View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
August 4, 2008

Weblight aims to prevent data leakage with DeviceLock’s software

Lighting service provider Weblight has selected DeviceLock's endpoint device control security software to monitor the data going out from employees' computers and prevent leakage of vital information from the corporate system.

By CBR Staff Writer

Matthew Cole, IT systems administrator at Weblight, said: We were concerned that unauthorised devices could be connected to the IT systems, especially our laptops, allowing confidential information to be lost or stolen. Our sales team works right across the country, so the fear was that confidential customer and company information could be at risk.

DeviceLock software will enable Weblight’s IT administrators to control, log, shadow-copy and audit employees’ access to computer ports and peripheral devices including local, network and virtual printers. It can also block operations of USB and PS/2 hardware keyloggers. The administrators can remotely change the settings of individual computers from a central location to restrict the access of vital information.

DeviceLock’s software can be implemented for Microsoft Windows operating systems and its central management is natively integrated with Microsoft Active Directory.

With DeviceLock, Weblight can decide which groups or employees can be allowed to download data on to a Windows Mobile or Palm OS device. The software monitors data leakage threats from mobile devices such as the possibility of losing data when a user syncs their mobile device with their work PC.

Sacha Chahrvin, managing director at DeviceLock UK, said: Weblight has a large remote workforce so for a company that wants to protect the data on its employees’ laptops this is a really proactive step. As well as the issue of data leakage, viruses, spyware and other sinister malware programmes can easily be transmitted through USB devices so a comprehensive endpoint security solution is the most effective way to mitigate this risk.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU