SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
NetWrix Customer Case Study



                                         USB Port Protection that Hardens Endpoint Security and
                                         Streamlines Compliance
                                         “NetWrix USB Blocker accomplished what we needed it to do. The
                                         fact that it just works was enough justification for us to like the
                                         product.”
Customer: Large Collection Agency        Mark Precilla, Network Support, Large Collection Agency
Number of Users: 500
Industry: Banking and Finance            As one of the leading collection agencies in Canada, this firm helps
                                         its customers manage their financial portfolios by way of leading edge
Solution:                                technology and cost-effective services designed specifically for a wide
Endpoint Management                      variety of individual needs. The agency, founded in 2002, continues to
Compliance                               grow on a steady basis, and the company’s needs and responsibilities
                                         have accordingly evolved as well.
Products:
USB Blocker                              Challenge: Preventing Unauthorized Use of Removable Media
Vendor:
                                         via USB Ports
NetWrix Corporation                      Privacy was a major priority for many of the big-name clients using this
Phone: 888-638-9749                      collection agency, and thus, the company’s IT department understood the
Web Site: www.netwrix.com                importance of hindering illicit use of removable media via USB ports, both
                                         for protection of sensitive corporate and customer data, as well as adherence
Customer Profile:                        to compliance standards. The USB protection tool that the company was
As one of the largest collection
                                         previously using did not always work, and the IT department needed a
agencies in Canada, this firm
                                         solution that they could rely on.
helps its customers manage their
financial portfolios by way of leading    “We were looking for an easy-to-use solution that we could easily
edge technology and cost-effective       implement into our existing infrastructure,” said Precilla. “We needed a
services designed specifically for a     solution that was consistent, but prior to NetWrix, we had an alternative
wide variety of individual needs. The    solution that did not always work.”
agencycontinues to grow on a steady
basis, and currently serves all of       To both the firm, and its enterprise clients, this type of unpredictability was
Canada.                                  not acceptable, and that is when the IT department began looking for a new
                                         way to secure their endpoints.

                                         Solution: Centralized USB Port Protection That Works
                                         That is when the collection agency turned to NetWrix USB
                                         Blocker, the endpoint security solution that enforces centralized


                                              Copyright © NetWrix Corporation. All rights reserved.
NetWrix Customer CaseCase
                          NetWrix Customer Study
                          Study


access control that prevents the unauthorized            its customers with the type of security
use of removable media that connects to                  and privacy that they demand. The threat
computer USB ports, such as memory sticks,               of unauthorized data removal has since
removable hard disks, iPods and so on.                   been thwarted, and auditors can rest easy
                                                         knowing that the IT department is adhering
“We looked at several vendors, such as
                                                         to regulations.
TrendMicro, but NetWrix USB Blocker is
easy to use and the product just works,” said            “Since implementing NetWrix USB
Precilla. “It was really easy to implement               Blocker, we have found that inappropriate
NetWrix USB Blocker into our existing                    use of USB devices went down,” said
infrastructure. The software also worked on              Precilla. “Unauthorized files on our
the first try with very little configuration to          network shares went down as well.
play around with. The other software we had              From a security standpoint, our end user
before required a lot of time to work with,              workstations are now more secure than
and time is money. We started planning a few             ever, as no unauthorized devices can go
weeks prior to purchasing NetWrix. It was                undetected. This also helps us maintain
probably two weeks between inception to                  compliance, as our auditors can see that
ready-to-launch. Deployment took only an                 these types of USB port activities are not
hour or so and went smoothly.”                           possible.”
NetWrix USB Blocker relies on built-                     “I would recommend NetWrix to other
in Active Directory mechanisms and                       companies because it is a simple, easy
seamlessly integrates into existing Microsoft            to use solution,” Precilla added. “It is
environments. With only a couple clicks of the           also easy to implement in a Microsoft
mouse, the firm was able to quickly get the              environment. And the NetWrix team is
solution up and running in order to satisfy its          great to work with.”
customers and auditors.
                                                         About NetWrix Corporation
Proven Result: USB Port Protection                       Established in 2006, NetWrix Corporation
Hardens Security and Appeases Auditors                   provides innovative and cost-effective solutions
                                                         that simplify and automate the management of
USB port protection ensures that sensitive               Windows networks. With in-depth knowledge and
information remains private, protecting                  experience managing Windows environments of
against data theft and misuse. Since                     all sizes, the company delivers solutions to meet
deploying NetWrix USB Blocker, the                       complicated business requirements while fulfilling
company has been better able to provide                  the best expectations of IT professionals.



                                      Copyright © NetWrix Corporation. All rights reserved.

Mais conteúdo relacionado

Mais procurados

Remote Working Webinar (Episode 4)
Remote Working Webinar (Episode 4)Remote Working Webinar (Episode 4)
Remote Working Webinar (Episode 4)Ivanti
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
CIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCloudIDSummit
 
Insights into your IT Service Management - Middle East
Insights into your IT Service Management - Middle EastInsights into your IT Service Management - Middle East
Insights into your IT Service Management - Middle EastIvanti
 
Are you ready for Mobile?
Are you ready for Mobile?Are you ready for Mobile?
Are you ready for Mobile?Exadel
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Securitynmullen
 
Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenBitdefender Enterprise
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
Applied mobile chaos theory
Applied mobile chaos theoryApplied mobile chaos theory
Applied mobile chaos theorySecureITExperts
 
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...Citrix
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentationjuniortstanley
 
What's New in Ivanti Workspace Control 2020.0
What's New in Ivanti Workspace Control 2020.0 What's New in Ivanti Workspace Control 2020.0
What's New in Ivanti Workspace Control 2020.0 Ivanti
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)José Ferreiro
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsAndris Soroka
 
SYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionalitySYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionalityCitrix
 
PKI: Is it worth something, or what?
PKI: Is it worth something, or what?PKI: Is it worth something, or what?
PKI: Is it worth something, or what?John ILIADIS
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for TabletSymantec
 

Mais procurados (20)

Remote Working Webinar (Episode 4)
Remote Working Webinar (Episode 4)Remote Working Webinar (Episode 4)
Remote Working Webinar (Episode 4)
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
CIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the EnterpriseCIS13: The Power of the Cloud and Transformation in the Enterprise
CIS13: The Power of the Cloud and Transformation in the Enterprise
 
Insights into your IT Service Management - Middle East
Insights into your IT Service Management - Middle EastInsights into your IT Service Management - Middle East
Insights into your IT Service Management - Middle East
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Are you ready for Mobile?
Are you ready for Mobile?Are you ready for Mobile?
Are you ready for Mobile?
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xen
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Applied mobile chaos theory
Applied mobile chaos theoryApplied mobile chaos theory
Applied mobile chaos theory
 
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentation
 
What's New in Ivanti Workspace Control 2020.0
What's New in Ivanti Workspace Control 2020.0 What's New in Ivanti Workspace Control 2020.0
What's New in Ivanti Workspace Control 2020.0
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
SYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionalitySYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionality
 
PKI: Is it worth something, or what?
PKI: Is it worth something, or what?PKI: Is it worth something, or what?
PKI: Is it worth something, or what?
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 

Destaque

Sophos Corporate Overview And End Poin 2016
Sophos Corporate Overview And End Poin 2016Sophos Corporate Overview And End Poin 2016
Sophos Corporate Overview And End Poin 2016InformatikaFortuno
 
Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksCyphort
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeAdam Barrera
 
Activated Charcoal - Making Sense of Endpoint Data
Activated Charcoal - Making Sense of Endpoint DataActivated Charcoal - Making Sense of Endpoint Data
Activated Charcoal - Making Sense of Endpoint DataGreg Foss
 
Malware evolution and Endpoint Detection and Response Technology
Malware evolution and Endpoint Detection and Response  TechnologyMalware evolution and Endpoint Detection and Response  Technology
Malware evolution and Endpoint Detection and Response TechnologyAdrian Guthrie
 
Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack
Infosecurity Europe 2014 Case Study:  Shamoon, a two stage targeted attackInfosecurity Europe 2014 Case Study:  Shamoon, a two stage targeted attack
Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attackSeculert
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?Priyanka Aash
 

Destaque (10)

Sophos Corporate Overview And End Poin 2016
Sophos Corporate Overview And End Poin 2016Sophos Corporate Overview And End Poin 2016
Sophos Corporate Overview And End Poin 2016
 
44con
44con44con
44con
 
Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value Attacks
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
 
Activated Charcoal - Making Sense of Endpoint Data
Activated Charcoal - Making Sense of Endpoint DataActivated Charcoal - Making Sense of Endpoint Data
Activated Charcoal - Making Sense of Endpoint Data
 
Malware evolution and Endpoint Detection and Response Technology
Malware evolution and Endpoint Detection and Response  TechnologyMalware evolution and Endpoint Detection and Response  Technology
Malware evolution and Endpoint Detection and Response Technology
 
Flash memory
Flash memoryFlash memory
Flash memory
 
Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack
Infosecurity Europe 2014 Case Study:  Shamoon, a two stage targeted attackInfosecurity Europe 2014 Case Study:  Shamoon, a two stage targeted attack
Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?
 

Semelhante a USB Port Protection that Hardens Endpoint Security and Streamlines Compliance

Ensuring Data Protection by controlling the Use of Removable Media
Ensuring Data Protection by controlling the Use of Removable MediaEnsuring Data Protection by controlling the Use of Removable Media
Ensuring Data Protection by controlling the Use of Removable MediaNetwrix Corporation
 
B fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-usB fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-ustewodros13
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistanTariq Mustafa
 
University of the West of Scotland implements a Multi-Campus Juniper Networks...
University of the West of Scotland implements a Multi-Campus Juniper Networks...University of the West of Scotland implements a Multi-Campus Juniper Networks...
University of the West of Scotland implements a Multi-Campus Juniper Networks...Juniper Networks UKI
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-ITIdan Hershkovich
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotesStudying
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentJean Ryu
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformVertex Holdings
 
Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesPanoptica
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochuretmcleland
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigmNazneen Sheikh
 
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareDraft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareSelena829218
 
Knorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudyKnorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudySafeNet
 

Semelhante a USB Port Protection that Hardens Endpoint Security and Streamlines Compliance (20)

Ensuring Data Protection by controlling the Use of Removable Media
Ensuring Data Protection by controlling the Use of Removable MediaEnsuring Data Protection by controlling the Use of Removable Media
Ensuring Data Protection by controlling the Use of Removable Media
 
Arup
ArupArup
Arup
 
B fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-usB fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-us
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistan
 
Personal identity information protection
Personal identity information protectionPersonal identity information protection
Personal identity information protection
 
University of the West of Scotland implements a Multi-Campus Juniper Networks...
University of the West of Scotland implements a Multi-Campus Juniper Networks...University of the West of Scotland implements a Multi-Campus Juniper Networks...
University of the West of Scotland implements a Multi-Campus Juniper Networks...
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
Video Security Goes to the cloud
Video Security Goes to the cloudVideo Security Goes to the cloud
Video Security Goes to the cloud
 
Document case study-Systweak - Go4Hosting
Document case study-Systweak - Go4HostingDocument case study-Systweak - Go4Hosting
Document case study-Systweak - Go4Hosting
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for Enterprises
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
 
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareDraft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | Slideshare
 
Grupo Banco Popular: Software Deployment Case Study
Grupo Banco Popular:  Software Deployment Case StudyGrupo Banco Popular:  Software Deployment Case Study
Grupo Banco Popular: Software Deployment Case Study
 
Knorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudyKnorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case Study
 

Mais de Netwrix Corporation

File system auditing who accessed what files and where
File system auditing who accessed what files and whereFile system auditing who accessed what files and where
File system auditing who accessed what files and whereNetwrix Corporation
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureNetwrix Corporation
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsNetwrix Corporation
 
Top 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryTop 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryNetwrix Corporation
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureNetwrix Corporation
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetwrix Corporation
 
Auditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal RegulationsAuditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal RegulationsNetwrix Corporation
 
Auditing Solution Enables Coaching of Staff and Pleases Auditors
Auditing Solution Enables Coaching of Staff and Pleases AuditorsAuditing Solution Enables Coaching of Staff and Pleases Auditors
Auditing Solution Enables Coaching of Staff and Pleases AuditorsNetwrix Corporation
 
Automated De-provisioning of Inactive Users Accounts
Automated De-provisioning of Inactive Users AccountsAutomated De-provisioning of Inactive Users Accounts
Automated De-provisioning of Inactive Users AccountsNetwrix Corporation
 
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server AuditingHow the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server AuditingNetwrix Corporation
 
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...Netwrix Corporation
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseNetwrix Corporation
 
Extending Change Auditing to Exchange Server
Extending Change Auditing to Exchange ServerExtending Change Auditing to Exchange Server
Extending Change Auditing to Exchange ServerNetwrix Corporation
 
Staying Abreast of Group Policy Changes
Staying Abreast of Group Policy ChangesStaying Abreast of Group Policy Changes
Staying Abreast of Group Policy ChangesNetwrix Corporation
 
The Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementThe Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementNetwrix Corporation
 
Exchange Auditing in the Enterprise
Exchange Auditing in the EnterpriseExchange Auditing in the Enterprise
Exchange Auditing in the EnterpriseNetwrix Corporation
 

Mais de Netwrix Corporation (18)

File system auditing who accessed what files and where
File system auditing who accessed what files and whereFile system auditing who accessed what files and where
File system auditing who accessed what files and where
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructure
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutions
 
Top 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryTop 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directory
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT Infrastructure
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don Jones
 
Auditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal RegulationsAuditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal Regulations
 
Auditing Solution Enables Coaching of Staff and Pleases Auditors
Auditing Solution Enables Coaching of Staff and Pleases AuditorsAuditing Solution Enables Coaching of Staff and Pleases Auditors
Auditing Solution Enables Coaching of Staff and Pleases Auditors
 
Automated De-provisioning of Inactive Users Accounts
Automated De-provisioning of Inactive Users AccountsAutomated De-provisioning of Inactive Users Accounts
Automated De-provisioning of Inactive Users Accounts
 
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server AuditingHow the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
 
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the Enterprise
 
Extending Change Auditing to Exchange Server
Extending Change Auditing to Exchange ServerExtending Change Auditing to Exchange Server
Extending Change Auditing to Exchange Server
 
Staying Abreast of Group Policy Changes
Staying Abreast of Group Policy ChangesStaying Abreast of Group Policy Changes
Staying Abreast of Group Policy Changes
 
The Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementThe Business Case for Account Lockout Management
The Business Case for Account Lockout Management
 
Exchange Auditing in the Enterprise
Exchange Auditing in the EnterpriseExchange Auditing in the Enterprise
Exchange Auditing in the Enterprise
 
File Auditing in the Enterprise
File Auditing in the EnterpriseFile Auditing in the Enterprise
File Auditing in the Enterprise
 
File auditing on NetApp Filer
File auditing on NetApp Filer File auditing on NetApp Filer
File auditing on NetApp Filer
 

USB Port Protection that Hardens Endpoint Security and Streamlines Compliance

  • 1. NetWrix Customer Case Study USB Port Protection that Hardens Endpoint Security and Streamlines Compliance “NetWrix USB Blocker accomplished what we needed it to do. The fact that it just works was enough justification for us to like the product.” Customer: Large Collection Agency Mark Precilla, Network Support, Large Collection Agency Number of Users: 500 Industry: Banking and Finance As one of the leading collection agencies in Canada, this firm helps its customers manage their financial portfolios by way of leading edge Solution: technology and cost-effective services designed specifically for a wide Endpoint Management variety of individual needs. The agency, founded in 2002, continues to Compliance grow on a steady basis, and the company’s needs and responsibilities have accordingly evolved as well. Products: USB Blocker Challenge: Preventing Unauthorized Use of Removable Media Vendor: via USB Ports NetWrix Corporation Privacy was a major priority for many of the big-name clients using this Phone: 888-638-9749 collection agency, and thus, the company’s IT department understood the Web Site: www.netwrix.com importance of hindering illicit use of removable media via USB ports, both for protection of sensitive corporate and customer data, as well as adherence Customer Profile: to compliance standards. The USB protection tool that the company was As one of the largest collection previously using did not always work, and the IT department needed a agencies in Canada, this firm solution that they could rely on. helps its customers manage their financial portfolios by way of leading “We were looking for an easy-to-use solution that we could easily edge technology and cost-effective implement into our existing infrastructure,” said Precilla. “We needed a services designed specifically for a solution that was consistent, but prior to NetWrix, we had an alternative wide variety of individual needs. The solution that did not always work.” agencycontinues to grow on a steady basis, and currently serves all of To both the firm, and its enterprise clients, this type of unpredictability was Canada. not acceptable, and that is when the IT department began looking for a new way to secure their endpoints. Solution: Centralized USB Port Protection That Works That is when the collection agency turned to NetWrix USB Blocker, the endpoint security solution that enforces centralized Copyright © NetWrix Corporation. All rights reserved.
  • 2. NetWrix Customer CaseCase NetWrix Customer Study Study access control that prevents the unauthorized its customers with the type of security use of removable media that connects to and privacy that they demand. The threat computer USB ports, such as memory sticks, of unauthorized data removal has since removable hard disks, iPods and so on. been thwarted, and auditors can rest easy knowing that the IT department is adhering “We looked at several vendors, such as to regulations. TrendMicro, but NetWrix USB Blocker is easy to use and the product just works,” said “Since implementing NetWrix USB Precilla. “It was really easy to implement Blocker, we have found that inappropriate NetWrix USB Blocker into our existing use of USB devices went down,” said infrastructure. The software also worked on Precilla. “Unauthorized files on our the first try with very little configuration to network shares went down as well. play around with. The other software we had From a security standpoint, our end user before required a lot of time to work with, workstations are now more secure than and time is money. We started planning a few ever, as no unauthorized devices can go weeks prior to purchasing NetWrix. It was undetected. This also helps us maintain probably two weeks between inception to compliance, as our auditors can see that ready-to-launch. Deployment took only an these types of USB port activities are not hour or so and went smoothly.” possible.” NetWrix USB Blocker relies on built- “I would recommend NetWrix to other in Active Directory mechanisms and companies because it is a simple, easy seamlessly integrates into existing Microsoft to use solution,” Precilla added. “It is environments. With only a couple clicks of the also easy to implement in a Microsoft mouse, the firm was able to quickly get the environment. And the NetWrix team is solution up and running in order to satisfy its great to work with.” customers and auditors. About NetWrix Corporation Proven Result: USB Port Protection Established in 2006, NetWrix Corporation Hardens Security and Appeases Auditors provides innovative and cost-effective solutions that simplify and automate the management of USB port protection ensures that sensitive Windows networks. With in-depth knowledge and information remains private, protecting experience managing Windows environments of against data theft and misuse. Since all sizes, the company delivers solutions to meet deploying NetWrix USB Blocker, the complicated business requirements while fulfilling company has been better able to provide the best expectations of IT professionals. Copyright © NetWrix Corporation. All rights reserved.