Devicelock Covers iPad Data Leakage Threat
April 2010 by Marc Jacob
DeviceLock, Inc. announced that the iPhone® local synchronisation filtering technology built into DeviceLock 6.4.1 controls local data transfers between Apple’s new iPad® and DeviceLock-protected endpoint computers. DeviceLock customers are able to define and enforce permissions for this new tablet computer with the same high degree of flexibility and granularity already applied to iPhone® and iPod® touch mobile devices, as well as other types of smartphones, PDAs, and removable storage gadgets.
DeviceLock’s patent-pending local synchronisation filtering technology gives security administrators the ability to centrally control which types of data specified users or their groups are allowed to synchronize between corporate computers and locally connected iPads, iPhones and iPods. DeviceLock also can recognise and filter numerous data object types for the iTunes® protocol, thus empowering administrators to selectively allow or block synchronisation of files, email accounts, contacts, tasks, notes, calendar items, bookmarks, and various media types.
DeviceLock provides scalable, centralised, and easy-to-learn management and administration via a customised Microsoft Management Console (MMC) snap-in that natively integrates with Group Policy Object Editor in Microsoft Active Directory. DeviceLock agents can be deployed, managed and administered completely from within an existing Microsoft Active Directory domain. A separate component, the DeviceLock Enterprise Server (DLES), is available for centrally auto-collecting audit and shadow data from protected endpoints. Highly-granular event logging and data shadowing configurations are supported for tracking and analysing user actions on peripheral ports/devices, related system events and data transferred to peripheral devices.
In addition, DLES can monitor remote DeviceLock-managed computers in real-time to check on agent status and policy template consistency. DeviceLock’s comprehensive mix of configurable policy parameters and options facilitates the definition and enforcement of a “least privilege” corporate IT security policy.
With DeviceLock, IT security administrators are equipped to logically profile the business role of every employee, group or department with regard to their use of local PC ports and peripheral devices, keeping each to the minimal set of operations required to perform their role. This reduces the overall risk of data leaks and helps organisations to better comply with applicable IT security regulations and industry standards.