This also goes for companies when we’re talking about protecting their most valuable capital: DATA….CONFIDENTIAL DATA. At least at one point in their business activity they thought competition or other third parties are going to find out the secret of their success…the “secret Coca-Cola ingredient”!
Think about the fact that some IT admins used to Super Glue USB ports so that employees couldn’t plug in USB sticks to copy data and infect the computers with viruses. Crazy, huh? (Yet when I think about the data breaches that occured lately, it’s understandable). Even if they don’t use Super Glue anymore, they do it through software and there are still many companies that, out of too much caution, ask their IT people to simply block all transfers of files. This is both annoying and counterproductive for users, since the business environment nowadays requires high mobility for fast response times. This doesn’t mean they should just leave confidential data and exit points unprotected and unsupervised. Don’t get me wrong! Maybe I’m just pointing out the obvious, but they should allow legitimate file transfers and block dangerous file transfers, instead of blocking the activity of all users. In one word: FILTERING.
With Data Loss Prevention solutions you can set filters at the endpoint level: filters by File Type (Word, Excel, PDF, PowerPoint, exe, jpg, etc.), filters by Personal Data (emails, phone numbers, SSNs, credit card numbers, etc.) and even filters by Custom Content (for instance I can define a filter that will prevent all my users from sending files containing the word ‘dog’ inside). You can basically control every word that goes out of the company network, whether by email, social media, instant messaging, file sharing applications, Dropbox, iCloud, USB drive, external HDD, CD/DVD, zip drive, etc., all you can think of.
My point is you have to be on the safe side without taking it to the extremes: hope for the best (security conscious, well-intended, employees) but expect the worst (be prepared to face any security threat).
We will talk more in depth about filtering and Data Loss Prevention in a future post. To Be Continued…
The launch of the new Endpoint Protector 4 client for Linux did not pass unnoticed.
The Var Guy wrote a blog post presenting the new release and emphasizing the importance of Data Loss Prevention and Device Control solutions for mixed environments (Win, Linux, MAC).
You can read the whole article here: http://www.thevarguy.com/2012/04/10/endpoint-protector-4-adds-linux-support/
What is Data Loss Prevention? Is it related to technology, processes or people? Is it limited to some administrative policies and IT restrictions? These are the questions discussed in a well-documented recent article on darkreading.com.
DLP is not just an information security concern, it is not just a technical issue. DLP involves the entire organization, establishing what data is sensitive, where the sensitive data is kept, how is it accessed and used, and only after understanding these key points will they be able to define and implement a strategy for protecting and securing such data, at a level of both administrative processes and IT limitations.
In short, DLP is a business issue and it concerns technology as well as processes and people.
With the rising number of attacks and unintentional data leakage, protecting sensitive information became an essential task for any organization, regardless of its size. This is why the implementation of security controls for preventing data loss is actually the foundation for a secure business performance.
You can read more on this hot topic on darkreading.com
The biggest challenge of securing modern IT infrastructures is to protect networks that mix different platforms and operating systems. CoSoSys has always considered this challenge when releasing a new version of their endpoint security and data loss prevention solutions, making them available for Windows, Mac and Linux. The same holds true for the freshly released EasyLock version 2, the software developer’s portable data protection solution.
This enhanced new version offers full support for cross-platform data encryption between Windows, Mac OS X and Linux openSUSE and Ubuntu. EasyLock 2 comes with military-grade protection for data stored on USB flash drives and other portable storage devices through its 256bit AES encryption. It also allows cross platform mobility by enabling users to protect their files when in transit and to easily access them on different operating systems. Read more
Here’s a good piece of news for companies around the world: when it comes to access to your important and confidential data, you don’t need to treat all employees as equals. In fact, it is highly recommended to make sure not anyone can access all your files, and if they can see them, you should prevent everyone from copying or transferring the information you need to keep private.
Ongoing projects, customer data bases, inventions, strategies, private records of employees, credit card and bank account information, all these must remain confidential. So if you store them, how can you make sure an employee that is unaware of the harm they are doing or who knowingly wants to harm you, fails at their attempt to expose the files in question? Read more
After a very successful year 2010 and many product launches and recognitions, CoSoSys announced it had been acquired by leading European Unified Threat Management vendor Astaro. Astaro plans to take over and keep both the product range of the Romanian company and their team.
The two companies will continue to develop CoSoSys’ existing range of endpoint and mobile data security solutions,and will also collaborate on integrating CoSoSys’ device control, data loss prevention and endpoint security solution into Astaro’s Unified Threat Management solution, the Astaro Security Gateway, and on providing a level of overall security beyond any solution currently on the market. Read more
I work in such a company. This company uses software that ensures protection against confidential data theft, so no company data leaves the network. No data leaks means no financial loss on this side. No loss means stable revenue, investments in the growth of the company, which translates into a job that is secure, bigger salaries, more employees.
And even if money doesn’t buy us happiness, it is obvious that an employee who doesn’t worry much about tomorrow is more relaxed, more productive, in a better mood and finally happier.
So, a CEO and a CIO who want to add more value to their business, who want to reduce loss and increase revenue, who want more productive and happier employees will invest in a solution to protect their company against data theft and leakage.
What do you think? Can protecting a company’s confidential data make us happier?
Yes, folks it was bound to happen. Device Control, Data Loss Prevention and endpoint security applications were bound to conquer the new over-hyped platforms, Windows 7 and Snow Leopard. And the first one to reach this performance is the latest version of Endpoint Protector 2009, developed by CoSoSys, a leading developer of endpoint security and portable storage device applications. The new version has a clear purpose, one that is a must for all companies interested in security: allowing them to test and implement the most recent operating systems, while protecting them from common threats yielded by extreme data portability and mobility.
“Our goal is to keep companies safe while allowing them to test, implement and turn the latest breakthroughs in software and hardware platforms into a profitable advantage. Releasing a version for the Windows 7 operating system – which is currently one of the most hyped and critically appraised platforms – and for Mac OS X Snow Leopard is a natural step in our ongoing strive to adapt to as many IT environments as possible. It also complements our efforts of maintaining a high level of mobility and productivity for non-technical users by providing them with a continuously increasing range of controlled portable devices, from iPods, cameras and USB sticks to ExpressCard SDD and printers,” explains Roman Foeckl, CoSoSys CEO.
To test the new version of Endpoint Protector 2009, you can download the 30 days trial or check out the online demo at http://www.EndpointProtector.com.
There has been much noise about the Goldman Sachs ex-employee who managed to leave the company with their secret solution to be faster and better than their financial services competitors. At first, the name of the company reporting the data breach was unclear, then more started whispering Goldman Sachs. Let’s sink into the juicy details.
It all started when a computer programmer was arrested for stealing classified application code that powerd his former employer’s, later identified as Goldman Sachs, high-speed financial trading platform. The programmer’s name, along with more details on the incident, were reproduced from an FBI affidavit by DarkReading:
According to an affidavit (PDF) filed by the arresting FBI officer and subsequently posted by news media, the programmer, Sergey Aleynikov, copied “proprietary trade code” from his company and uploaded it to a Website in Germany. He later quit his job at the New York firm and moved to a new company in Chicago that “intended to engage in high-volume automated trading” — and paid him around three times his old salary of $400,000, according to the affidavit.
The programmer says it was all a mistake. Apparently, he only wanted some open sourced files he was working on and ended up with the entire shabang. The fact he never sold the code or tried to otherwise use it plays in his favor. The fact he tried to hide all traces of the data transfer, doesn’t. But that’s somehting to be settled in a court.
What’s fascinating, as ZDNet’s Larry Dignan explained on one of the network’s blogs, is that Goldman Sachs, “a master at gauging risk”, was able to overlook the danger of inside threats. Especially when it’s something all security experts have been talking about for a long while.
When you think about it, nothing happened to Goldman Sachs. Other than a much needed wake up call. What could have happened? The competition actually improving their own platforms and taking over more and more clients from Goldman Sachs. I have a feeling adding up the numbers of this potential loss would make us all dizzy!.