Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Devicelock Covers iPad Data Leakage Threat

April 2010 by Marc Jacob

DeviceLock, Inc. announced that the iPhone® local synchronisation filtering technology built into DeviceLock 6.4.1 controls local data transfers between Apple’s new iPad® and DeviceLock-protected endpoint computers. DeviceLock customers are able to define and enforce permissions for this new tablet computer with the same high degree of flexibility and granularity already applied to iPhone® and iPod® touch mobile devices, as well as other types of smartphones, PDAs, and removable storage gadgets.

DeviceLock’s patent-pending local synchronisation filtering technology gives security administrators the ability to centrally control which types of data specified users or their groups are allowed to synchronize between corporate computers and locally connected iPads, iPhones and iPods. DeviceLock also can recognise and filter numerous data object types for the iTunes® protocol, thus empowering administrators to selectively allow or block synchronisation of files, email accounts, contacts, tasks, notes, calendar items, bookmarks, and various media types.

DeviceLock provides scalable, centralised, and easy-to-learn management and administration via a customised Microsoft Management Console (MMC) snap-in that natively integrates with Group Policy Object Editor in Microsoft Active Directory. DeviceLock agents can be deployed, managed and administered completely from within an existing Microsoft Active Directory domain. A separate component, the DeviceLock Enterprise Server (DLES), is available for centrally auto-collecting audit and shadow data from protected endpoints. Highly-granular event logging and data shadowing configurations are supported for tracking and analysing user actions on peripheral ports/devices, related system events and data transferred to peripheral devices.

In addition, DLES can monitor remote DeviceLock-managed computers in real-time to check on agent status and policy template consistency. DeviceLock’s comprehensive mix of configurable policy parameters and options facilitates the definition and enforcement of a “least privilege” corporate IT security policy.

With DeviceLock, IT security administrators are equipped to logically profile the business role of every employee, group or department with regard to their use of local PC ports and peripheral devices, keeping each to the minimal set of operations required to perform their role. This reduces the overall risk of data leaks and helps organisations to better comply with applicable IT security regulations and industry standards.


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts