5/17/2004 - Senforce TechnologiesTM, Inc., the leader in location-aware endpoint security, announced it has added new storage device control functionality to its popular Enterprise Mobile Security ManagerTM (EMSMTM) version 2.5 designed to prevent data theft on mobile computers.
Storage device control is a natural extension of EMSM 2.5, which also offers wireless Local Area Network (WLAN) connectivity control for notebook PCs with both embedded and after-market WLAN adapters, including Intel® CentrinoTM Mobile Technology based notebooks.
EMSM 2.5’s new storage device control has three operating modes designed to protect notebooks from data theft and introduction by intruders, as well as controlling either globally or by location, users access to local storage devices:
“Companies are realizing the majority of crucial corporate data assets are traveling the world on notebook computers,” said Allan G. Thompson, president and chief executive officer of Senforce. “The benefit of increased mobility is increased productivity, but increased security risks to this mobile data must be addressed. EMSM 2.5 leads out in providing a security perimeter around notebook computers wherever they go, however they connect, by protecting the data by controlling wired and wireless connectivity. Senforce’s File Storage Device Control technology adds to those mobile perimeter protections, stopping the theft or introduction of data through unauthorized local storage devices such as USB thumb drives and so forth.”
Storage device control management enhancements and endpoint integrity features build upon Senforce’s patent-pending location-aware security technology to better enable enterprise IT and security managers to proceed with all notebook procurement include those that are WLAN-enabled. EMSM 2.5 enables government agency and corporate security personnel to maintain protected and secure mobile computing for their entire organizations.
EMSM 2.5 Features for Corporate and Government Security Needs
EMSM 2.5’s added features include a FIPS 140-2 certified (Certificate no. 343) cryptographic module to protect the integrity and confidentiality of security policies. This added compliance measure and capabilities reinforce Senforce’s commitment to provide mobile endpoint security to government and corporate enterprises. Several EMSM 2.5 features also support compliance with Department of Defense (DoD) Wireless Directive DoDD 8100.2 for mobile technology usage in government agencies and organizations.
Other major features of EMSM 2.5 include:
Senforce Wireless Connectivity ControlTM—Advanced security technology providing wireless connectivity control and management of both embedded WLAN NICs used in notebook PCs, including support for those using Intel Centrino Mobile Technology; and supporting aftermarket WLAN NICs from companies including 3Com Corporation, Cisco Systems, Inc., Linksys (a division of Cisco Systems, Inc.), and Proxim Corporation. Whenever a WLAN device is installed in the notebook, EMSM 2.5 determines if the WLAN use is authorized or unauthorized, giving IT and security managers control of WLAN adapter usage up to and including complete radio silence and activation. With one mouse-click from inside EMSM 2.5 Policy Manger, security managers can either activate or control WLAN adapters with necessary security policies in place.
Bridge Blocking—Virtual bridging, a feature supported in Windows XP, allows multiple network adapters in the same PC to pass network traffic between each other without ascending the protocol stack its attendant security checks and measures. When a WLAN adapter and a wired network adapter are present in the same computer, this Windows feature can crate security vulnerabilities many corporations are uncomfortable with. EMSM 2.5 technology prevents this from occurring by immediately disabling any adapters using the virtual bridge. EMSM 2.5 also can disable WLAN adapter connections whenever a wired LAN connection is established in both Windows 2000 and Windows XP.
Rogue Access Point Detection and Reporting—EMSM 2.5 identifies and reports on rogue, or unauthorized access points present in proximity to corporate users, helping IT administrators identify any unmanaged access points in various locations, and restricting user access to them to prevent security breaches.
Endpoint Integrity—Anti-virus integrity checking to verify that anti-virus software is running and current with the latest virus signatures and definitions. These tools establish integrity rules to automatically place policy violating mobile devices into a safe quarantine zone, preventing infection of other users on the network. EMSM 2.5 integrity rules can trigger other policy settings based on time, location, connection status, etc. and can mandate immediate remediation, restricting a user to specific updates until the mobile endpoint is in compliance with policy.
System Requirements, Price and Availability
Senforce Enterprise Mobile Security Manager 2.5 server-side hardware requirements include an 800 MHz Pentium III equivalent (or greater) server computer with at least 256MB of RAM, and 5MB of initial hard disk storage to install. Server-side software requirements include Microsoft Windows 2000 Server (with Service Pack 3 installed), Windows 2000 Advanced Server (with Service Pack 3 installed), or Windows 2003 Server; Microsoft SQL Server 2000 Standard or Enterprise Edition (with Service Pack 3 installed); and a certificate obtained from a publicly trusted certificate authority, such as VeriSign.
EMSM's Mobile Security Client and Policy Editor client-side hardware requirements include a 600 MHz Pentium III equivalent (or greater) with at least 128 MB minimum, and 30MB of initial hard disk storage to install. Client-side software requirements include Microsoft Windows 2000 (running Service Pack 2, 3 or 4), or Windows XP (with or without Service Pack 1); Internet Explorer 5.0 or greater on Windows 2000, or Internet Explorer 6.0.28.00 Service Pack 1 for Windows XP; and a certificate obtained from a publicly trusted certificate authority, such as VeriSign.
Pricing for Enterprise Mobile Security Manager 2.5 varies based on the scale of the deployment, with initial per-seat pricing at $89.95. A variety of scalable maintenance options are also offered.
Previous Page | News by Category | News Search
If you found this page useful, bookmark and share it on: