itWatch stands for IT-security software ”Made in Germany” without backdoors and no third party code. itWatch is focused on Data-Loss-Prevention, endpoint & mobile security, encryption, cost-reducing added values and easy-to-use security solutions. With the patented itWatch security solutions your data is protected against theft and unauthorized access. Compliance, security awareness in real time and efficient tools for system management all come from a single source with central management - multi-tenant.
The products of itWatch always support the already established customer processes. Most comfortable usage of IT-security within all processes for all IT-users is top priority. The solutions of itWatch are characterized by global unique selling propositions. The itWatch Enterprise Security Suite (itWESS) comprises Device, Port, Application, Content, Print and Media Control together with features such as ”secure delete”, encryption, cloud security, and many other security elements around.
itWatch Enterprise Security Suite (itWESS): itWESS combines 14 modules for device, port, content, media, application, risk, print control and solutions for encryption, endpoint security, Data Loss Prevention (DLP), technical enforcement of data privacy and technical support GRC by the use of security awareness in real time., E.g. content-filtered and encrypted USB control incl. protection against BadUSB. Automation is part of itWatch security solutions to achieve cost saving value adds at operation. Cost-efficiency is the driving factor for the development. itWatch products do not only cover endpoint security aspects but also server and infrastructure to implement topics like DLP, compliance and data privacy actively and cost efficiently with real ROI.
itWash - data lock with data wash identifies potential harmful data at 100% and "washes" the incoming data by extracting and converting the potentially malicious part. The potentially malicious originals are optionally stored as evidence in a special pollution zone.
a mobility solution for all security classes. bootable work environment from the crypto USB stick allows full mobility of your individual workplace and data incl. secure patch management and all functions necessary for operation
the protection of the crown jewels against unauthorized access - even against IT Administrators and IT staff - nevertheless standard activities like backup recovery can be done easily.