About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Press Releases
BeCrypt Launches Connect Protect To Help Enterprises Clamp Down On Growing Security Risks From Portable USB Devices
Wednesday, 29 September 2004 12:08 EST

Connect Protect prevents malicious use of mobile computing devices to leak corporate data and introduce viruses

BeCrypt, the leading UK encryption security company, today announced the availability of Connect Protect, the first comprehensive security solution to give organisations protection against the threat of unauthorised connection of 'plug and play' devices to laptops and desktop computers therefore protecting key corporate data.

Connect Protect has been designed to protect organisations from the malicious use of USB connected devices including USB memory drive keys, mass storage drives, printers, music players such as the iPod and smart mobile phones. These mobile devices are increasingly being used to steal private or classified data from the corporate network or introduce harmful computer viruses onto the network.

According to research by BeCrypt also released today, the majority of UK companies have left themselves exposed to the growth in use of USB connected mobile devices, with most having no security policies in place or defined for controlling their use in the enterprise. Further information can be found in a management report on the study results at http://www.becrypt.com/management_report.cfm.

"Employers are starting to wake up to the need to police the use of USB enabled portable storage devices, but they are struggling to find a simple way to administer security policies," said Peter Jaco, chief executive officer of BeCrypt. "Connect Protect gives enterprises the power to enforce secure polices that will restrict the connection of non-approved devices to any corporate PC or laptop protecting the firms key data assets."

Simple to administer and with centralised auditing and management support, Connect Protect allows security administrators to control which devices can be connected to a protected machine. Used in conjunction with BeCrypt's full disk encryption product DISK ProtectTM the solution gives users full protection while either on the move or at their desk. Policies can be configured to allow connection of specific device USB enabled devices to a computer while restricting any non-approved devices.

The management interface of Connect Protect enables flexible security policies to be defined for user or machine groups, describing permissible and prohibited device types. These can range from portable storage devices and high capacity removable storage devices to conventional printer or imaging devices.

Analyst firm Gartner has warned of the risk of the iPod being used to download sensitive corporate data and there are several recent examples where enterprises have tried to issue a blanket ban on non-approved USB devices. Connect Protect can ensure that devices are not connected and used outside of the published company security policy.

Connect Protect be used as a standalone product with manually registered devices or it can exist within a centrally managed environment. When used with BeCrypt's DISK Protect for laptop and desktop full disk encryption, and PDA ProtectTM for access control and encryption of PDA devices, it provides a complete data security strategy for the enterprise.

About BeCrypt

BeCrypt Limited was formed in 2001 to meet the growing demand for high-level computer encryption products in the international government and corporate marketplace. The company is a leading provider of enterprise encryption and security products designed to fully protect all corporate data. BeCrypt products protect customers in a number of key UK government areas including: central and local government, the military and defence sector, law enforcement and transportation. The company also services the commercial sector with key customers in financial services, pharmaceutical, insurance and banking sectors.

BeCrypt's DISK Protect and PDA Protect products have been designed to meet stringent government security standards and have been approved by the UK Government's Information Assurance group, the Communications Electronics Security Group (CESG) within GCHQ. This approval ensures BeCrypt products have met the needs of Government level security policy and standards without compromising usability.

BeCrypt has won an award from the Department of Trade and Industry for innovative technology and has patents pending on a number of unique encryption technologies.

Further information at http://www.becrypt.com

For additional product information or For press queries please contact:
sales please contact:

BeCrypt Limited Rainier PR
Wyvols Court Alia Ilyas / Craig Brophy
Swallowfield
Berkshire RG7 1WY

Tel: +44 (0) 1189-880277 +44 (0) 20 7494 6570
Fax: +44 (0) 1189-880377




Featured Articles

Tribal thinking in today’s IT
George Santayana once famously observed; “Those who cannot remember the past are condemned to repeat it.”. But when it comes to IT security, a better way of thinking might be; “those who fail to understand the impact of the past on their thinking may find themselves somewhat exposed”…

You can’t manage what you can’t see!
Security threats have grown more menacing with the appearance of the likes of Sober, Mytob, and Bagle. Along with the newer trends of spyware, phishing and key logging the implications of ineffective information security have become potentially debilitating to business operations and indeed strategy.

The development and execution of an endpoint security strategy is an increasingly important and urgent issue for businesses of all sizes. Many are executing – or wanting to execute - flexible working practices and organisation models that leverage contemporary technology.

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Phishing By The Numbers: 41,000 Blocked Sites in 2005
Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter