Imation Access 4.1 Software
Adds location-based security policy management for USB
Imation Corp. announced availability of ACCESS 4.1,
software that manages Imation's secure USB drive offerings.
New features include
location-based security management, enabling administrators to manage and
control USB use inside and outside of the network. Administrators can allow the
device to unlock at IP addresses determined to be safe, or destroy its contents
remotely, if data is deemed to be at risk.
ACCESS 4.1 is a component to Imation's
data security solution for secure mobile data, secure mobile identity and secure
enterprise organizations embrace the mobile workforce, IT departments are
confronting a new set of hazards to the security of sensitive data,"
said Lawrence Reusing, Imation's GM for Mobile Security. "Our
latest ACCESS software adds tools administrators need to decide exactly where
secure USB devices can be unlocked, helping better protect digital data on the
ACCESS 4.1 supports management and usage
of Imation branded USB flash and external hard disk drive devices. The
enhancements and benefits include a range of management features for secure
device control, device recovery and policy enforcement, all while reducing
deployment and ownership costs.
Location-Based Security Policies
The addition of location-based security policies that help
protect against data leakage and theft. IT administrators can prevent all USB
device use outside of an organization's network, or restrict usage to specific
computers and locations.
New capabilities include:
ACCESS 4.1 is
available for new and
existing administrators managing Imation Defender, MXI Security and McAfee
Encrypted USB brand secure USB devices.
- Trusted IPs Only:
Devices can be set so that they can only be unlocked at IP addresses that
have been evaluated as trusted and are specified on the IP whitelist to
prevent address spoofing.
- Device Must 'Call Home':
Administrators can mandate that devices contact an ACCESS Enterprise Server
(the managed version of ACCESS) before allowing the device to unlock.
Requiring that devices are unusable unless they can 'call home' diminishes
the risk of data leakage or theft.
- New Access Revocation
Features: Administrators now have a
range of revocation options. Administrators can remotely disable devices by
soft-blocking, remote killing or remotely 'bricking' (physically destroying
the drive's contents) devices if necessary.