• No results found

Whitepaper. DriveLock. Endpoint Security for IGEL Thin-Clients

N/A
N/A
Protected

Academic year: 2021

Share "Whitepaper. DriveLock. Endpoint Security for IGEL Thin-Clients"

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

(1)

Whitepaper

DriveLock

Endpoint Security for IGEL Thin-Clients

(2)

Contents

1 INTRODUCTION ... 2

2 MULTI-DIMENSIONAL INTERFACE CONTROL ... 2

3 PROACTIVE MALWARE PROTECTION ... 3

4 DRIVELOCK ACTIVELY IMPROVES THE EMPLOYEES’ SECURITY AWARENESS ... 3

5 DATA SECURITY ALSO ON-THE-GO ... 3

6 INNOVATIVE ANALYSIS OPTIONS AND REPORTING ... 4

7 SUPPORTED SOLUTIONS ... 4

(3)

1 Introduction

Server-based computing, in particular terminal services and the provision of VDI environments in conjunction with Thin- and Zero-Clients, is becoming increasingly popular in small and medium-sized companies. It offers the possibility of a central, easy-to-manage system environment. With the Universal Management Suite (UMS), which is supplied free of charge, IGEL hardware and software clients allow sophisticated management. UMS offers a wide-range of features which enable the environment to be adapted to specific needs via zero touch deployment, thus conserving resources and reducing costs. In order to allow trouble-free efficient work IGEL is constantly working on improvements and optimizations with a particular focus on security. The partnership with CenterTools is proof of both companies' desire to improve security within networks.

When it comes to protecting existing USB interfaces, a lot of administrators contemplate how they can implement corporate IT security requirements without obstructing processes and the productivity of employees. Turning off this interface is often the administrator's solution of choice, even if this requires special thin-clients to be subsequently switched on again in a complex manner. The flexibility - in particular access rights exactly coordinated with the user or a user group - is often missing along with the option to encrypt copied data on external drives to protect the files from unauthorized access if the medium is lost.

2 Multi-Dimensional Interface Control

DriveLock offers the precise solution that restores lost flexibility to the company and simultaneously provides an optimal data security. In connection with IGEL Thin- and Zero-Clients, the unique interface control provides comprehensive protection for the USB interface and can just as easily configured as normal workplaces. Through the DriveLock Virtual Channel, which is already included in Linux based IGEL firmware (UD, IZ and UDC2),

(4)

The integrated DriveLock Antivirus On-Demand Scanner can be used to inspect an external storage device for malware before the approval for user access is granted. Antivirus On-Demand Protection is able to proactively prevent access if a virus or Trojan is discovered. Therefore preventing unwanted programs or malware from entering or executing an infection at the endpoint or even on the central terminal server.

4 DriveLock actively improves the

employees’ security awareness

DriveLock also helps to improve the security awareness of employees. For example, you can allow access to external interfaces only after the user has first read and accepted the company directives or a security notice. If desired, you can require users to re-enter their password. Therefore employees and DriveLock become important components of your future-oriented security strategy.

5 Data security also on-the-go

In connection with DriveLock Encryption 2-Go - already included in the DriveLock Thin-Client Suite license - external drives can be automatically and transparently encrypted for the users. Therefore the information on a USB stick is protected from unauthorized use in case it is lost. In comparison to other solutions, the encryption in DriveLock is closely interlinked with the drive control. DriveLock encryption in turn enables a highly simplified handling of the central policies for the secure handling of data and external storage devices. DriveLock provides the user with an additional network drive within their working environment when a storage device previously encrypted with DriveLock is used on a Thin-Client. This network drive allows files to be saved encrypted without requiring any further actions by the user. In addition the intelligent management ensures that access to the unencrypted area is not possible.

(5)

Reporting

With the DriveLock Control Center you can analyze and monitor the usage of removable devices as well as data transfers through flexible reporting and dynamically created requests.

In case of legal requirements regarding the transfer of personal data you can prohibit access to personal data or encrypt such data in line with corporate policies. Additionally the DriveLock Control Center offers a quick overview of all DriveLock agents within your environment and delivers current results about status and licensing.

But the DriveLock Control Center can do a lot more. In case of an emergency, the advanced forensics options of DriveLock can be used to analyze an incident from different perspectives and angles to find a possible data breach. With a simple drill down methodology you will know from which computers a certain file was copied to which USB stick, if it was renamed and what other files were transferred at the same point in time. Need to go deeper? DriveLock Control Center will show you all computers on which a USB stick was used - making finding the “needle in the haystack” faster and easier than ever.

For more information see: http://www.drivelock.de/en/thin-client-suite

7 Supported solutions

DriveLock is supported by all IGEL Universal Desktop (UD) and IGEL Zero (IZ) clients.

DriveLock is also supported by all software Thin-Clients converted using the IGEL Universal Desktop Converter 2 (UDC2).

(6)

The German company CenterTools is one of the international leading specialists for IT and data security. The company has made a name for itself worldwide with its award winning end-point security system DriveLock. DriveLock particularly stands out from the competition through its extremely granular functionality to control USB and other devices as well as through the encryption options for hard drives (FDE) and data on mobile storage devices. With the comprehensive control of all applications and its completely integrated antivirus module, DriveLock offers complete worldwide protection against digital hazards that threaten any kind of endpoint device. DriveLock’s scalability makes it the perfect solution for companies of any size - from

Fortune500 companies to SMB's. The ability to fine tune rules and policies means DriveLock can be adjusted to suit the company, and not the other way around. Compliance with legal frameworks and regulations can be assured and clearly illustrated through precise and organized reporting. With its perfectly designed concept DriveLock can be deployed without additional software or hardware, and is therefore able to save time and money.

With its headquarters in Ludwigsburg and offices in Munich, Zurich, Vienna, Cambridge, Cincinnati and Portland, CenterTools supports customers worldwide in over 30 countries.

(7)

Copyright

Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user.

© 2015 CenterTools Software SE. All rights reserved.

CenterTools and DriveLock and others are either registered trademarks or trademarks of CenterTools Software SE or its subsidiaries in the United States and/or other countries.

References

Related documents

Absolute persistence module; HP BIOSphere Gen4; HP Device Access Manager; HP DriveLock and Automatic DriveLock; HP Password Manager; HP Secure Erase; HP Security Manager;

With more than 4 million copies in print in the English language alone, Man's Search for Meaning, the chilling yet inspirational story of Viktor Frankl's struggle to hold on to

This Guide includes a list of subfields (focus areas) and the corresponding electives within each focus area that are offered through the Department of Electrical and

Object of a downed by daylight, a general killer perk unique to you need to describe survivor looks in the the obsession.. Kind is a teachable killer make missed and recurring terms,

Compared to other types of colleges, for-profit colleges have the dubious distinction of the highest share of students with debt, with the highest debt levels for degree

Thin client computing is booming and not without reason: It’s solving the growing management problem of PCs (fat clients), and is introducing huge savings on support, hardware

Out of the box – Windows provides no central monitoring capabilities for BitLocker, and the sharing of pre-boot credentials among all users of a protected

Removable Media Encryption Scenarios Not Supported By Windows 7 The following list contains just a few examples of common removable media encryption scenarios that