Solved

security software that will prevent firewire/jump CD ROM data transfers?

Posted on 2006-06-20
6
545 Views
Last Modified: 2013-11-15
looking for any information to help me with this issue..

I'm trying to find some piece of software that will allow me to set restrictions on the way data is transferred on my network.

For instance, prevent or log data transfers to firewire or jump drives.

And, more importantly, perhaps log data transfers to CD Rom drives.

There must be something out there that does this kind of thing.

Currently, I am trying to restrict CD burning priveleges to one central computer and I'd like that computer to keep a record of what's getting burned....

any help would be appreciated. looking for this on the net even with good google skills is like getting my teeth pulled out.

it has to exist... doesn't it??
0
Comment
Question by:ajrosales
6 Comments
 
LVL 10

Expert Comment

by:mcrossland
ID: 16946201
Hi ajrosales,
Here is one place that you could start that would help with the USB issue across the board if you have active directory.
http://www.windowsdevcenter.com/pub/a/windows/2005/11/15/disabling-usb-storage-with-group-policy.html 
There are also some software vendors listed in that article.

Just put the PC's that you want to restrict USB access to in an OU of your choice or just use an existing OU.

Hope this helps,
Mike
0
 

Author Comment

by:ajrosales
ID: 16948444
i found a piece of software that tracks usb... but it doesn't seem to create any log files for the burning of CDs...

http://www.devicelock.com/

is there any software that specifically tracks this type of usage? I still can't seem to find anything on the web.. :(
0
 
LVL 77

Expert Comment

by:arnold
ID: 16948543
You you can restrict access to certain software by modifying the permissions to deny certain users access to certain application.  One simple option is to prevent users  from accessing the system where the logs are.
You can automate the burning process.  I.e. someone has to drop what they need into a burn directory.  Then you would provide a user with an interface to initiate a burn.  using this interface you can log whatever you desire including keeping a copy of the ITEM.

If you are concerned with what people burn, why not remove the burn functionality all together?

0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 

Author Comment

by:ajrosales
ID: 16948656
I am not trying to prevent people from burning.. merely keep a record of what is being burned. data loss of intellectual property, you see.. I need to know what's happening. I am only trying to gather information.
0
 
LVL 5

Accepted Solution

by:
kevinf40 earned 250 total points
ID: 16949955
They are expensive, but several products will do what you require (and a whole lot more)

Sureview
Digital Guardian
Tablus

These all offer a wide range of features to manage, log and if required block user access to files - they can even log what it copied and pasted, what's emailed and what is entered into web pages.
Some even offer pop up functionality so that if a used attempts certain actions e.g. copying data to removable media, they are presented with a box saying that this action may not be permitted and is being logged, with a text box for them to enter the justification for what they are doing.

I think Tablus even has a network based device to track what data flows in and out of your network.

These may be overkill for your needs, depending on your company size and how sensitive the data concerned is, bt have a look.

cheers

Kevin
0
 
LVL 13

Expert Comment

by:hstiles
ID: 16952334
There are several products that I've tried.

GFI Languard Portable Storage control or, now, Endpoint Security 3.

You create access policies for your storage devices, which enables you to block usb flash drives, music players, cameras, floppy drives, CD roms, or only provide read only access.  This costs around £1 per machine.

Appsense.  This enables you to define application and environment policies to prevent user or non-trusted access to certain file types.  This also allows blocking of USB drives, but isn;t as comprehensive as the GFI product.  This works out at around £30 per client.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ensuring effective and secure communication in the age of healthcare BYOD.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
This video demonstrates how to use each tool, their shortcuts, where and when to use them, and how to use the keyboard to improve workflow.
Video by: Tony
This video teaches viewers how to export a project from Adobe Premiere Pro and the various file types involved.

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question