Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

CenterTools’ DriveLock 5.0: Full-fledged and secure device management at all interfaces in all networks

  • 11 July, 2007 14:17

<p>Central security management solutions for all network clients</p>
<p>DriveLock is one of the leading programs addressing endpoint interface control throughout business networks. Unfortunately most of the time importance of endpoint control shows, when it’s too late. DriveLock ensures you keep control over your business data.</p>
<p>DriveLock is characterized by its flexibility and the variety of different solutions. Tailored for every business need, individual rights may be granted or denied.</p>
<p>The broad DriveLock product range comprises of the following features.</p>
<p>Network Profile Related Access Control (NEW):
All access grants and denials can be set depending on network profiles. Individual IE-Proxy settings or standard printers provide optimal usability for mobile work places. Based on defined profiles the active network environment is instantly recognized leading to an automatic adjustment of the DriveLock settings.</p>
<p>Application Launch Filter (NEW):
Deciding on who shall execute which program in which system, can be managed easily and intuitive. Only allowing the execution of registered programs prevents the sytem from Trojans and Zero-Day-Exploits. It’s outstanding flexibility and the simple configuration make the Application Filter an invaluable security tool.</p>
<p>Encryption of Mobile Devices:
DriveLock encrypts the data on mobile devices if required or enforces encryption based on business policy. The Mobile Encryption Application allows for access upon the encrypted data without DriveLock installed or the requirement of local admin rights.</p>
<p>Device Scanner:
Even before installing agents the Device Scanner searches for every device and drive ever connected to the business network. The results may be used to easily configure DriveLock.</p>
<p>File Filter:
Most files are not only identified by the file extension but also by scanning the contents preventing the transfer of unwanted and irregular data. Further more there are options to create individual file types and to embed self customized profile algorithms into the configuration using DLL files.</p>
<p>Security Reporting Centre (SRC):
Using the SRC will help to collect DriveLock events and store them in a central data base. The data may be used to dynamically create queries and to monitor the usage of removable storage, devices and the transfer of data. Afterwards the query may be stored for further usage in the future while the data may be exported into a file, printed or sent by Email for further analytical purpose.</p>
<p>Terminal Server Edition:
Drivelock also puts you into the position to control access on external drives on Thin-Clients in a Terminal Server environment. On the server side the application launch filter caters for extra security concerning your systems resources.</p>
<p>ADDRESSING THE THREAT</p>
<p>In October 2006 Apple announced, that they have sold more than 39 million iPods over the last twelve months (Preliminary Fourth Quarter Results, Apple, 18th Oct. 2006). Each of these iPods, and the millions of other music players in use present potential risks, and as these storage devices become smaller and their storage capacity increases, they represent a growing security risk to companies, government agencies and other organizations. Corporate losses as a result of the theft of confidential information were $30 million US in 2005 alone (Source: CSI-FBI 2005 Computer Crime and Security Survey ). But the risk is underestimated by most organizations, and attacks from the inside are as likely as attacks from the outside. Computer crime doesn‘t occur only in large organizations. Many incidents affect small companies and new products or technologies, which may be of interest to the competition. Almost any device attached to a computer, such as USB sticks, flash drives, PDAs or iPods can lead to major security breaches and become a vehicle for the theft of confidential and private information. By using a small USB flash drive, anyone can take control of a computer in seconds.</p>
<p>THREE CORE AREAS OF ENDPOINT SECURITY THREATS.</p>
<p>The first area is corporate espionage. There are many documented cases of employees who have been recruited by rival companies or organized crime to steal confidential data. Such crimes may involve the theft of intellectual property, customer lists or even employee lists to be used by head hunters.</p>
<p>The second weakness also involves employees. Instead of being motivated by money, they may simply be disgruntled or may have been recently terminated, and as a result they try to harm the company by disabling the network, destroying data or stealing data for use in their next job.</p>
<p>The third area is simply ignorance: many employees cause data breaches or jeopardize network security unintentionally. Examples include users who install unauthorized software, or an employee who plugs in a USB flash drive that is infected with malicious software into a corporate computer.</p>
<p>MORE DETAILS ON DRIVELOCK 5.0</p>
<p>If you would like to learn more upon the possibilities DriveLock offers your business, there is a comprehensive range of free information material available. CenterTools also offers a free 30 day trial version (full functionality).</p>
<p>For further information upon CenterTools DriveLock or a demo CD please contact Janssen &amp; Janssen Pty Ltd at enquiry@janssenandjanssen.com.au with your full name, company name, title, telephone number, city, state, country and e-mail address.</p>
<p>CENTERTOOLS</p>
<p>CenterTools has gained an international reputation for DriveLock. As a result the Netherlands Army has opted for the product early this year. For more information on CenterTools visit their website at www.centertools.com/default.aspx or www.drivelock.com/default.aspx</p>

Most Popular