- Top 10 Recession-Proof IT Jobs
- 7 Hot IT Jobs That Will Land You a Higher Salary
- Link Building Strategies and Tips for 2014
- Top 10 Accessories for Your iPad Air
Network World - Workshare this week unveiled software designed to help companies keep sensitive information from being copied or distributed without authorization via portable devices.
Workshare Protect Mobile is a new component in the vendor's Protect Enterprise suite, which combines desktop- and network-based elements. The suite includes Protect Client, an application that enforces content security policies at the desktop; Policy Manager, a centralized management console for creating and distributing content policies; and Network Protect, a gateway appliance for auditing and controlling outbound network traffic.
Protect Mobile is designed to monitor such devices as laptops and USB key drives. It also tracks messages that originate on PDAs or public Web kiosks.
Preventing data leaks from portable storage devices is a challenge that should be shouldered by everyone in the company, says Ken Rutsky, executive vice president of marketing at Workshare. Like other elements of the suite, Protect Mobile puts control in users' hands. It alerts users when they attempt to copy or distribute sensitive data. In addition, Protect Mobile can take steps to remediate data loss, by removing hidden data in a file or encrypting content, for example.
Protect Mobile includes client software for laptops that can be programmed to automatically lock sensitive files.
For removable storage devices, it enforces identity-based content policies that govern whether a user is allowed to copy, print or save particular files. It covers USB, CD/DVD, iPod and U3 drives.
For PDAs, Protect Mobile assesses messages and takes action, such as blocking a message or sanitizing content before it leaves an enterprise e-mail network.
Pricing for Protect Mobile starts at $10 per user, per year. The rest of the suite costs $29 to $49 per user, per year, depending on configuration.
Read more about security in Network World's Security section.