www.secure-it.com.my

DeviceLock® Endpoint DLP Suite
Wednesday, 06 July 2011 06:56

DeviceLock

video features & benefits FAQ

About DeviceLock®

The data you are striving to protect behind firewalls and passwords is likely still slipping through your fingers. Data leaks can be initiated by either unwitting employees or users with malicious intent copying proprietary or sensitive information from their PCs to flash memory sticks, smartphones, cameras, PDA’s, DVD/CDROMs, or other convenient forms of portable storage. Or, leaks may spring from user emails, instant messages, web forms, social network exchanges or telnet sessions. Wireless endpoint interfaces like Wi-Fi, Bluetooth, and Infrared as well as device synchronization channels provide additional avenues for data loss. Likewise, endpoint PCs can be infected with vicious malware that harvest user keystrokes and send the stolen data over SMTP or FTP channels into criminal hands. While these vulnerabilities can evade both network security solutions and native Windows controls, the DeviceLock® Endpoint Data Leak Prevention (DLP) Suite addresses them. It enforces data protection policies with awareness of both the context and content of data flows across endpoint channels.

Data leakage prevention starts with contextual control — that is, blocking or allowing data flows by recognizing the user, the data types, the interface, the device or network protocol, the flow direction, the state of encryption, the date and time, etc. Some scenarios call for a deeper level of awareness than context alone can provide; for example, when the data being handled contains personally identifiable information, when the input/output channel is conventionally open and uncontrolled, and when the users involved have situations or backgrounds considered high risk. Security administrators can gain greater peace of mind by passing data flows that fall into any of these categories through an additional content analysis and filtering step before allowing the data transfer to complete.

Device Types Controlled:

  • Floppies

  • CD-ROMs/DVDs/BDs

  • Any removable storage (flash drives, memory cards, etc.)

  • Hard drives

  • Tape devices

  • WiFi adapters

  • Bluetooth adapters

  • Apple iPhone/iPod touch/iPad, BlackBerry, Windows Mobile and Palm OS

  • Printers (local, network and virtual)

Ports Secured:

  • USB

  • FireWire

  • Infrared

  • Serial and parallel

Network Communications Controlled:

  • Web Mail: Gmail, Yahoo!Mail, Windows Live Mail, AOL Mail, Mail.ru, Yandex Mail, GMX.de, Web.de

  • Social Networking: Google+, Facebook, Twitter, LiveJournal, LinkedIn, MySpace, Odnoklassniki, Vkontakte, XING.com, Studivz.de, Meinvz.de, Schuelervz.net

  • Instant Messengers: ICQ/AOL, MSN Messenger, Jabber, IRC, Yahoo! Messenger, Mail.ru Agent

  • Internet Protocols: FTP, FTP over SSL, HTTP/HTTPS, SMTP and SMTP over SSL

  • Telnet sessions

Clipboard Control:

  • Inter-application clipboard copy/paste operations

  • Data types controlled separately: file types, textual data, images, audio, unidentified

  • Screenshot operations (for PrintScreen and 3rd party applications)

Data Types Controlled:

  • More than 4,000 file types

  • Data synchronization protocol objects: Microsoft ActiveSync®, Palm® HotSync, iTunes®

  • Pictures containing text as image (embedded in MS Office and PDF documents or as separate graphic files)

File Formats Parsed:

  • 80+ file formats including Microsoft Office, Adobe PDF, OpenOffice, Lotus 1-2-3, WordPerfect, WordStar, Quattro Pro, Email repositories and archives, CSV, DBF, XML, Unicode, GZIP, RAR, ZIP, etc.

Content Filtering Technologies:

  • Keyword matching

  • Advanced regular expression patterns with numerical conditions and Boolean combination of matching criteria

  • Pre-built RegExp templates (SSN, credit card, bank account, address, passport, driver’s license, etc.)

  • Industry-specific keyword dictionaries

  • File/Data object properties (name, size, password protected, contains text, date/time, etc.)

Encryption Integration:

  • Windows BitLocker To Go

  • PGP® Whole Disk Encryption

  • TrueCrypt®

  • Lexar® Media SAFE S1100 & S3000 Series

  • SafeDisk®

  • SecurStar® DriveCrypt® (DCPPE)

 

Did You Know

arrow Identity theft is the top consumer complaint in the USA according to the Federal Trade Commission.

arrow US consumers reported fraud loss totalling more than $1.1 billion in 2006.

arrow Credit card fraud (25%) was the most common form of reported identity theft in the US in 2006.

arrow More than 100 000 people are affected by identity theft each year in the UK

arrow According to Privacy Rights Clearinghouse, more than 350 data loss incidents involving more than 140 million records have occurred since February 2005

arrow Organisations are obliged by law to take take adequate steps to ensure the proper disposal of data


You are here  :