View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
January 7, 2009

Credant shores up defences with Protector

Aims to safeguard government data

By Steve Evans

Credant Technologies has announced the release of Credant Protector, an endpoint data leakage prevention suite for government agencies.

The new offering aims to prevent malicious code attacks as well as enabling control of data ports on Department of Defense (DoD) and civilian networks.

Credant says Protector provides enhanced levels of protection for sensitive government data and enables employees to continue using removable media, such as USB drives, while reducing the risk of that data being lost, stolen, or corrupted.

The software can disable the auto run feature on removable media, making it more difficult for malicious code to be spread throughout the network.

According to Credant, Protector also features granular control, which detects and restricts data transfers by device, device type, or serial number; data awareness, which allows, blocks, or restricts the transfer of files to and from external storage devices; an intuitive management console, enabling unified management of policies, alerting preferences, logs, and custom reports; built-in compliance policies; and anti-hardware keylogger, which blocks both USB and PS/2 hardware keyloggers.

Pete Morrison, Vice President for Credant, said: “Sensitive government data is a precious asset that must be protected. The recent malicious code attack to the Department of Defense’s (DoD) network using USB drives demonstrates that removable media can increase the vulnerability of sensitive government data.”

“At the same time, removable media also enhances the government’s ability to share information – an essential tool in protecting the homeland, supporting the warfighter, and improving the efficiency and effectiveness of government. The Credant Protector solution helps the government meet these mission-critical needs, allowing IT administrators, rather than individual users, to control data ports.”

Content from our partners
Rethinking cloud: challenging assumptions, learning lessons
DTX Manchester welcomes leading tech talent from across the region and beyond
The hidden complexities of deploying AI in your business

In December 2008, the US Department of Defense banned employees from connecting certain USB devices to their computers due to the potential risk of exposing the DoD network, and sensitive information shared on it, to viruses or other malicious software. The announcement came after the US Congressional Budget Office confirmed its mailing list had been hacked in October 2008.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.