DeviceLock and SecurStar partner on corporate data leakage

DeviceLock, a worldwide leader in context-aware endpoint data leak prevention software solutions, and SecurStar, an industry leader in enterprise data and voice encryption solutions, have jointly announced the general availability of an integrated, centrally managed endpoint security solution that addresses the challenge of stopping unauthorised data transfers from corporate desktops and laptops to unencrypted removable memory devices and media. like USB sticks, flash memory cards and CDs/DVDs.

Released today, DeviceLock 6.4.1 port/device access control software adds the ability to allow or disallow data transfers based on whether the data is safely encrypted by DriveCrypt Plus Pack Enterprise (DCPPE) software 2.3.11 from SecurStar.

When DeviceLock and DriveCrypt are installed on the same endpoint computer, all data encryption, as well as centralised key and password management functions, are performed by DriveCrypt, while DeviceLock’s Crypto Intelligence feature checks for the encryption of data being transferred to removable storage devices and activates access control policies accordingly.

For example, certain employees or their groups can be permitted to write data to and read data from USB flash drives, only if they have been encrypted with DriveCrypt. Other users may be allowed to read only from removable storage devices, but not write to them, even when encryption is applied.

With this datacentric approach, organizations can be assured that valuable corporate information kept on removable media or memory-enabled devices is reliably protected by strong encryption that prevents unauthorized data access should a device be lost or stolen.

“As a result of this technology partnership with SecurStar, DeviceLock customers have their most affordable path yet to centrally-managed device control integrated with full disk and removable media encryption,” emphasised Ashot Oganesyan, DeviceLock CTO and founder.

“While both DeviceLock and DriveCrypt products can be purchased separately and independently, there is obvious synergy in the integrated bundle. This is a perfect example of a solution that leverages both partners’ technology leadership in their respective fields of expertise, enabling joint customers to cost effectively complement one of these products by the value of the other without being forced to duplicate any of their functions,” Oganesyan continued.

The following two tabs change content below.


Latest posts by admin (see all)