Indeed a technical control is not the only thing you should be looking
forward to in such a scenario.First, you need to set your policies
straight and results for non-compliance leading to consequences for
leaking intellectual property. When looking forward to technical
controls, checkout McAfee Data loss Prevention (DLP).It addresses
issues related to source code leakage as well. Go to

http://www.mcafee.com/us/enterprise/products/data_loss_prevention/data_loss_prevention.html

and also see the flash demo at

http://www.mcafee.com/us/local_content/demos/dlp_technical_demo/dlp_flash_demo.html

Regards,
Atif Azim






On Wed, Jun 18, 2008 at 1:16 AM, GSO GSO <[EMAIL PROTECTED]> wrote:
> DeviceLock is a great program.  Besides the very granular permission
> levels, I have also like the fact I can create temporary access codes.
>  So if an individual needs access to a USB device for an hour or even
> a month, I can give it to them.
>
> B
>
> http://GovernmentSecurity.org
>
> On Tue, Jun 17, 2008 at 2:43 PM, James Finnican <[EMAIL PROTECTED]> wrote:
>> DeviceLock and, disable access to the internet with exception to accepted 
>> resources, Wiki's subscribed sites. You can do this from IE directly or, 
>> configure it at the firewall if it allows.
>>
>> -----Original Message-----
>> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kevin Ortloff
>> Sent: Friday, June 13, 2008 9:31 AM
>> To: Ahmed Khalid; [email protected]
>> Cc: [EMAIL PROTECTED]
>> Subject: RE: Deny access to copy files
>>
>> If you don't mind spending a 2-3 thousand, there is a good product called ' 
>> DeviceLock '. This is a global policy enforcer that will restrict activates 
>> on USB, External Storage, etc, etc.. You can be very specific too like only 
>> a certain kind of thumb drive can be used by a particular individual ( this 
>> allows you to control who has the ability to even use an approved drive ). 
>> Or, maybe you only want read, but no write. You can do that too.
>>
>> Anyway, hope that helps. I'm sure there are other apps that can do this. I 
>> liked DeviceLock when I did my evals.
>>
>>
>>
>> -----Original Message-----
>> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ahmed Khalid
>> Sent: Sunday, June 01, 2008 11:20 AM
>> To: [email protected]
>> Cc: [EMAIL PROTECTED]
>> Subject: Deny access to copy files
>>
>> I am working for a software house, they are developing a software product 
>> and their requirement is to restrict programmers to take the code out of 
>> office premises due to company policy. I am trying to configure a windows 
>> based machine which denies access to copy files to external storage devices 
>> connected to USB. There is an NTFS permission "Read + Execute" I guess this 
>> could do the work but is there any other way to do it?
>>
>> They also don't need programmers to take the code with them in their email.
>> I can restrict SMTP and POP ports but when it comes to web based emails I am 
>> clueless,  How can I restrict web based emails like hotmail, gmail, yahoo 
>> there are so many of these and if I somehow manage to block all web based 
>> email sites someone can write a script to send emails, if not a script HTTP 
>> tunneling would bypass any checks and bounds defined by my proxy/gateway 
>> machine. How can I block such thing?
>>
>> Any help would be highly appreciated.
>>
>> Regards,
>> Ahmed Khalid
>>
>>
>>
>>
>> This email, its contents and attachments contain information from j2 Global 
>> Communications, Inc. and/or its affiliates which may be privileged, 
>> confidential or otherwise protected from disclosure. The information is 
>> intended to be for the addressee(s) only.  If you are not an addressee, any 
>> disclosure, copy, distribution, or use of the contents of this message is 
>> prohibited.  If you have received this email in error please notify the 
>> sender by reply e-mail and delete the original message and any copies. j2 
>> Global Communications. 6922 Hollywood Blvd., Hollywood, CA 90028.
>>
>
>
>
> --
> Security/Hacking Paper Contest Win $100
> http://GovernmentSecurity.org
>

Reply via email to