Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



Manage your removable devices on your company network and control data leakage

December 2007 by Marc Jacob

Mobilegov, a global player in the IT security market, launches the professional version of its security solution to protect computers and removable devices.

The solution is called Device Authenticator® PRO Edition and does not only secure any device connections made to computers on the network (PDA, USB sticks, Ipods, etc.), it also checks the integrity of the computers themselves to avoid any hardware identity bypasses.

Device Authenticator® PRO Edition gives you control on any devices that connect to your machines (USB sticks, Hard drives, PDAs, Smartphones, MP3 player, etc.) that you wish to authorise, it also gives you the ability to audit the connection activity on your machines. Know better your Information System by controlling the entry points through which the information leaks or through which malware are introduced, and avoid significant financial and competitive losses for your organisation.

Maintain an appropriate and controlled use of the productivity tools that are the user’s removable devices:

Revealed during the Infosecurity show in Paris, the solution uses a patented technology which allows the unique identification of any computer or device based on its hardware configuration. Thanks to this device identification approach, Device Authenticator® PRO Edition allows you to set-up authorisation policies for a device or a family of devices, on a specific computer or by networks, which allows your users to fully use their productivity tools without any risks for the company.

Device Authenticator® PRO Edition can for example:
• Avoid data leaks and virus introduction on some or all of the computers, by only authorising the USB key of the manager but forbidding the use of an internal or external burner, a Smartphone, a removable drive, a PDA, or a printer.
• Request the connection of the user’s USB stick to access to his session.
• Check the integrity of a PC through its hardware configuration and avoid any computer identity theft.
• Protect your user’s PCs even when outside of the network.

See previous articles


See next articles