DeviceLock Announces Support for President Obama’s Insider Threat Policy
DeviceLock, Inc., a worldwide leader in endpoint data loss prevention (DLP) software, today announced full support for President Obama’s National Insider Threat policy for IT Security. DeviceLock’s Endpoint DLP Suite software can be a key element in a comprehensive arsenal of IT security tools for data loss prevention – preventing the unauthorized transfer of sensitive information outside of federal government networks.
“With his recent memorandum for the heads of executive departments and agencies, President Obama has recognized and validated the concern that many IT security professionals share,” said Vince Schiavo, DeviceLock CEO. “Namely, that the vast majority of serious data breach incidents are not being caused by malicious outside hackers, but by trusted insiders with authorized access.”
A Ponemon study published earlier this year found that 63 percent of serious data breach incidents are caused by insiders – either through unintentional mistakes, negligence or misconfigurations.
The president’s memorandum specifically promotes “the development of effective insider threat programs within departments and agencies to deter, detect, and mitigate actions by employees who may represent a threat to national security. These threats encompass … unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems.”
DeviceLock’s Endpoint DLP Suite software provides government IT security professionals the ability to set and enforce policies for the transfer of sensitive data outside of protected government networks from millions of government servers, laptops, desktops, smartphones and tablets. The software provides comprehensive controls over what sorts of information may be printed, sent in emails, burned to CD or DVD, transferred to USB drives, stored on Dropbox or other cloud-file-sharing services, etc. The policy can specify which types of transfers should be allowed, blocked or logged. In this way network security managers can be immediately alerted when someone tries to move data outside the organization in a way that violates policy.
The most notorious example of the need for this type of software is the incident in which a US Army enlisted soldier with authorized access to sensitive State Department documents burned a large number of files onto a CD-ROM and passed the information to Wikileaks. Had the installation where he worked been using DeviceLock’s software, the incident could have been prevented. The transfer attempt would have been blocked, the files in question copied to a secure archive and IT security management would have been alerted immediately.
For more information visit www.devicelock.com.
About DeviceLock, Inc.
Since 1996, DeviceLock, Inc. has been providing endpoint device control and data leak prevention software solutions to businesses of all sizes and industries. Protecting more than four million computers in more than 60,000 organisations worldwide, DeviceLock has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. DeviceLock, Inc. is an international organisation with offices in San Ramon, California, London (UK), Ratingen (Germany), Moscow (Russia) and Milan (Italy).