Categories
Blog Data Erasure Device Control File Server Security NEWS Press Release

3 Technological Security Measures to Prevent Data Leaks When Employees Depart

To help employees fulfill their professional initiatives, enterprises must provide a variety of physical and digital tools that enable the employees to take full advantage of enterprise data and resources. When the employees move on to different jobs, however, rolling back on all the capabilities that the enterprises once gave to their employees is another important duty. After all, departing employees can be either direct or indirect causes of data leaks, whether accidental or malicious.

To prevent departing employees from leaking confidential data, enterprises have been implementing several conventional measures like establishing policies, preparing legal documentation like a non-disclosure agreement, training/education sessions, and deactivating accounts used by ex-employees (PC, devices, cloud and more). Perhaps these can be considered to be enough to prevent leakage of confidential data; however, they are only focused on “discouraging” employees from leaking data when they depart. Instead, enterprises need to implement technological measures to actually “stop” data leaks from occurring.

1) Consolidate all files into a data repository equipped with data leakage controls and real-time monitoring

Preventing data leaks by departing employees begins with consolidation and isolation of confidential enterprise files in data repositories and away from individual employee PCs, which can become exit points from which confidential data can be wrongfully leaked, deleted, or edited.

However, this security measure is just the basic foundation of security architecture to prevent data leaks by departing employees. Therefore, by integrating data leakage controls to restrict copying, screen-capturing, printing, and network-transferring the files out of file servers, can enterprises form multi-layered and tighter protection of confidential data.

If the employees need to bring confidential data out to their local storage for certain tasks, enterprises must ensure that all relevant activities regarding the files and users are tracked with logs. Logs are important for both preventative and corrective action as a response to data leaks by departing or departed employees since enterprises can not only detect wrongdoing beforehand but also identify the wrongdoers even after they have quit.

2) Control and manage portable storage device usage on endpoint PCs

Employees now have more kinds of portable storage devices, like USB drives and smartphones, at their disposal for better and improved work performance. However, these devices must be used under the organization-wide enforcement of strict control and thorough management to ensure that those devices do not leave the office premises with confidential data inside.

Together with enterprise policies and culture that discourage the use of storage devices for purposes other than those work-related, a series of technological measures must be implemented to deter employees from doing so. Firstly, enterprises must block the ports (USB, IEEE 1394, and so on) on the PCs used by the employees. By doing so, not only existing but also soon-to-depart employees cannot use portable storage devices to take confidential data from enterprise premises, whether such action was done by mistake or with malice. However, blocking all ports may not be the best option, if the enterprises require permitting specific ports for specific tasks or employees. For this case, it is imperative to implement a management tool that oversees all ports and connected devices on all employee PCs, and that is capable of enforcing and lifting restrictions for specific circumstances.

3) Wiping used hard disks before disposing or recycling used PCs after employee departures

When employees depart, it is common for enterprises first to format the used PCs, and then re-assign or destroy (if outdated) them. Unfortunately, this practice may trigger unexpected data leaks, as the remnant files that contain or are relevant to enterprise confidential data can be recovered, even though the PCs have been formatted beforehand.

Therefore, to prevent data leaks by recovery, enterprises must wipe remnant data on old PCs by using data erasure solutions like degaussing, overwriting with randomized data, or even the physical destruction of PCs. These three solutions achieve the same goal of data erasure, but only one provides enterprises with an extra advantage: overwriting wipes remnant data completely and maintains the disks as usable, while the other two methods do not. Thus the disks overwritten with randomized data can be recycled to be assigned to new employees, and the enterprises will not have to worry about possible rediscovery and leakage of remnant data.

When employees depart, enterprises must think beyond handling more paperwork and recruitment, as their confidential data can, or even worse, could have been at risk of being leaked. The biggest issue with data leaks by departing employees is the increased difficulty of identifying who the wrongdoers are, and of taking a course of corrective actions. The three key measures mentioned above address the importance of data leakage prevention before and after departing employees, whether their involvement direct or indirect. Check our next blog to see how Secudrive solutions bring these measures into practice for enterprises, whether big or small, to ensure that confidential data do not leave along with the departing employees.

Categories
Blog Data Erasure Device Control File Server Security NEWS Press Release

4 Ways How Departing Employees Can Leak Confidential Data on Their Way Out

When employees leave, it is not just about more paperwork and recruitment efforts. In fact, enterprises must also make sure that confidential data does not leave with the departing employees. According to Osterman Research, 69% of organization surveyed indicated that departing employees pose a threat of data leakage.

It is important to know “why” departing employees might leak confidential data. Often, the reasons are classified into two characteristics: accidental and malicious. Accidental data leaks are closely related to employees’ negligence of what confidential data means for enterprises and of potential consequences for data leaks. Ponemon Institute study showed that over 50% of the reasons why departing employees took confidential data was the perception that “everyone else did it when they left.”Meanwhile, malicious data leaks are about personal interests. Lately, many enterprises are warned of malicious data leaks, as data has increased in its monetary value, and competition among corporations, which may lead to corporate espionage cases, has never been fiercer.

Then, what are the four potential threats and how do employees attempt to leak the confidential data on their way out?

1) Employees depart with confidential data in their hands, literally.
Whether accidental or malicious, departing employees have a variety of ways to take confidential data on their way out. One of the easiest ways is to secretly export confidential data to employees’ storage devices like USB drives, external hard drives, and even CD/DVDs.In 2017, a data leakage case that involved global semiconductor firm Micron, which suffered data leakage of monetary scale up to hundreds of millions of dollars, was caused by ex-employees who used USB drives to export and steal intellectual properties.

2) Departed employees access old enterprise accounts.
Google Suite, Microsoft OneDrive, Dropbox… Enterprises now rely on cloud-based storage networks for their daily operations, for their convenience and functionality. Therefore, when employees depart, it is crucial that all accounts with access to confidential data are completely deleted. If not done so, enterprises face another risk of data leakage. Personnel changes or big layoffs are already a big burden, but acknowledging the importance of deactivating enterprise accounts must never be ignored.

3) Departed employees instruct current insiders to take confidential data for them.
Even if the relationship between departed employees and the enterprises has been severed for good, those employees can still find a way to get confidential data in their hands. By asking the current employees privately, departed employees can indirectly obtain confidential data, delivered online or offline. Because this case involves multiple individuals in and out of enterprises, a systematic approach that combines both organizational measures and technological solutions are required.

4) Remnant confidential data can be recovered from the PCs previously used by departing employees.
After the employees depart, it is a common practice to reassign enterprise PCs to new employees or dispose of them for good. Before doing so, enterprises initially format the hard disks to make sure that none of the remnant data are recoverable. However, this is insufficient to completely stop data leaks because disk formatting merely removes the path to remnant data, not the data itself. Therefore, proper data erasure, not conventional file deletion commands, must be the priority in preventing potential data leaks through data recovery.

For enterprises, departing employees must mean more than extra paperwork and recruitment efforts, because they can unexpectedly become a source of data leakage, which can be catastrophic to enterprises. It is a tough challenge; however, knowing the four potential methods of data leaks by departing employees, as mentioned above, is a solid starting point to ensure that none of the confidential data leave the enterprise premises.

Categories
Blog NEWS Press Release USB Copy Protection

Secudrive USB Copy Protection 3.1, an advanced USB copy protection solution for enterprises, released.

SAN JOSE, Calif., Apr. 4, 2017 – Brainzsquare announced its release of Secudrive USB Copy Protection 3.1, an advanced USB copy protection solution for enterprises.

Secudrive USB Copy Protection 3.1 focuses on securely distributing and sharing sensitive data relating to marketing, product development, and finance via a USB flash drive while preventing unauthorized copying.

Secudrive USB Copy Protection 3.1 is compatible with content that runs on MS Office, CAD, and custom applications, as well as multimedia and PDF-type documents supported by existing USB copy protection solutions. All functions of the applications are available while preventing unauthorized copying, printing, screen capturing, and network transferring. For example, a user can rotate a 3-dimensional drawing in AutoCAD, move to another sheet, and refer to a function cell in MS Excel, view an animation in MS Presentation, or read hidden comments in MS Word.

Secudrive USB Copy Protection 3.1 also works with complicated content consisting of multiple files. For example, an execution file refers to a database and requires multiple files to run. With Secudrive USB Copy Protection 3.1, the files can be distributed as a set while copy protection features are maintained.

Moreover, content can be updated after distribution. When a user plugs a USB flash drive into a PC, a built-in program automatically checks if anything needs to be added or changed and then updates content accordingly. The remote update feature can significantly reduce enterprises’ shipping costs for re-delivery of physical devices with new content.

Finally, the manager software can be installed on multiple PCs to enable mass production for situations where customers distribute content to thousands of branches or partners. Each PC with the manager software and the USB hubs can simultaneously produce up to 22 distributed USB flash drives without any USB duplicator.

“Customers can distribute the original files with Secudrive USB Copy Protection 3.1 while modifying the original file formats to PDF-types with existing solutions. When you distribute an MS Excel file or an AutoCAD 3-dimensional file, you can easily understand the distinction between the two if you compare what you use the original with what you only view PDF-style still image file. Secudrive USB Copy Protection 3.1 could be the most effective and secure solution for enterprises to distribute and share complicated and sensitive data,” said Simon Kang, CEO of Brainzsquare.

Categories
NEWS News Letter Notice Press Release

SECUDRIVE Sanitizer Enterprise Released

SAN JOSE, Calif., Jan. 12, 2015 -Brainzsquare has launched SECUDRIVE Sanitizer Enterprise, an integrated disk wiping management solution that has been catered for enterprise environments. SECUDRIVE Sanitizer Enterprise (SE) makes it possible to manage the wiping process of disks may be widely spread or in remote locations, making it an effective solution for disposing or reusing old computers and hard drives.

By using SE, users are able to initiate the wiping process for specific disks via download. The process has been streamlined and provides a one-click wiping system. Once users download the software to their computer, they launch the program, select the disk they would like to wipe and click start. The administrator can preset the wiping algorithm and wiping policy for user-activated wiping which will wipe all data including the OS. Meanwhile, the administrator can monitor the process once the wiping begins from the management console. Aside from user-activated wiping, the administrator can also forcibly wipe entire computers without having to grant users administrative rights through remote deployment. All logs and reports which include detailed PC and disk information can be gathered once the wiping process has finished.

SE utilizes various military grade algorithms such as Department of Defense (DoD 5220.22-M) and Gutmann algorithms which can overwrite the data up to thirty-five times. Various disk types such as ATA/IDE, SATA, SCSI, USB, and firewire can all be wiped as well. Unlike many similar wiping solutions, SE ditches the overly complicated interface by not requiring any additional BiOS or OS setup, having the ability to launch straight from Windows and allowing for simultaneous wiping of hundreds of disks.

“It is important to wipe disks immediately after they have been decommissioned. When old drives and computers are sent to storage or outsourced to a disk destruction services, they are at their most vulnerable state. We believe that our product makes it possible to wipe disks the instant they are no longer being used. The user or administrator can activate the wiping process with just one click before leaving the office and have a completely wiped drive the next morning, ready to be moved to storage or transported elsewhere. It is incredibly easy to use and the entire process is managed and monitored as well,” stated Simon Kang, CEO of Brainzsquare.

Categories
Blog NEWS Notice Press Release USB Sescurity

SECUDRIVE USB Management Server 3.0 (UMS) Released

SAN JOSE, Calif., Sept. 17, 2014 –Brainzsquare has released SECUDRIVE USB Management Server 3.0 (UMS), an integrated solution purpose-built for enterprise environments. The new technology leverages SECUDRIVE USB Basic+, a hardware encrypted USB, as well as USB Office+ and CAD+ for additional security protection.

UMS provides a variety of security features, including asset and password policy management, and IP protection to disable functions such as copy and paste, clipboard copying, screen capture, and printing. The solution also delivers inactive USB locking, remote destruction, real-time monitoring, USB logging, and real-time malware monitoring and protection. Ideal for enterprise use, UMS delivers Windows Active Directory (AD) integration and multiple security policies in separated network environments, including secure data transport for virtual desktop infrastructure (VDI) USBs, which can also be restricted for use with specific AD user accounts.

“UMS provides various options to remotely manage IP protected USBs as well as hardware encrypted USBs for  various enterprise network environments and their increasing security needs,” said, Simon Kang, CEO of Brainzsquare, Inc. “Employees can work with the secure USBs transparently while corporate IP is protected from both insider and outsider threats. This means customers will see a considerable improvement in the level of security with minimum loss of work efficiency.”

Security policies can be set for the intranet and extranet by installing UMS on different servers in separate network environments. For instance, USB Office+ can be calibrated on the intranet and IP protection features disabled to allow for a more efficient workflow. While online, strict IP protection features can be set by administrators to safeguard the security and privacy of enterprise users. If data is not required to be removed, SECUDRIVE IP protected USBs enable the safe transportation of data from VDI environments.

In addition, to help protect files stored on a flash drive from malware infection, SECUDRIVE USB Products feature Trend Micro’s antivirus program, Trend Micro USB Security (TMUSB). UMS also has the ability to update TMUSB’s pattern file locally for closed networks.

Trend Micro and Trend Micro USB Security are trademarks or registered trademarks of Trend Micro, Inc. Product specifications are subject to change without prior notice.

Categories
Blog File Server Security NEWS News Letter Press Release

SECUDRIVE File Server CAD Released

Brainzsquare announces the release of SECUDRIVE File Server CAD, a copy protection solution for design file storage servers into the market. This solution is specifically designed to bring the strongest copy protection for CAD files and is compatible with various CAD applications such as AutoCAD, Adobe Suite, and more. Designers can now securely store their important designs on file servers SECUDRIVE File Server CAD.

Sunnyvale, CA-October 14, 2013- Brainzsquare announces the release of SECUDRIVE File Server CAD, a copy protection solution for design file storage servers into the market. This solution is specifically designed to bring the strongest copy protection for CAD files and is compatible with various CAD applications such as AutoCAD, Adobe Suite, and more.

Design is an immense part of our growing society, and new innovations are what push us forward. Such designs are kept highly confidential within the company and designers are kept under a strict non-disclosure agreement until the release date. But what if the design files are leaked by an employee? Internal data leakage can severely damage a company’s business and reputation and companies need to be warier of how their design files are used and by whom.

SECUDRIVE File Server CAD is designed to prevent internal data leakage with a strong copy protection system for file servers. By applying this solution to the file server, data stored in the shared folder of the file server cannot be copied to the local disk or removable disk unless allowed by the administrator, preventing unauthorized copy. Other copy and paste functions such as Clipboard copy and paste, Save As function, and screen capture tools are disabled when the file is accessed. Administrators can also disable printing or customize printing with watermarks.

This solution also provides user identification and authentication feature. Only the users who have the client program installed on the PC are able to access the file server. With a detailed event log recording the time, date, user, file accessed, and action taken, administrators can monitor the status of their design files in real time. Files that are copied out with permission from the administrator are automatically backed up for security auditing purposes.

“SECUDRIVE File Server CAD is specifically designed to securely store design files and prevent unauthorized copying and leakage within a company. With copy protection, access authentication, detailed logs, and a manager program, company administrators can easily protect their important design files from internal leakage,” said Simon Kang, CEO of Brainzsquare.

If you have any questions or inquiries about this article or its contents, please contact us.

Categories
Blog NEWS News Letter Press Release USB Sescurity

SECUDRIVE USB Management Tool and Server Released

Brainzsquare announced the release of SECUDRIVE USB Management Tool and SECUDRIVE USB Management Server, simple integrated management software solutions that allow administrators to monitor SECUDRIVE secure USB flash drives, set security policies, validity settings, and collect detailed event logs to prevent security risks, into the market.

San Jose, CA-September 3rd, 2013– Brainzsquare announces the release of SECUDRIVE USB Management Tool and SECUDRIVE USB Management Server, simple USB management software solutions that allow administrators to manage, monitor, and set security policies on SECUDRIVE secure USB products, into the market.

Many organizations today require their employees to use secure USB flash drives when using it to carry company data. But with the risk of security breaches and malicious intent from within companies, what administrators need is not only copy protection, but secure USB drives with integrated management.

SECUDRIVE USB Management Tool and SECUDRIVE USB Management Server are here to allow companies to more easily manage, monitor, and secure their company data that are stored on employee USB drives. They are only compatible with SECUDRIVE secure USB drives such as USB Basic+, USB Office+, and USB CAD+. The management software provides administrators with a strong, integrated management system that allow them to name and register up to eight USB flash drives at a time, and set security policies such as password requirements, offline policies, and auto-lock timers. For our copy protected USBs, administrators can set print controls and copy protection for their documents and CAD files.

These management software also come with validity settings that allow administrators to set a valid time period for users to be able to login to their USB drives or use their current passwords, and set the maximum amount of times a user is allowed to login to their device. Administrators can also save policy settings to be able to conveniently access them again when needing to register more secure flash drives.

Another feature is remote destruction which allows administrators to remotely render a USB unavailable. After checking off the box for remotely destroying a USB and saving the policy setting, the user will not be able to access the contents of the secure USB drive the next time it is connected to the network. This is especially useful for companies if employees lose their USB drives, protecting company data from being seen with remote destruction and password protection.

A detailed event log is recorded for all SECUDRIVE USB drives registered, allowing administrators to view USB serial number, user ID, product type, actions taken, date, and time. This aides administrators in monitoring USB activity and can be used for auditing purposes.

“Utilizing SECUDRIVE USB Management Tool and SECUDRIVE USB Management Server’s integrated USB management system, administrators can easily monitor and set security policies from their computer. When combined with the use of our secure, copy-protected USB drives, it provides complete security and prevents confidential company information from being leaked, whether accidentally or intentionally. With the power of SECUDRIVE’s USB Management software, administrators have almost full authority over registered USB drives,” said Simon Kang, CEO of Brainzsquare.

If you have any questions or inquiries about this article or its contents, please contact us.

Categories
Blog NEWS News Letter Press Release USB Copy Protection USB Sescurity

Secudrive USB CAD released

Brainzsquare announced the release of specialized copy protection, a secure USB drive solution for design and CAD files, SECUDRIVE USB CAD, into the market. SECUDRIVE USB CAD offers copy protection for important design files and prevents unauthorized copy, print, or transfer. It also utilizes its compatibility with various CAD and design applications such as AutoCAD, OrCAD, Adobe Photoshop, Illustrator, and more. With other security features such as password protection, event logs, and validity settings, this solution is especially useful for designers who carry their designs with them.

San Jose, CA-August 19th, 2013-Brainzsquare announces the release of SECUDRIVE USB CAD, a specialized, copy- protected, secure USB solution developed especially for compatibility with design and CAD files, into the market. With other security features embedded into the solution, SECUDRIVE USB CAD is perfect for designers who carry their precious designs with them on the go.

With SECUDRIVE USB CAD, users can safely carry their important designs with them wherever they go. Whether it be on a business trip, a trip to the office, or a public PC center, it provides copy protection not only for document files, but for computer-aided design files as well. The copy protection solution is compatible with numerous CAD and design programs such as Adobe Photoshop, Adobe Illustrator, AutoCAD, OrCAD, and more. By adding specific programs to the USB’s copy protection system, important design files cannot be opened by programs other than the ones the user has specified, and cannot be copied, transferred, or saved onto the local PC. This protects the user’s copyrights on their designs and prevents unauthorized people from viewing or leaking the data.

This secure USB solution also features validity settings, Auto-lock, password protection, and print controls with watermark printing. Validity settings allow users to set a time period for the USB to be active and also set a limited number of logins. If the user has to leave the computer for a few minutes, there’s no need to worry there either. With Auto-lock, users can set a specific time a computer can go inactive before the USB automatically logs out of the device. But be aware, data not saved will be lost upon logout. SECUDRIVE USB CAD also comes with password protection. Users will be asked to input a password upon their first login. If the wrong password is entered over ten consecutive times, the data on the USB will be automatically and irreversibly erased. This is to prevent data leakage if the USB drive is ever lost or stolen. Users have a choice of turning off printing completely, which doesn’t allow any file to be printed off of the USB drive, or turn on printing with a customizable watermark.

Users can also login as read-only mode. This prevents files on the USB from being edited or overwritten. With AES 256-bit hardware encryption and an embedded anti-virus vaccination, users can rest assured that their design files are safe from virus infections and malware. Detailed event logs are also provided with information such as date, time, user name, USB serial number, and action taken.

“Conceptual drawings and designs for new product development warrant a high level of confidentiality within a company. Companies, as well as employees today, have worried about loss, theft, or leakage of their designs whenever it is taken out on a portable device to show to cooperative partners outside of company grounds. Designers can now carry their precious design files with them on SECUDRIVE USB CAD and not have to worry about the security risks of losing their flash drive, unauthorized copying, or virus-infected files. This USB solution gives the users all they need to protect their precious data in a simple and effective way,” said Simon Kang, CEO of Brainzsquare.

If you have any questions or inquiries about this article or its contents, please contact us.

Categories
Blog NEWS News Letter Press Release USB Sescurity

SECUDRIVE USB Basic Released

Brainzsquare announced the release of SECUDRIVE USB Basic, a new secure USB solution with hardware encryption which is strengthened by embedded functions such as password protection, self-destruction, auto-locking, login as read-only mode and anti-virus vaccine, designed to protect data in vulnerable situations.

San Jose, CA – August 27th, 2013 – Brainzsquare announced the release of SECUDRIVE USB Basic, a secure USB solution with hardware encryption, strengthened by embedded functions designed to keep important data secure in vulnerable situations.

With SECUDRIVE USB Basic, users can safely carry their important data without having to worry about the consequences of losing it because it provides security features designed to protect your data in everyday vulnerable situations. The flash drive comes with AES-256 bit hardware encryption which automatically encrypts all stored files in a secure zone of the drive. Users are asked to set up password protection upon their first login. If the wrong password is entered in excess of ten times, the contents of the USB drive will be permanently erased by its self-destruction function, keeping the data stored inside from being seen by prying eyes even if the flash drive is lost or stolen.

Auto-lock is also a feature of SECUDRIVE USB Basic which automatically closes all files currently open on the computer and logs you out of the USB drive secure zone if the user has been inactive for a specific amount of time. So whether you’re at your computer or away from the keyboard, you can relax, knowing your flash drive automatically logs you out after a certain amount of time. Users can also login as “read-only,” which allows users to only be able to access the data stored on the USB in a Read-Only format. This helps users avoid certain malware.

SECUDRIVE USB Basic comes with an embedded Trend Micro™ Antivirus program to prevent files stored on your flash drive from being compromised by virus infections. All files stored onto the flash drive will automatically be scanned and protected from viruses by Trend Micro’s program. Pattern analysis and engine updates are provided for one year from the date of purchase. Users can renew their subscription license annually through the SECUDRIVE website.

“If you don’t want anyone to access your files on your USB flash drive, you should use a hardware encrypted, secure USB. This has become essential over the last few years. SECUDRIVE USB Basic is one of the most effective hardware encrypted USB flash drives designed to keep valuable and confidential information secure in vulnerable situations. It’s simple but very effective in securing data for everyone,” said Simon Kang, CEO of Brainzsquare.

SECUDRIVE is the registered trademark of Brainzsquare.

TREND MICRO and Trend Micro USB Security are trademarks or registered trademarks of Trend Micro, Inc. Specifications of the product may change without prior notice.

If you have any questions or inquiries about this article or its contents, please contact us.

Categories
Blog Device Control NEWS News Letter Press Release

SECUDRIVE Device Control Released

Brainzsquare announced its release of SECUDRIVE Device Control, a new device access control solution for data leakage prevention for SMBs, into the market. SECUDRIVE Device Control makes it possible to allow or block devices such as USB flash drives, external HDDs, Smartphones and tablets from being connected to the USB ports of a corporate PC. The logs related to file activity in the allowed media are gathered and arranged for auditing.

San Jose, CA-August 1st, 2013-Brainzsquare announced its release of SECUDRIVE Device Control, a new device access control solution for data leakage prevention targeted for SMBs, into the market.

SECUDRIVE Device Control makes it possible to allow or block devices such as USB flash drives, external HDDs, Smartphones and tablets from being connected to the USB ports of a corporate PC. Even the allowed devices can be restricted to “read-only.” The logs relating to file activity in the allowed media are gathered and arranged for auditing purposes. For situations where the PC is carried out of the office, a separate security policy can be set and a log of all the activity that occurred will be gathered once the PC is returned to the office and reconnected with the manager program through the network. Once it has been installed on the PC, the security policy can be set to block prohibited devices which could help keep stop the infection of common USB viruses such as the Stuxnet virus.

Also, since smartphones are so versatile with its capabilities, SECUDRIVE Device Control provides multiple blocking options. The phone can be restricted to the only function as a removable storage device, or only allow it to use MTP, PTP, or tethering connections instead, thus allowing complete control over smartphone connections.

SECUDRIVE Device Control has the ability to deny or allow access to devices using the following ports in addition to the USB port: Serial/parallel, Bluetooth, network, WiFi, Printing, IrDA, CD/DVD, IEEE 1394, and even floppy.

SECUDRIVE Device Control comes in two versions, Basic and Enterprise. SECUDRIVE Device Control Basic is installed on a PC or server and is managed independently, therefore it is intended for smaller companies that have fewer than 20 PCs and industrial PCs which are not connected to the network. SECUDRIVE Device Control Enterprise allows the administrator to control device access and manage security policy by PC or by groups remotely, through the network. The administrator has a full view of all device access activity and can gather logs on files that have been transferred using the USB port.

“It doesn’t require any dedicated DB. It is easy to use, even for those of us who are not the most computer literate, meaning an IT specialist is not necessary. After installing it on a PC, a user cannot remove it unless the administrator allows it on the program. SECUDRIVE Device Control is targeted for SMBs. It is a must-have tool for SMBs to prevent internal data leakage and could be used along with our H/W encrypted and copy-protected USB products such as SECUDRIVE USB Basic, Office, CAD.” – Simon Kang, CEO of Brainzsquare.

If you have any questions or inquiries about this article or its contents, please contact us.