Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

iPad Data Leakage Potential Closed By DeviceLock

DeviceLock : 21 April, 2010  (New Product)
Data transfer control protects business critical data in links between iPad devices and endpoint computers using DeviceLock 6.4.1
DeviceLock has announced that the iPhone local synchronisation filtering technology built into DeviceLock 6.4.1 controls local data transfers between Apple's new iPad and DeviceLock-protected endpoint computers. DeviceLock customers are able to define and enforce permissions for this new tablet computer with the same high degree of flexibility and granularity already applied to iPhone and iPod touch mobile devices, as well as other types of smartphones, PDAs, and removable storage gadgets.

"DeviceLock customers already have the enforcement technology in place to protect themselves from users locally copying sensitive data from a Windows endpoint to an iPad and from the loss of control over that data should the iPad user then store or send it to destinations that are even further outside the protected confines of the corporate network," said Ashot Oganesyan, DeviceLock CTO and Founder. "The iPad is positioned as a digital book reader, video player, and gaming platform. But, with its bigger screen, keyboard, and a well-funded application development community, iPad buyers are equipped to not just consume content, but to create content ¾ and for knowledge workers that means to work. However, the IT security impacts need to be taken into consideration and policy set with regard to iPad use. DeviceLock can easily be configured to enforce accepted-use policies for local data communications with iPad by using the 'iPhone'-related configuration controls in any DeviceLock v6.4.1 administration console. It delivers an unprecedented level of completeness and quality of local synchronisation control."

DeviceLock's patent-pending local synchronisation filtering technology gives security administrators the ability to centrally control which types of data specified users or their groups are allowed to synchronize between corporate computers and locally connected iPads, iPhones and iPods. DeviceLock also can recognise and filter numerous data object types for the iTunes protocol, thus empowering administrators to selectively allow or block synchronisation of files, email accounts, contacts, tasks, notes, calendar items, bookmarks, and various media types.

DeviceLock provides scalable, centralised, and easy-to-learn management and administration via a customised Microsoft Management Console (MMC) snap-in that natively integrates with Group Policy Object Editor in Microsoft Active Directory. DeviceLock agents can be deployed, managed and administered completely from within an existing Microsoft Active Directory domain. A separate component, the DeviceLock Enterprise Server (DLES), is available for centrally auto-collecting audit and shadow data from protected endpoints. Highly-granular event logging and data shadowing configurations are supported for tracking and analysing user actions on peripheral ports/devices, related system events and data transferred to peripheral devices.

In addition, DLES can monitor remote DeviceLock-managed computers in real-time to check on agent status and policy template consistency. DeviceLock's comprehensive mix of configurable policy parameters and options facilitates the definition and enforcement of a "least privilege" corporate IT security policy. With DeviceLock, IT security administrators are equipped to logically profile the business role of every employee, group or department with regard to their use of local PC ports and peripheral devices, keeping each to the minimal set of operations required to perform their role. This reduces the overall risk of data leaks and helps organisations to better comply with applicable IT security regulations and industry standards.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo