SlideShare a Scribd company logo
1 of 2
Download to read offline
NetWrix Customer Case Study



                                                Ensuring Data Protection by
                                                Controlling the Use of Removable
                                                Media

Customer:
Departamento de Estradas de Rodagem do
                                                “NetWrix USB Blocker locks functioning of
Estado de Sao Paulo (Department of
Highways of the State of Sao Paulo)             any USB devices on your machine, ensuring
                                                the protection of your data whenever you
Web Site:                                       want.”
www.der.sp.gov.br
                                                Joao Claudio Valerio,
                                                Systems Administrator, Departamento de Estradas de Rodagem do
Number of Users:                                Estado de Sao Paulo (Department of Highways of the State of Sao
800
                                                Paulo)

Industry:                                       The Department of Highways of the State of Sao Paulo, Brazil,
State Government
                                                administers the state highway system, its integration with the
                                                municipal and federal highways and its interaction with other types
                                                of transportation, aiming to assist in transporting of people and
Solution:                                       cargo. It was established on July, 2 of 1934 and has 14 regional
Endpoint Management
                                                divisions throughout all municipalities of Sao Paulo.

Product:
USB Blocker
                                                Challenge: Reducing Vulnerability of the
Vendor:                                         Department’s Computer Systems
NetWrix Corporation
Phone: 888-638-9749                             One of the pressing issues which had to be resolved by the
Web Site: www.netwrix.com                       Department’s IT unit was a large number of computers at risk of
                                                unauthorized use of removable media that connects to computer
                                                USB ports leading to virus and malware intrusion as well as data
Customer Profile:                               theft. The issue has long become a true headache for the IT
Departamento de Estradas de Rodagem do          departments in many organizations along with web threats as it
Estado de Sao Paulo (Department of              greatly challenges the endpoint security of an organization.
Highways of the State of Sao Paulo) is a part   The Department of Highways of the State of Sao Paulo was no
of the Department of Logistics and Transport
of Brazil, was established on July 2 of 1934    exception. Taking into account the number of computers in the
and has 14 regional divisions throughout all    network – 800 machines vulnerable to any misuse, virus or malware
municipalities of Sao Paulo, Brazil.            threats – the Department’s IT team felt strong necessity in an
                                                efficient solution to harden the endpoint security.

                                                “We realized that our computers are vulnerable to inappropriate
                                                data transfers as well as infection with viruses through unprotected
                                                USB ports”, explained Valerio.




                                                Copyright © NetWrix Corporation. All rights reserved.
NetWrix Customer Case Study



Solution: Protection of Data against                           “With NetWrix USB Blocker you can lock any USB
                                                               devices on your machines, ensuring the protection
Threats Transmitted via USB Ports                              of your data whenever you want. Furthermore,
The Department’s IT team has considered many                   through this program we guarantee that no
alternative solutions prior to making a final                  unauthorized files can be copied to our computers”,
decision to go with NetWrix USB blocker, including             concluded Valerio.
USB FireWall, USB Disk Security and USB PC Lock
Pro. However, none of the solutions could compete
with the one from NetWrix in terms of ease-of-use,             About NetWrix Corporation
interference with other software running on
endpoints and the ability to work transparently as             NetWrix Corporation is a highly specialized
the background process.                                        provider of solutions for IT infrastructure change
                                                               auditing. Change auditing is the core competency
Finally, the Department made a decision in favor of            of NetWrix and no other vendor focuses on this
NetWrix USB Blocker for it was “easy to use and                more extensively. With the broadest platform
furthermore, it runs quietly and does not need to              coverage available in the industry, innovative
be open to protect computers from various threats              technology and strategic roadmap aiming to
that can come via removable storage devices”, said             support different types of IT systems, devices and
Valerio.                                                       applications, NetWrix offers award-winning change
                                                               auditing solutions at very competitive prices,
The IT team was satisfied with the installation                matched with great customer service. Founded in
process noting both speed and ease of                          2006, NetWrix has evolved as #1 for Change
deployment as it only took “2 weeks for                        Auditing as evidenced by thousands of satisfied
implementation” and the process itself “occurred in            customers worldwide.
an excellent way by the ease of installation and use
of software”, added Valerio.                                   The company is headquartered in Paramus, NJ, and
                                                               has regional offices in Los Angeles, Boston, Tampa
Furthermore, the Department’s IT team gave credit              and the UK.
to the level of service received from NetWrix
technical support team and other NetWrix                       NetWrix IT infrastructure auditing solutions have
representatives during the set up process, noting it           won more than 40 prestigious awards and are used
was “very good, fast and efficient”.                           by thousands of organizations around the world.

                                                               The impressive list of customers from various
                                                               industries includes many well-known brands, such
Proven Results: Ensured Data                                   as IBM®, Boeing®, Mitsubishi®, Hyundai® and more.
Protection and Access Control
The two major aspects of endpoint security are
protection of computer data from malware and
viruses and centralized access control to prevent
theft of sensitive corporate data. Both these issues
were successfully resolved in the Department of
Highways of Sao Paulo with the help of NetWrix
USB Blocker.




                                         Copyright © NetWrix Corporation. All rights reserved.

More Related Content

What's hot

IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010emmettmccord
 
20120911 delija kukina - education of digital forensics experts
20120911 delija kukina - education of digital forensics experts20120911 delija kukina - education of digital forensics experts
20120911 delija kukina - education of digital forensics expertsDamir Delija
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingIvanti
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11captsbtyagi
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Editor IJMTER
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshotsNorthernstar
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation baipgroup
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device J
 
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...hanumayamma
 

What's hot (17)

IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010
 
20120911 delija kukina - education of digital forensics experts
20120911 delija kukina - education of digital forensics experts20120911 delija kukina - education of digital forensics experts
20120911 delija kukina - education of digital forensics experts
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshots
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
 

Similar to Ensuring Data Protection by controlling the Use of Removable Media

USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceNetwrix Corporation
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationCitrix
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services IntroCruatech
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigmNazneen Sheikh
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Le nuove tecnologie come vantaggio competitivo della piccola impresa
Le nuove tecnologie come vantaggio competitivo della piccola impresaLe nuove tecnologie come vantaggio competitivo della piccola impresa
Le nuove tecnologie come vantaggio competitivo della piccola impresaStefano A Gazziano
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotesStudying
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochuretmcleland
 
BlueMix_IoT_Examples_PDF
BlueMix_IoT_Examples_PDFBlueMix_IoT_Examples_PDF
BlueMix_IoT_Examples_PDFThomas Digsby
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachSchneider Electric
 
The Canopy Cloud Vision
The Canopy Cloud VisionThe Canopy Cloud Vision
The Canopy Cloud VisionThomas Kunz
 
Tools of noc
Tools of nocTools of noc
Tools of nocmunawarul
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
Victorian Bushfires Royal Commission Case Study
Victorian Bushfires Royal Commission Case StudyVictorian Bushfires Royal Commission Case Study
Victorian Bushfires Royal Commission Case StudyRebecca O'Dwyer
 

Similar to Ensuring Data Protection by controlling the Use of Removable Media (20)

USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Arup
ArupArup
Arup
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Le nuove tecnologie come vantaggio competitivo della piccola impresa
Le nuove tecnologie come vantaggio competitivo della piccola impresaLe nuove tecnologie come vantaggio competitivo della piccola impresa
Le nuove tecnologie come vantaggio competitivo della piccola impresa
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
BlueMix_IoT_Examples_PDF
BlueMix_IoT_Examples_PDFBlueMix_IoT_Examples_PDF
BlueMix_IoT_Examples_PDF
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based Approach
 
The Canopy Cloud Vision
The Canopy Cloud VisionThe Canopy Cloud Vision
The Canopy Cloud Vision
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Victorian Bushfires Royal Commission Case Study
Victorian Bushfires Royal Commission Case StudyVictorian Bushfires Royal Commission Case Study
Victorian Bushfires Royal Commission Case Study
 

More from Netwrix Corporation

File system auditing who accessed what files and where
File system auditing who accessed what files and whereFile system auditing who accessed what files and where
File system auditing who accessed what files and whereNetwrix Corporation
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureNetwrix Corporation
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsNetwrix Corporation
 
Top 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryTop 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryNetwrix Corporation
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureNetwrix Corporation
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetwrix Corporation
 
Auditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal RegulationsAuditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal RegulationsNetwrix Corporation
 
Auditing Solution Enables Coaching of Staff and Pleases Auditors
Auditing Solution Enables Coaching of Staff and Pleases AuditorsAuditing Solution Enables Coaching of Staff and Pleases Auditors
Auditing Solution Enables Coaching of Staff and Pleases AuditorsNetwrix Corporation
 
Automated De-provisioning of Inactive Users Accounts
Automated De-provisioning of Inactive Users AccountsAutomated De-provisioning of Inactive Users Accounts
Automated De-provisioning of Inactive Users AccountsNetwrix Corporation
 
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server AuditingHow the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server AuditingNetwrix Corporation
 
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...Netwrix Corporation
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseNetwrix Corporation
 
Extending Change Auditing to Exchange Server
Extending Change Auditing to Exchange ServerExtending Change Auditing to Exchange Server
Extending Change Auditing to Exchange ServerNetwrix Corporation
 
Staying Abreast of Group Policy Changes
Staying Abreast of Group Policy ChangesStaying Abreast of Group Policy Changes
Staying Abreast of Group Policy ChangesNetwrix Corporation
 
The Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementThe Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementNetwrix Corporation
 
Exchange Auditing in the Enterprise
Exchange Auditing in the EnterpriseExchange Auditing in the Enterprise
Exchange Auditing in the EnterpriseNetwrix Corporation
 

More from Netwrix Corporation (18)

File system auditing who accessed what files and where
File system auditing who accessed what files and whereFile system auditing who accessed what files and where
File system auditing who accessed what files and where
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructure
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutions
 
Top 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryTop 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directory
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT Infrastructure
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don Jones
 
Auditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal RegulationsAuditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal Regulations
 
Auditing Solution Enables Coaching of Staff and Pleases Auditors
Auditing Solution Enables Coaching of Staff and Pleases AuditorsAuditing Solution Enables Coaching of Staff and Pleases Auditors
Auditing Solution Enables Coaching of Staff and Pleases Auditors
 
Automated De-provisioning of Inactive Users Accounts
Automated De-provisioning of Inactive Users AccountsAutomated De-provisioning of Inactive Users Accounts
Automated De-provisioning of Inactive Users Accounts
 
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server AuditingHow the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
 
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the Enterprise
 
Extending Change Auditing to Exchange Server
Extending Change Auditing to Exchange ServerExtending Change Auditing to Exchange Server
Extending Change Auditing to Exchange Server
 
Staying Abreast of Group Policy Changes
Staying Abreast of Group Policy ChangesStaying Abreast of Group Policy Changes
Staying Abreast of Group Policy Changes
 
The Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementThe Business Case for Account Lockout Management
The Business Case for Account Lockout Management
 
Exchange Auditing in the Enterprise
Exchange Auditing in the EnterpriseExchange Auditing in the Enterprise
Exchange Auditing in the Enterprise
 
File Auditing in the Enterprise
File Auditing in the EnterpriseFile Auditing in the Enterprise
File Auditing in the Enterprise
 
File auditing on NetApp Filer
File auditing on NetApp Filer File auditing on NetApp Filer
File auditing on NetApp Filer
 

Ensuring Data Protection by controlling the Use of Removable Media

  • 1. NetWrix Customer Case Study Ensuring Data Protection by Controlling the Use of Removable Media Customer: Departamento de Estradas de Rodagem do “NetWrix USB Blocker locks functioning of Estado de Sao Paulo (Department of Highways of the State of Sao Paulo) any USB devices on your machine, ensuring the protection of your data whenever you Web Site: want.” www.der.sp.gov.br Joao Claudio Valerio, Systems Administrator, Departamento de Estradas de Rodagem do Number of Users: Estado de Sao Paulo (Department of Highways of the State of Sao 800 Paulo) Industry: The Department of Highways of the State of Sao Paulo, Brazil, State Government administers the state highway system, its integration with the municipal and federal highways and its interaction with other types of transportation, aiming to assist in transporting of people and Solution: cargo. It was established on July, 2 of 1934 and has 14 regional Endpoint Management divisions throughout all municipalities of Sao Paulo. Product: USB Blocker Challenge: Reducing Vulnerability of the Vendor: Department’s Computer Systems NetWrix Corporation Phone: 888-638-9749 One of the pressing issues which had to be resolved by the Web Site: www.netwrix.com Department’s IT unit was a large number of computers at risk of unauthorized use of removable media that connects to computer USB ports leading to virus and malware intrusion as well as data Customer Profile: theft. The issue has long become a true headache for the IT Departamento de Estradas de Rodagem do departments in many organizations along with web threats as it Estado de Sao Paulo (Department of greatly challenges the endpoint security of an organization. Highways of the State of Sao Paulo) is a part The Department of Highways of the State of Sao Paulo was no of the Department of Logistics and Transport of Brazil, was established on July 2 of 1934 exception. Taking into account the number of computers in the and has 14 regional divisions throughout all network – 800 machines vulnerable to any misuse, virus or malware municipalities of Sao Paulo, Brazil. threats – the Department’s IT team felt strong necessity in an efficient solution to harden the endpoint security. “We realized that our computers are vulnerable to inappropriate data transfers as well as infection with viruses through unprotected USB ports”, explained Valerio. Copyright © NetWrix Corporation. All rights reserved.
  • 2. NetWrix Customer Case Study Solution: Protection of Data against “With NetWrix USB Blocker you can lock any USB devices on your machines, ensuring the protection Threats Transmitted via USB Ports of your data whenever you want. Furthermore, The Department’s IT team has considered many through this program we guarantee that no alternative solutions prior to making a final unauthorized files can be copied to our computers”, decision to go with NetWrix USB blocker, including concluded Valerio. USB FireWall, USB Disk Security and USB PC Lock Pro. However, none of the solutions could compete with the one from NetWrix in terms of ease-of-use, About NetWrix Corporation interference with other software running on endpoints and the ability to work transparently as NetWrix Corporation is a highly specialized the background process. provider of solutions for IT infrastructure change auditing. Change auditing is the core competency Finally, the Department made a decision in favor of of NetWrix and no other vendor focuses on this NetWrix USB Blocker for it was “easy to use and more extensively. With the broadest platform furthermore, it runs quietly and does not need to coverage available in the industry, innovative be open to protect computers from various threats technology and strategic roadmap aiming to that can come via removable storage devices”, said support different types of IT systems, devices and Valerio. applications, NetWrix offers award-winning change auditing solutions at very competitive prices, The IT team was satisfied with the installation matched with great customer service. Founded in process noting both speed and ease of 2006, NetWrix has evolved as #1 for Change deployment as it only took “2 weeks for Auditing as evidenced by thousands of satisfied implementation” and the process itself “occurred in customers worldwide. an excellent way by the ease of installation and use of software”, added Valerio. The company is headquartered in Paramus, NJ, and has regional offices in Los Angeles, Boston, Tampa Furthermore, the Department’s IT team gave credit and the UK. to the level of service received from NetWrix technical support team and other NetWrix NetWrix IT infrastructure auditing solutions have representatives during the set up process, noting it won more than 40 prestigious awards and are used was “very good, fast and efficient”. by thousands of organizations around the world. The impressive list of customers from various industries includes many well-known brands, such Proven Results: Ensured Data as IBM®, Boeing®, Mitsubishi®, Hyundai® and more. Protection and Access Control The two major aspects of endpoint security are protection of computer data from malware and viruses and centralized access control to prevent theft of sensitive corporate data. Both these issues were successfully resolved in the Department of Highways of Sao Paulo with the help of NetWrix USB Blocker. Copyright © NetWrix Corporation. All rights reserved.