LiveZilla Live Help



 

Security ››  Data Security

Protect your valuable intellectual property from theft by “pod slurping” (stealing data by using USB, MP3, camera, phone memory devices etc.) by controlling and recording who is allowed to use USB devices, CD-Writers and even floppy disks.

Control access to your network by USB drives, iPods and PDAs

The proliferation of consumer devices such as iPods, USB drivers, smart phones and other portable devices has increased the risk of data leakage and malicious activity on networks. While most companies have anti-virus software, firewalls, email and web content security to protect against external threats, few realize how easy it is for an employee to copy huge amounts of valuable or sensitive corporate data onto an iPod or USB stick.

 

There is also a risk of falling foul of data protection legislation by failing to control who has access to data as well as the possibility of introducing viruses and illegal software on to the corporate network. One way to prevent this from happening is to lock down all ports but this is not a practical solution.

Prevent data theft and virus infection from within with endpoint security software

Unfortunately, many businesses are unaware of, or ignore the threat until something actually happens at which point it is difficult to identify wrongdoing and certainly too late to prevent the loss of data.

 

 

The key to managing portable device use is to install an endpoint security solution that gives administrators control over what devices are in use, have been used and by whom and in-depth knowledge of what data has been copied.

Let CSE help you to control the use of portable devices on your network.

Actively manage user access and log the activity of:


  • › Media players, including iPods, Creative Zen and others
  • › USB drives, CompactFlash, memory cards, CDs, floppies & other portable storage devices
  • › PDAs, BlackBerry handhelds, mobile phones, smart phones and similar communication devices
  • › Network cards, laptops and other network connections

›› Contact us for further information