Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

DeviceLock Enhances Portable Storage Security

DeviceLock released a new version of its endpoint security, access-control software this week that's designed to keep important company information from walking out the door, whether printed out on paper or copied to a portable storage device. The new features in version 6.4 include file-type detection and filtering and the ability to set policies and controls for computers inside or outside of the corporate network.

The Russia-based company says it has more than 55,000 customers that are using DeviceLock to protect more than three million computers, and it sees a growing market as new forms of storage make it easier for employees to copy and transport confidential information.

"The iPod and MP3 players changed the landscape, and now everybody carries USB sticks or some type of portable memory," Vladimir Chernavsky, president of North American operations for DeviceLock, told Byte and Switch. "We hear about lost laptops but we rarely hear about lost thumb drives because it goes unreported. It is huge problem that is under the radar, and companies need a way to control and monitor it."

The company's endpoint data leak protection software places enforcement agents on computers and servers and is integrated with Microsoft Active Directory to monitor activity and implement security policies. The software allows a company to block access to ports and prevent specific activities, or it can simply collect logs of activity and flag suspicious behavior. There also is a shadow-copy feature that keeps copies of all files that are copied to external USB devices and external drives, which can be used as a forensic tool for investigation data leakage.

Chernavsky said the management system works at several levels to control information flow. "It can let authorized people copy information to USB sticks, but not other employees unless they use company-provided encrypted USB sticks," he said.

  • 1