A1258609298jimJV

1 / 18
About This Presentation
Title:

A1258609298jimJV

Description:

connection (you provide users with the special access codes over the phone ... A free, fully functional demo can be downloaded from our website: www.devicelock. ... – PowerPoint PPT presentation

Number of Views:32
Avg rating:3.0/5.0
Slides: 19
Provided by: ashotog

less

Transcript and Presenter's Notes

Title: A1258609298jimJV


1
DeviceLock Security Behind The Firewall
Security and Central Management of Host-Based
Data Ports
2
HOST-BASED SECURITY BEHIND THE FIREWALL
One USB Flash in wrong hands and your firewall is
useless
Protection behind the firewall
The explosive growth the USB flash storage and
new host- based peripherals
Regulatory and security liability when
end-users self manage USB flash storage and
new host- based peripherals
Three solutions to protection from these
behind the firewall risks
1
2
3
4
3
HOST-BASED SECURITY BEHIND THE FIREWALL
You have a FIREWALL, so senior management thinks
the network is safe and secure
You have a sold Senior Management on the value
of firewalls, VPNs, and a patch management plan
But what have you done to enforce your
prohibition or audit usage of portable storage
devices and rogue point to point wireless
4
Introduction
HOST-BASED SECURITY BEHIND THE FIREWALL
USB Flash Drives will be the 1 portable storage
media
5
Peripheral Ports - the perfect storm to by-pass
info security?
HOST-BASED SECURITY BEHIND THE FIREWALL
6
USB Flash Drive Threat
HOST-BASED SECURITY BEHIND THE FIREWALL
Peripheral Port Ledger
  • Convenient
  • Small, light, plugnplay
  • CDs and USB Devices easy to use
  • iPods are popular with staff
  • Loss of Confidentiality
  • Loss of Integrity
  • Loss of Availability
  • Regulatory Liability
  • Bad Press


7
HOST-BASED SECURITY BEHIND THE FIREWALL
83 of other IT managers have not taken steps to
centrally manage the security of local USB
devices
IT Management yet to act
  • Standard access control solutions coming with
  • Windows do not allow the assignment of
    permissions
  • for USB ports
  • You can't manage USB devices via Group Policy
  • You don't have to be an administrator to
    install and
  • use one of these devices

In a recent IT security survey, 83 of
respondents indicated that they have not taken
any steps to control local USB device use
8
HOST-BASED SECURITY BEHIND THE FIREWALL
  • USB Flash Drives is to be the 1 portable storage
  • New peripheral devices on the market every day
  • Users are very attracted to Wireless

Are these among your top host-based security
holes today?
9
Possible solution
HOST-BASED SECURITY BEHIND THE FIREWALL
  • Glue shut all host-based peripheral ports
  • Its a mess and its permanent

PROBLEMS Security vulnerabilities with USB flash
drives, USB wireless NICs, other peripherals
ONE SOLUTION
NEW PROBLEM
10
Best solution
HOST-BASED SECURITY BEHIND THE FIREWALL
Award-winning DeviceLock by SmartLine Inc
11

HOST-BASED SECURITY BEHIND THE FIREWALL
DeviceLock secures USB ports
  • DeviceLock provides system administrators
    control over who can and
  • who can not access USB devices on any local
    computer
  • DeviceLock is a software solution
  • You do not need to physically remove or block
    any hardware
  • DeviceLock is effective on large networks as
    well as individual
  • workstations
  • DeviceLock has a centralized management console
    and can be
  • managed remotely

12

HOST-BASED SECURITY BEHIND THE FIREWALL
DeviceLock secures Windows
  • DeviceLock controls not only USB ports but it
    is also locking out unauthorized user access to
    WiFi, Bluetooth, FireWire, CD-ROMs, floppy
    drives, serial and parallel ports, and many other
    Plug and Play devices
  • What you get is total control over who uses
    devices and when and how these devices are used
    inside the corporate network
  • Being extremely user friendly, it does not
    require administrators to pour over help manuals
    just to learn how to use this program effectively
  • DeviceLock works on Windows NT 4.0, Windows
    2000, Windows XP and Windows Server 2003
    computers. It requires only 2 MB of hard disk
    space

13

HOST-BASED SECURITY BEHIND THE FIREWALL
With DeviceLock you can
  • Control which users or groups can access Plug
    and Play devices
  • Control access to devices depending on the time
    of day and day of the week
  • Authorize only specific USB devices that will
    not be locked regardless of any other settings
  • Grant users temporary access to USB devices
    when there is no network
  • connection (you provide users with the special
    access codes over the phone
  • that temporarily unlock access to
    requested devices)
  • Protect against users with local administrator
    privileges so they can't disable DeviceLock
    Service or remove it from their computers, if
    they are not in this list of DeviceLock
    administrators
  • Set devices in read-only mode

14

HOST-BASED SECURITY BEHIND THE FIREWALL
DeviceLock is an inexpensive solution
  • DeviceLock costs 35 (30 EURO) for a single
    license
  • Discounts are available for multi-user licenses
    and for educational institutions
  • All DeviceLock customers receive one year of
    free support and version upgrades with their
    purchase
  • A free, fully functional demo can be downloaded
    from our website www.devicelock.com

15
DeviceLock FREEWARE Audit Tool
HOST-BASED SECURITY BEHIND THE FIREWALL
16
DeviceLock Super Administrator Control
HOST-BASED SECURITY BEHIND THE FIREWALL
17
DeviceLock USB White List
HOST-BASED SECURITY BEHIND THE FIREWALL
18

HOST-BASED SECURITY BEHIND THE FIREWALL
If you know any organizations that need better
host-based security behind the firewall then this
offer is for them Free 30-day trial of
DeviceLock AND Free DeviceLock Plug-n-Play
Auditor
Write a Comment
User Comments (0)