Irwin Mitchell chooses DeviceLock for network security

Law firm Irwin Mitchell has deployed Smartline's DeviceLock across the organisation to ensure data security and confidentiality.

Law firm Irwin Mitchell has deployed Smartline's DeviceLock across the organisation to ensure data security and confidentiality.

DeviceLock controls access to all ports and devices on the corporate network, including USB ports and memory sticks, preventing information from being removed or copied without authorisation.

"We recognise that one of the most common ways to lose [data] is through otherwise innocuous portable storage devices that users connect to our network," said Craig Thomas, IT network manager at Irwin Mitchell.

He said DeviceLock enables the firm to protect the endpoints of its network and still have the flexibility that enables staff to use laptops without compromising security. Individual ports and devices can be blocked or limited to particular users.

DeviceLock also protects Irwin Michell against hardware keyloggers. "Keyloggers are a major concern for companies of all sizes. It takes almost no time for for someone with malicious intent to install one on a PC and start siphoning off data," said Thomas.

Sacha Chahrvin, Smartline managing director UK, says Irwin Mitchell is proactively ensuring it is not vulnerable to security breaches and stays on the right side of data protection law by putting all the necessary protection in place before a problem has occurred.

Law firm gains British standard for IT quality >>

Firms risk breaching Data Protection Act with live data application tests >>

Comment on this article: computer.weekly@rbi.co.uk

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close