Autodesk Building Systems customer created library protection

Posted on 2006-11-22
Last Modified: 2013-12-04
We use autodesk building systems and  we created our own library for the mechanical elements . we dont want this library to be copied by our employee. and want to know what kind of protection to be taken?

we use Windows XP Pro and each PC includes this library.
Question by:togay
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
LVL 38

Accepted Solution

Rich Rumble earned 500 total points
ID: 17996117
This falls inline with few similar questions here on EE recently. I don't personally use the software, but I'm sure it also lacks the kind of security that many "company secrets" DB's have. You should keep in mind the following, Security is a Process, not a Program. There are also different levels of obtaining the information, screen shots can be taken of the data and then emailed, ftp'd or copied to a CD/Floppy/USB drive. That may be acceptable to the thieves, they might not want the entire file or DB in the form of a DB entry or file, the screen shot might do the trick for them. You should turn up logging and audit those logs, there are tools like Snare or KiwiTools that might help you to automate looking through logs and alerting you in real-time to their access. AutoDesk may be able to do some of this for you as well:
Users have been known to print out entire DB's as well, one company I consulted for had a user that brought in his/her own printer and paper so there would be less suspecion as the DB was quite large and they managed to print reams and reams of the DB.
If you don't already, here are some good company policies that are easy to make your own: Make sure they are read/signed by the employee.

Author Comment

ID: 17996677
we are looking for an encryption software which can encrypt the library ( about 400 MB). at the same time Autodesk BS software in our PC could reach the library whithout any restriction. is there a solution like that.
screen shots, print outs is not a problem for us. The complete library shouldnt be copied that is what we want.
LVL 38

Expert Comment

by:Rich Rumble
ID: 17996835
Have you contacted AutoDesk about this, perhaps they have something like that already. There are a variety of file/folder/partition encryption software out there that might suit your need. The crux is, that if the users can access the library, they will be able to decrypt it, and possibly save the plain-text version of it. You might have a look at TrueCrypt and see if it will work for your needs, copy the DB to a truecrypt container and then see if the software can open it, the container has to be decrypted first, the container is stored in memory unencrypted, and the file is never decrypted onto the disk, which is the same for most encryption software. I'll bet that audodesk has a feature where you can encrypt the content of the DB, most apps like it seem to.

Expert Comment

ID: 20286604
Forced accept.

EE Admin

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor ( Top Charts is a view in which you can set seve…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question