Solved

security software that will prevent firewire/jump CD ROM data transfers?

Posted on 2006-06-20
6
547 Views
Last Modified: 2013-11-15
looking for any information to help me with this issue..

I'm trying to find some piece of software that will allow me to set restrictions on the way data is transferred on my network.

For instance, prevent or log data transfers to firewire or jump drives.

And, more importantly, perhaps log data transfers to CD Rom drives.

There must be something out there that does this kind of thing.

Currently, I am trying to restrict CD burning priveleges to one central computer and I'd like that computer to keep a record of what's getting burned....

any help would be appreciated. looking for this on the net even with good google skills is like getting my teeth pulled out.

it has to exist... doesn't it??
0
Comment
Question by:ajrosales
6 Comments
 
LVL 10

Expert Comment

by:mcrossland
ID: 16946201
Hi ajrosales,
Here is one place that you could start that would help with the USB issue across the board if you have active directory.
http://www.windowsdevcenter.com/pub/a/windows/2005/11/15/disabling-usb-storage-with-group-policy.html 
There are also some software vendors listed in that article.

Just put the PC's that you want to restrict USB access to in an OU of your choice or just use an existing OU.

Hope this helps,
Mike
0
 

Author Comment

by:ajrosales
ID: 16948444
i found a piece of software that tracks usb... but it doesn't seem to create any log files for the burning of CDs...

http://www.devicelock.com/

is there any software that specifically tracks this type of usage? I still can't seem to find anything on the web.. :(
0
 
LVL 78

Expert Comment

by:arnold
ID: 16948543
You you can restrict access to certain software by modifying the permissions to deny certain users access to certain application.  One simple option is to prevent users  from accessing the system where the logs are.
You can automate the burning process.  I.e. someone has to drop what they need into a burn directory.  Then you would provide a user with an interface to initiate a burn.  using this interface you can log whatever you desire including keeping a copy of the ITEM.

If you are concerned with what people burn, why not remove the burn functionality all together?

0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 

Author Comment

by:ajrosales
ID: 16948656
I am not trying to prevent people from burning.. merely keep a record of what is being burned. data loss of intellectual property, you see.. I need to know what's happening. I am only trying to gather information.
0
 
LVL 5

Accepted Solution

by:
kevinf40 earned 250 total points
ID: 16949955
They are expensive, but several products will do what you require (and a whole lot more)

Sureview
Digital Guardian
Tablus

These all offer a wide range of features to manage, log and if required block user access to files - they can even log what it copied and pasted, what's emailed and what is entered into web pages.
Some even offer pop up functionality so that if a used attempts certain actions e.g. copying data to removable media, they are presented with a box saying that this action may not be permitted and is being logged, with a text box for them to enter the justification for what they are doing.

I think Tablus even has a network based device to track what data flows in and out of your network.

These may be overkill for your needs, depending on your company size and how sensitive the data concerned is, bt have a look.

cheers

Kevin
0
 
LVL 13

Expert Comment

by:hstiles
ID: 16952334
There are several products that I've tried.

GFI Languard Portable Storage control or, now, Endpoint Security 3.

You create access policies for your storage devices, which enables you to block usb flash drives, music players, cameras, floppy drives, CD roms, or only provide read only access.  This costs around £1 per machine.

Appsense.  This enables you to define application and environment policies to prevent user or non-trusted access to certain file types.  This also allows blocking of USB drives, but isn;t as comprehensive as the GFI product.  This works out at around £30 per client.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
2-Factor authentication VPN for staff and suppliers 6 43
Top honey pots & reviews of canary 7 53
moto 4g plus phone apps 5 41
Cannot install SkypeSetup.exe 4 33
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
It’s the first day of March, the weather is starting to warm up and the excitement of the upcoming St. Patrick’s Day holiday can be felt throughout the world.
This video demonstrates how to use each tool, their shortcuts, where and when to use them, and how to use the keyboard to improve workflow.
Using Adobe Premiere Pro, the viewer will learn how to set up a sequence with proper settings, importing pictures, rendering, and exporting the finished product.

680 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question