contents

software
 
Devicelock Covers iPad Data Leakage Threat

DeviceLock announces that the iPhone local synchronisation filtering technology built into DeviceLock 6.4.1 controls local data transfers between Apple's new iPad and DeviceLock-protected endpoint computers. DeviceLock customers are able to define and enforce permissions for this new tablet computer with the same high degree of flexibility and granularity already applied to iPhone and iPod touch mobile devices, as well as other types of smartphones, PDAs, and removable storage gadgets.

"DeviceLock customers already have the enforcement technology in place to protect themselves from users locally copying sensitive data from a Windows endpoint to an iPad and from the loss of control over that data should the iPad user then store or send it to destinations that are even further outside the protected confines of the corporate network", said Ashot Oganesyan, DeviceLock CTO and Founder. "The iPad is positioned as a digital book reader, video player, and gaming platform. But, with its bigger screen, keyboard, and a well-funded application development community, iPad buyers are equipped to not just consume content, but to create content - and for knowledge workers that means to work. However, the IT security impacts need to be taken into consideration and policy set with regard to iPad use. DeviceLock can easily be configured to enforce accepted-use policies for local data communications with iPad by using the 'iPhone'-related configuration controls in any DeviceLock v6.4.1 administration console. It delivers an unprecedented level of completeness and quality of local synchronisation control."

DeviceLock's patent-pending local synchronisation filtering technology gives security administrators the ability to centrally control which types of data specified users or their groups are allowed to synchronize between corporate computers and locally connected iPads, iPhones and iPods. DeviceLock also can recognise and filter numerous data object types for the iTunes protocol, thus empowering administrators to selectively allow or block synchronisation of files, email accounts, contacts, tasks, notes, calendar items, bookmarks, and various media types.

DeviceLock provides centralised, and easy-to-learn management and administration via a customised Microsoft Management Console (MMC) snap-in that natively integrates with Group Policy Object Editor in Microsoft Active Directory. DeviceLock agents can be deployed, managed and administered completely from within an existing Microsoft Active Directory domain. A separate component, the DeviceLock Enterprise Server (DLES), is available for centrally auto-collecting audit and shadow data from protected endpoints. Highly-granular event logging and data shadowing configurations are supported for tracking and analysing user actions on peripheral ports/devices, related system events and data transferred to peripheral devices.

In addition, DLES can monitor remote DeviceLock-managed computers in real-time to check on agent status and policy template consistency. DeviceLock's comprehensive mix of configurable policy parameters and options facilitates the definition and enforcement of a "least privilege" corporate IT security policy.

With DeviceLock, IT security administrators are equipped to logically profile the business role of every employee, group or department with regard to their use of local PC ports and peripheral devices, keeping each to the minimal set of operations required to perform their role. This reduces the overall risk of data leaks and helps organisations to better comply with applicable IT security regulations and industry standards.



write your comments about the article :: 2010 Computing News :: home page