Tech Strategy Trends

Dec 21 2009   12:23AM GMT

Keep Your Data from Walking Out the Door with Zecurion



Posted by: Tony Bradley
Tags:
Active Directory
breach
compromise
data
employee
internal threat
leak
USB drive
Zecurion
Zlock

Most IT managers would probably be shocked to learn how much data is leaked or compromised from internal employees–particularly those who are leaving the company.

A recent Ponemon Institute survey of 1000 workers that recently changed jobs revealed that 59% of them did not feel any wrongdoing in taking company’s data when leaving or asked to leave a job. Employees take information such as customers’ data, email and contact lists, employee records, financial records, confidential business documents and other intellectual property.

The economic crisis has exacerbated the problem. The skyrocketing number of workers who have been let go as a result of tough economic times has been accompanied by a similar spike in data theft and compromise. Many workers who still have their jobs may even preemptively horde sensitive and confidential information out of paranoia that they may soon be out of work.

The diversity of portable devices capable of storing huge amounts of data doesn’t make things any easier for IT administrators. Devices like smartphones, MP3 players, digital cameras, and more traditional storage like portable external hard drives, SD memory cards, and USB flash drives provide users with small, convenient, and virtually undetectable tools for transporting gigabytes–potentially even hundreds of gigabytes–of data.

Zecurion has a solution to enforce policies, and protect the data with Zlock. According to the Web site, “Zlock is an endpoint security software solution that was specifically designed and developed to address today’s corporate needs to prevent data leakage by securing and managing various computer ports including USB, LPT, Firewire, Serial, etc. Zlock provides lockdown of computer ports and management console to implement a port/device user access control. User access control, which is based on access control lists (ACL), is tightly integrated with Active Directory (AD). System administrators can take full advantage of the existing AD user groups, which can be assigned various port/device access levels, such as: allowing full access; read only; or denying the access altogether.”

IT administrators aren’t omniscient. They need tools like Zlock to ensure that users can not simply save confidential and sensitive data and walk out the front door with it. Zlock also can also log and create shadow copies of data that is saved or printed, providing a valuable forensic and compliance tool as well.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: