Tag Archives: endpoint security

USB Lock RP – software security solution to block / allow specific portable media devices

US Diversified Tech, LLC together with Advanced Systems International, SAC announce the release of USB Lock RP v5.29. A software security solution designed strictly to provide the ability to block or allow specific portable media devices. USB Lock RP’s scope of protection now includes: eSata, Firewire, USB 3.0 super speed technology, MTP, USB 2 sticks, as well as cell phones, Tablets, iPod’s, mp3, SD Cards and all other interfaces that can be used to extract data. The newest and biggest addition is the eSata protection which has been, and remains industry wide, a difficult opening in data security to address. With the inclusion of eSata, USB-3.0 and Firewire super speed transfer interfaces, Advanced Systems International, SAC has addressed every opening presented where a media storage device can be misused. It is important to not just lock out these devices but to have the option to allow their use, when necessary, in a managed and protected manner.

Javier Arrospide, Advanced Systems International, SAC founder and lead software developer states that, “USB Lock RP (Remote Protect) is straightforward effective endpoint security software. Allowing organizations to authorize, from a central location, specific devices with ease and automatically block all other removable storage external hardware that could be used to extract data assets or to enter malware in your networked environment.” USB Lock RP’s operation is automatic, alerting, logging, authorizing or blocking device connections in real-time. Installation is simple and, for large networks, the client side setup is provided in MSI format so initial remote deployment can be done silently and with ease.

US Diversified Tech, LLC focuses on addressing government and corporate computer security issues and is well respected for working closely with IT and management in finding security solutions that best meets the individual situation. For further information and a 15 Day Free Trial of USB Lock RP or to view our other security solutions, visit the US Diversified Tech websites at www.AdvanSysUSA.com orwww.LaptopSecuritySolutions.com. We can be contacted at (888)-361-8718 to address any technical, sales or dealer inquires.

Contact Details: US Diversified Tech, LLC, PO Box 599, 141 Canal St., Nashua,
NH 03064
888-361-8718 Phone 603-484-2698 Fax
sales@AdvanSysUSA.com

Brainloop Publishes New White Paper on Managing Document Security

“Managing Information Risk in the Extended Enterprise: Why Corporate Compliance & IT Security Must Join Forces”

Boston, MA, November 02, 2010 — Brainloop ( http://www.brainloop.com ), the leading supplier of software solutions for high-security management of confidential documents, today issued a white paper that looks at the challenges of managing security across the entire document lifecycle. Brainloop is used internationally by hundreds of renowned companies including BMW, Deloitte and Eurocopter, for document compliance management and secure collaboration involving highly confidential documents throughout the extended enterprise.

Titled “Managing Information Risk in the Extended Enterprise: Why Corporate Compliance and IT Security Must Join Forces,” the paper is authored by Michael Rasmussen of Corporate Integrity LLC, a noted authority in understanding governance, risk and compliance (GRC) processes and considered the first analyst to define and model the GRC market for professional services and technology.

The paper examines how the distributed nature of working with confidential documents in collaborative settings between employees, external auditors, strategic partners, or any other individuals outside the corporate network poses a serious security risk. Traditional IT security tools do not protect documents outside the firewall. Intellectual property, trade secrets, financial and legal papers, customer lists and other highly sensitive data must be managed under a set of controls that include authentication, audit tracking, rights management, and role-based access control.

“Risk and compliance issues are compounded by the pervasive nature of electronic documents. The more sensitive a document is, the more likely it will need to travel outside the organization, increasing the likelihood of risk exposure,” notes Rasmussen.

“The traditional infrastructure approach to security – firewalls, network access control, endpoint security – cannot protect collaboration in a dynamic and extended business environment. If an organization closely restricts and monitors online collaboration without providing a secure alternative, users are forced to send documents as email attachments — completely unprotected.-

One challenge the paper notes is the necessity of “changing the security culture in the organization from an endpoint or network infrastructure-centric view to an information-centric view of security. This includes a new paradigm of managing security across the entire document lifecycle – even when they are outside the firewall.”

The paper further makes the case for why compliance and IT security must join forces to deliver a secure online collaboration platform, with the stated goal of empowering end users, vendors and partners with a transparent means of supporting security policies.

Sourced and vetted by IT security, this platform must meet corporate standards for security certification, enterprise integration, choice of delivery model (cloud-based or onsite), Service Level Agreements (SLAs), and flexibility to apply the right level of secure collaboration relevant to the level of risk exposure within the document.

Compliance and legal issues such as electronic discovery and litigation risks weigh heavily on the decision and evaluation of a document compliance management solution. Legal, financial and contract-related licensing documents all require documentation of accesses, non-repudiation and control over document integrity.
Rasmussen writes, “It’s time to stop fighting collaborative processes that end-users have so avidly embraced, and objectively look at securing online document collaboration across extended business relationships to take full advantage of its benefits.”

To read the Brainloop white paper, “Managing Information Risk in the Extended Enterprise,” go to: http://www.brainloop.com/fileadmin/assets/PDFs/White_Papers/brainloop_white_paper_managing_information_risk.pdf

About Brainloop:
Brainloop, with offices in Boston and Munich, is the leading supplier of software solutions for high-security document collaboration. Brainloop’s secure online workspace is a virtual document safe that enables secure filing, editing and distribution of highly confidential documents within a single company, and beyond. All contents are powerfully protected from unauthorized internal or external access, and all actions within the application are documented by a tamper-proof audit trail. Frequent uses include contract negotiations, collecting data and compiling quarterly reports, collaboration with external auditors and counsel, and any other communication that contains confidential information.

Brainloop is used internationally by hundreds of renowned companies including BMW, Deutsche Telekom, Eurocopter, Galileo Industries, Premiere and ThyssenKrupp. Leading law firms and investment banks use this solution for the complete life cycle of M&A transactions. Strategic partners of Brainloop are HP, IZB, Microsoft and T-Systems Business Services. http://www.brainloop.com

Copyright © 2010, Brainloop AG. All rights reserved. All trademarks mentioned in this document are the property of their respective owners.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Boston, MA 02101
(401) 349-3369
vcruz@mediapr.net
http://www.brainloop.com