Whitepaper. DriveLock. Endpoint Security for IGEL Thin-Clients



Similar documents
Secure your data. Security Made in Germany

DriveLock and Windows 8

DriveLock and Windows 7

DriveLock Quick Start Guide

Technical Note Creating a Windows PE Recovery CD

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Server based computing An introduction to server based computing, its advantages and how it works.

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

DriveLock Websecurity

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Host-based Protection for ATM's

isheriff CLOUD SECURITY

Symantec Messaging Gateway powered by Brightmail

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Windows Least Privilege Management and Beyond

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

ACER ProShield. Table of Contents

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

WhitePaper THIN CLIENTS

Proven LANDesk Solutions

DeviceLock Virtual DLP: Overview & Scenarios

DATABASES AND ERP SELECTION: ORACLE VS SQL SERVER

Symantec Backup Exec 2012

Datacenter Management Optimization with Microsoft System Center

How To Live Migrate In Hyperv On Windows Server 22 (Windows) (Windows V) (Hyperv) (Powerpoint) (For A Hyperv Virtual Machine) (Virtual Machine) And (Hyper V) Vhd (Virtual Hard Disk

PULSE SECURE FOR GOOGLE ANDROID

endpoint Antivirus Application Control Removable Device Encryption enjoy Data protection

DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management

Sage ERP I White Paper. ERP and the Cloud: What You Need to Know

Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager. Published: 07 March 2013

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

MBAM Self-Help Portals

Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery.

AVeS Cloud Security powered by SYMANTEC TM

Integrating F5 Application Delivery Solutions with VMware View 4.5

Endpoint protection for physical and virtual desktops

WatchGuard SSL 2.0 New Features

Symantec Desktop and Laptop Option 7.6

V1.4. Spambrella Continuity SaaS. August 2

Brainloop Cloud Security

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

Patch Management SoftwareTechnical Specs

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Desktop Virtualization Solutions Simplified Appliance

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

How To Buy Nitro Security

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Trend Micro OfficeScan 11.0 SP1. Best Practice Guide for Malware

McAfee Web Reporter Turning volumes of data into actionable intelligence

The Impact of HIPAA and HITECH

Protecting Your Roaming Workforce With Cloud-Based Security

White Paper: Whole Disk Encryption

Zone Labs Integrity Smarter Enterprise Security

Choosing a Server to Fit your Business

Advantages of Managed Security Services

Desktop Virtualization Made Easy Execution Plan

How Drive Encryption Works

Google Apps Deployment Guide


Did you know your security solution can help with PCI compliance too?

Remote Maintenance with Security Appliances FL MGuard RS2000 and RS4000. Economic and Reliable Service

What Do You Mean My Cloud Data Isn t Secure?

Protecting the Infrastructure: Symantec Web Gateway

Cyberoam Perspective BFSI Security Guidelines. Overview

Symantec Messaging Gateway 10.5

Monitoring Microsoft SQL Server Audit Logs with EventTracker The Importance of Consolidation, Correlation, and Detection Enterprise Security Series

RSA SecurID Software Token Security Best Practices Guide

Endpoint Protection Small Business Edition 2013?

Windows Server ,500-user pooled VDI deployment guide

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Protect Your Business and Customers from Online Fraud

Compliance series Guide to meeting requirements of USGCB

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper

Symantec Messaging Gateway 10.6

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

Maximizing Configuration Management IT Security Benefits with Puppet

Centrify-Enabled Samba

Choosing a Server to Fit Your Business. A step-by-step guide to help businesses maximize the benefits of Intel. Xeon -based server solutions.

VDI Clients Delivering Tomorrow's Virtual Desktop Today

Top five strategies for combating modern threats Is anti-virus dead?

The Basic offering delivers Microsoft Navision information in predefined or customized information

Upgrading Client Security and Policy Manager in 4 easy steps

Maximize your Remote Desktop Services

IGEL Linux and Microsoft Remote Desktop Connection Broker 2012 R2

Remote Desktop solutions. CAS genesisworld with Remote Desktop solutions

Transcription:

Whitepaper DriveLock Endpoint Security for IGEL Thin-Clients CenterTools Software SE 2015

Contents 1 INTRODUCTION... 2 2 MULTI-DIMENSIONAL INTERFACE CONTROL... 2 3 PROACTIVE MALWARE PROTECTION... 3 4 DRIVELOCK ACTIVELY IMPROVES THE EMPLOYEES SECURITY AWARENESS... 3 5 DATA SECURITY ALSO ON-THE-GO... 3 6 INNOVATIVE ANALYSIS OPTIONS AND REPORTING... 4 7 SUPPORTED SOLUTIONS... 4 8 ABOUT CENTERTOOLS... 5 1

1 Introduction Server-based computing, in particular terminal services and the provision of VDI environments in conjunction with Thin- and Zero-Clients, is becoming increasingly popular in small and medium-sized companies. It offers the possibility of a central, easy-to-manage system environment. With the Universal Management Suite (UMS), which is supplied free of charge, IGEL hardware and software clients allow sophisticated management. UMS offers a wide-range of features which enable the environment to be adapted to specific needs via zero touch deployment, thus conserving resources and reducing costs. In order to allow trouble-free efficient work IGEL is constantly working on improvements and optimizations with a particular focus on security. The partnership with CenterTools is proof of both companies' desire to improve security within networks. When it comes to protecting existing USB interfaces, a lot of administrators contemplate how they can implement corporate IT security requirements without obstructing processes and the productivity of employees. Turning off this interface is often the administrator's solution of choice, even if this requires special thin-clients to be subsequently switched on again in a complex manner. The flexibility - in particular access rights exactly coordinated with the user or a user group - is often missing along with the option to encrypt copied data on external drives to protect the files from unauthorized access if the medium is lost. 2 Multi-Dimensional Interface Control DriveLock offers the precise solution that restores lost flexibility to the company and simultaneously provides an optimal data security. In connection with IGEL Thin- and Zero-Clients, the unique interface control provides comprehensive protection for the USB interface and can just as easily configured as normal workplaces. Through the DriveLock Virtual Channel, which is already included in Linux based IGEL firmware (UD, IZ and UDC2), access rights and security settings for external storage devices can be configured with great detail, even for the serial number of an individual USB stick. With the help of the central DriveLock Management Console and guidelines you can specify which user is allowed to use which USB drives and if write access or only read access is possible. Using the integrated file filter, you can stipulate what types of files may be read from or written to an external drive. As an optional extra, accurate logging of access to files is also available. 2

3 Proactive Malware Protection The integrated DriveLock Antivirus On-Demand Scanner can be used to inspect an external storage device for malware before the approval for user access is granted. Antivirus On-Demand Protection is able to proactively prevent access if a virus or Trojan is discovered. Therefore preventing unwanted programs or malware from entering or executing an infection at the endpoint or even on the central terminal server. 4 DriveLock actively improves the employees security awareness DriveLock also helps to improve the security awareness of employees. For example, you can allow access to external interfaces only after the user has first read and accepted the company directives or a security notice. If desired, you can require users to re-enter their password. Therefore employees and DriveLock become important components of your future-oriented security strategy. 5 Data security also on-the-go In connection with DriveLock Encryption 2-Go - already included in the DriveLock Thin-Client Suite license - external drives can be automatically and transparently encrypted for the users. Therefore the information on a USB stick is protected from unauthorized use in case it is lost. In comparison to other solutions, the encryption in DriveLock is closely interlinked with the drive control. DriveLock encryption in turn enables a highly simplified handling of the central policies for the secure handling of data and external storage devices. DriveLock provides the user with an additional network drive within their working environment when a storage device previously encrypted with DriveLock is used on a Thin-Client. This network drive allows files to be saved encrypted without requiring any further actions by the user. In addition the intelligent management ensures that access to the unencrypted area is not possible. 3

6 Innovative Analysis Options and Reporting With the DriveLock Control Center you can analyze and monitor the usage of removable devices as well as data transfers through flexible reporting and dynamically created requests. In case of legal requirements regarding the transfer of personal data you can prohibit access to personal data or encrypt such data in line with corporate policies. Additionally the DriveLock Control Center offers a quick overview of all DriveLock agents within your environment and delivers current results about status and licensing. But the DriveLock Control Center can do a lot more. In case of an emergency, the advanced forensics options of DriveLock can be used to analyze an incident from different perspectives and angles to find a possible data breach. With a simple drill down methodology you will know from which computers a certain file was copied to which USB stick, if it was renamed and what other files were transferred at the same point in time. Need to go deeper? DriveLock Control Center will show you all computers on which a USB stick was used - making finding the needle in the haystack faster and easier than ever. For more information see: http://www.drivelock.de/en/thin-client-suite 7 Supported solutions DriveLock is supported by all IGEL Universal Desktop (UD) and IGEL Zero (IZ) clients. DriveLock is also supported by all software Thin-Clients converted using the IGEL Universal Desktop Converter 2 (UDC2). For further information, visit edocs.igel.com. 4

8 About CenterTools The German company CenterTools is one of the international leading specialists for IT and data security. The company has made a name for itself worldwide with its award winning end-point security system DriveLock. DriveLock particularly stands out from the competition through its extremely granular functionality to control USB and other devices as well as through the encryption options for hard drives (FDE) and data on mobile storage devices. With the comprehensive control of all applications and its completely integrated antivirus module, DriveLock offers complete worldwide protection against digital hazards that threaten any kind of endpoint device. DriveLock s scalability makes it the perfect solution for companies of any size - from Fortune500 companies to SMB's. The ability to fine tune rules and policies means DriveLock can be adjusted to suit the company, and not the other way around. Compliance with legal frameworks and regulations can be assured and clearly illustrated through precise and organized reporting. With its perfectly designed concept DriveLock can be deployed without additional software or hardware, and is therefore able to save time and money. With its headquarters in Ludwigsburg and offices in Munich, Zurich, Vienna, Cambridge, Cincinnati and Portland, CenterTools supports customers worldwide in over 30 countries. 5

Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. 2015 CenterTools Software SE. All rights reserved. CenterTools and DriveLock and others are either registered trademarks or trademarks of CenterTools Software SE or its subsidiaries in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. 6