Computers have profiles listing the programs installed on them and their hash value, a unique identifier for each program version. When two computers establish connectivity between them, they exchange these automatically and use this information to decide the level of trust they have for one another.
Let’s look into how this works in more detail. Say that you are working on your laptop at home while your kids watch TV next to you. Suddenly, Remobo detects an IP address trying to communicate with your computer. It sends a request to the server asking if the new IP can connect with your computer/smartphone based on its profile (i.e., whether or not it contains any malware).
The server checks its database and returns a response indicating what the new IP has permission to do (i.e., install programs, access files, etc.). If everything looks kosher, Remobo gives you full control over how this connection will be conducted by giving.