Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 11 December 2009

DeviceLock now thwarts data leakage via iPhone and Blackberry local syncs

Posted on 06:45 by Unknown

Moscow, Russia – November 2009 – DeviceLock, Inc., a worldwide leader in endpoint data leak prevention software solutions, today announces that version 6.4.1 of its DeviceLock® software now delivers highly granular, interface-independent control over local data synchronisations between iPhone® and iPod® touch mobile devices and corporate endpoint computers like desktops and laptops. DeviceLock 6.4.1 also includes device presence detection, access control and logging for BlackBerry® devices.

With iPhone and BlackBerry support, DeviceLock delivers an unprecedented level of control for local synchronisation between DeviceLock-protected computers and most popular business-level smartphones including Windows Mobile®, Palm®, iPhone, and BlackBerry platforms.

“There are many legitimate reasons for an employee to connect a smartphone to their office PC and run a local synchronisation for data transfer. However, anyone with an illegitimate purpose in mind, like data theft, knows that such transfers completely bypass the corporate network and cannot be controlled by network-based security solutions,” explained Ashot Oganesyan, DeviceLock CTO and Founder. “An all-or-nothing approach – when all smartphones are either allowed or prohibited to sync locally with a particular computer – is too risky. The ‘all’ setting risks security, the ‘none’ productivity. You need a means of defining and enforcing permissions on a more flexible, granular basis. Our customers already count on DeviceLock for permissions-based management of removable storage devices, so it’s a natural extension to cover local syncs by smartphone platforms. With DeviceLock in place, organisations can impose a “least privilege” mobile device policy that limits data exchanges to only specific smartphones and to only the types of data required for an employee to carry out their business duties.”

Featuring a patent-pending local synchronisation filtering technology, DeviceLock gives security administrators the ability to centrally control which types of data specified users or their groups are allowed to synchronise between corporate computers and locally connected mobile devices including Windows Mobile, Palm, iPhone, and iPod. In addition, device presence detection, access control and event logging is also supported for BlackBerry® smartphones.

For Windows ActiveSync®, Windows Mobile Device Center, HotSync® and iTunes® protocols, DeviceLock can recognise and filter numerous data object types, empowering administrators to selectively allow or block the synchronisation of files, emails, email attachments and accounts, contacts, tasks, notes, calendar items, bookmarks, and various media types. For Windows Mobile devices, permissions can also be defined for remote installation and execution of applications.

Time or schedule-based policies, as well as data flow direction control can also be enforced for local synchronizations to allow corporate security policies to be more flexible, precise and dynamic. DeviceLock detects the presence of any supported mobile device regardless of its connection interface. Smartphones that connect through a USB interface can be identified and white-listed with fine granularity, even down to the level of a unique device.

For organizations of any size and industry, DeviceLock software proactively protects endpoint computers against local data leaks and malware infiltration resulting from insider negligence, accidental mistakes or malicious actions. It enables IT security personnel to precisely control, log, shadow-copy and audit end-user access to all types of local ports and peripheral devices, including personal mobile devices, as well as local and network printers. Complementing its port, device, and data channel-based controls with data type-level security, DeviceLock supports true file type detection and filtering. This function works by intercepting any file system’s read/write operations with peripheral devices, performing real-time analysis of the entire binary content of transmitted data, and enforcing applicable file-type based security policies. DeviceLock also integrates with leading encryption products from PGP, Lexar, SecurStar, and TrueCrypt in order to protect data on removable storage devices. In addition, DeviceLock blocks operations of USB and PS/2 hardware keyloggers.

DeviceLock provides scalable, centralised, and easy-to-learn management and administration via a Microsoft Management Console (MMC) that natively integrates with Group Policy Object Editor in Microsoft Active Directory. DeviceLock agents can be deployed, managed and administered completely from within an existing Microsoft Active Directory domain. A separate component, the DeviceLock Enterprise Server (DLES), is available for centrally auto-collecting audit and shadow data from managed endpoints. Highly-granular event logging and data shadowing configurations are supported for tracking and analyzing user actions on peripheral ports/devices, related system events and data transferred to peripheral devices. In addition, DLES can monitor remote DeviceLock-managed computers in real-time to check on agent status and policy template consistency. New in DeviceLock 6.4.1 is an optional add-on component for full-text search in the central shadowing and event log database – DeviceLock Search Server (DLSS). DLSS is aimed at making the labor-intensive processes of information security compliance auditing, incident investigations, and forensic analysis more precise, convenient and time-efficient.

Since its inception in 1996 as SmartLine, DeviceLock, Inc. has been providing endpoint device control software solutions to businesses of all sizes and industries. Protecting more than 4 million computers in over 60,000 organisations worldwide, DeviceLock has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. DeviceLock, Inc. is an international organization with offices in San Ramon (California, US), London (UK), Ratingen (Germany), Moscow (Russia) and Milan (Italy).

<>

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ▼  2009 (240)
    • ▼  December (25)
      • MBNA laptop fiasco could easily have been avoided
      • Networking technology set for growth
      • DDoS-Attacks disable many shopping websites, inclu...
      • Fortify Software Launches Hosted Software Security...
      • Launchpad Europe welcomes EITO predictions for ICT...
      • ISACA Launches Risk IT to Help Organizations Balan...
      • Parkeon Chooses Fortify Software To Keep Hackers A...
      • BridgeHead Software refutes suggestion that hospit...
      • Industrialisation of Hacking Will Dominate 2010
      • Mobile data problems? Switch to an encrypted hard ...
      • Hackers Claus havoc at Xmas – shows study!
      • Christmas shopping period worst time for leaving m...
      • Infosecurity Europe 2010 Hall of Fame nominations ...
      • 'EastEnders' laptop theft highlights failure to en...
      • Cloud vs conventional storage and computing in gen...
      • USBs : An Employees Dream- IT’s Worst Nightmare
      • A third of workers will Steal Data to help a frien...
      • VIRGIN MEDIA PARTNERS WITH TUFIN TECHNOLOGIES AND ...
      • DeviceLock now thwarts data leakage via iPhone and...
      • Novatel MiFi™ 2352 Intelligent Mobile Hotspot – Pr...
      • Bell introduces the award winning Novatel Wireless...
      • Recent issues with Skype shutting down
      • Royal Borough of Kensington & Chelsea Leverages Fa...
      • Serial train laptop thefts highlight need for encr...
      • A Good Samaritan
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile