Pointsec delivers mobile network security

Mobile security firm Pointsec has released Device Protector to deliver port and storage data security management to networks and devices.

Mobile security firm Pointsec has released Device Protector to deliver port and storage data security management to networks and devices.

The product delivers port management, content filtering and optional media encryption to protect firms’ data from USB memory sticks and other potential threats

Erik Johannisson, Pointsec chief technology officer, said, “The risk of data loss through unprotected ports and plug and play storage devices is a serious concern among all organisations.

“Once sensitive information is copied through a port to a storage device – whether by a malicious insider or a well-meaning insider who is unaware of the security policy – it becomes vulnerable to loss, theft and unauthorised use,” he said.
With Pointsec Device Protector, Pointsec’s customers will now be able to control their employees’ use of personal removable media devices such as USB drives, Bluetooth smartphones, digital cameras and music players, that have wired or wireless connections to their work desktop or mobile PCs.

The product prevents or limits data transfers to these devices through a configurable security policy and content filtering, to ensure that corporate IT infrastructure cannot be used for illegal distribution of copyrighted content or installation of malicious software, as well as protecting data.

Managing the iPod generation


Comment on this article: computer.weekly@rbi.co.uk

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.






  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...