Title: A1258609298jimJV
1DeviceLock Security Behind The Firewall
Security and Central Management of Host-Based
Data Ports
2HOST-BASED SECURITY BEHIND THE FIREWALL
One USB Flash in wrong hands and your firewall is
useless
Protection behind the firewall
The explosive growth the USB flash storage and
new host- based peripherals
Regulatory and security liability when
end-users self manage USB flash storage and
new host- based peripherals
Three solutions to protection from these
behind the firewall risks
1
2
3
4
3HOST-BASED SECURITY BEHIND THE FIREWALL
You have a FIREWALL, so senior management thinks
the network is safe and secure
You have a sold Senior Management on the value
of firewalls, VPNs, and a patch management plan
But what have you done to enforce your
prohibition or audit usage of portable storage
devices and rogue point to point wireless
4Introduction
HOST-BASED SECURITY BEHIND THE FIREWALL
USB Flash Drives will be the 1 portable storage
media
5Peripheral Ports - the perfect storm to by-pass
info security?
HOST-BASED SECURITY BEHIND THE FIREWALL
6USB Flash Drive Threat
HOST-BASED SECURITY BEHIND THE FIREWALL
Peripheral Port Ledger
- Convenient
- Small, light, plugnplay
- CDs and USB Devices easy to use
- iPods are popular with staff
- Loss of Confidentiality
- Loss of Integrity
- Loss of Availability
- Regulatory Liability
- Bad Press
7HOST-BASED SECURITY BEHIND THE FIREWALL
83 of other IT managers have not taken steps to
centrally manage the security of local USB
devices
IT Management yet to act
- Standard access control solutions coming with
- Windows do not allow the assignment of
permissions - for USB ports
- You can't manage USB devices via Group Policy
- You don't have to be an administrator to
install and - use one of these devices
In a recent IT security survey, 83 of
respondents indicated that they have not taken
any steps to control local USB device use
8HOST-BASED SECURITY BEHIND THE FIREWALL
- USB Flash Drives is to be the 1 portable storage
- New peripheral devices on the market every day
- Users are very attracted to Wireless
Are these among your top host-based security
holes today?
9Possible solution
HOST-BASED SECURITY BEHIND THE FIREWALL
- Glue shut all host-based peripheral ports
- Its a mess and its permanent
PROBLEMS Security vulnerabilities with USB flash
drives, USB wireless NICs, other peripherals
ONE SOLUTION
NEW PROBLEM
10Best solution
HOST-BASED SECURITY BEHIND THE FIREWALL
Award-winning DeviceLock by SmartLine Inc
11HOST-BASED SECURITY BEHIND THE FIREWALL
DeviceLock secures USB ports
- DeviceLock provides system administrators
control over who can and - who can not access USB devices on any local
computer - DeviceLock is a software solution
- You do not need to physically remove or block
any hardware - DeviceLock is effective on large networks as
well as individual - workstations
- DeviceLock has a centralized management console
and can be - managed remotely
12HOST-BASED SECURITY BEHIND THE FIREWALL
DeviceLock secures Windows
- DeviceLock controls not only USB ports but it
is also locking out unauthorized user access to
WiFi, Bluetooth, FireWire, CD-ROMs, floppy
drives, serial and parallel ports, and many other
Plug and Play devices - What you get is total control over who uses
devices and when and how these devices are used
inside the corporate network - Being extremely user friendly, it does not
require administrators to pour over help manuals
just to learn how to use this program effectively - DeviceLock works on Windows NT 4.0, Windows
2000, Windows XP and Windows Server 2003
computers. It requires only 2 MB of hard disk
space
13HOST-BASED SECURITY BEHIND THE FIREWALL
With DeviceLock you can
- Control which users or groups can access Plug
and Play devices - Control access to devices depending on the time
of day and day of the week -
- Authorize only specific USB devices that will
not be locked regardless of any other settings - Grant users temporary access to USB devices
when there is no network - connection (you provide users with the special
access codes over the phone - that temporarily unlock access to
requested devices) - Protect against users with local administrator
privileges so they can't disable DeviceLock
Service or remove it from their computers, if
they are not in this list of DeviceLock
administrators - Set devices in read-only mode
14HOST-BASED SECURITY BEHIND THE FIREWALL
DeviceLock is an inexpensive solution
- DeviceLock costs 35 (30 EURO) for a single
license - Discounts are available for multi-user licenses
and for educational institutions - All DeviceLock customers receive one year of
free support and version upgrades with their
purchase - A free, fully functional demo can be downloaded
from our website www.devicelock.com
15DeviceLock FREEWARE Audit Tool
HOST-BASED SECURITY BEHIND THE FIREWALL
16DeviceLock Super Administrator Control
HOST-BASED SECURITY BEHIND THE FIREWALL
17DeviceLock USB White List
HOST-BASED SECURITY BEHIND THE FIREWALL
18HOST-BASED SECURITY BEHIND THE FIREWALL
If you know any organizations that need better
host-based security behind the firewall then this
offer is for them Free 30-day trial of
DeviceLock AND Free DeviceLock Plug-n-Play
Auditor