{"id":1427,"date":"2005-06-03T00:00:00","date_gmt":"2005-06-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/06\/03\/two-pronged-tech-aims-to-plug-data-leaks\/"},"modified":"2021-12-30T11:39:21","modified_gmt":"2021-12-30T11:39:21","slug":"two-pronged-tech-aims-to-plug-data-leaks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/06\/03\/two-pronged-tech-aims-to-plug-data-leaks\/","title":{"rendered":"Two-pronged tech aims to plug data leaks"},"content":{"rendered":"<p>Information security provider Tablus is expected to unveil a two-pronged approach to stopping leaks of sensitive corporate information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The company has integrated its Content Alarm NW product for networks with Content Alarm DT for desktop computers, which is based on technology picked up in Tablus&#8217; recent acquisition of Indigo Security.<\/p>\n<p>The package aims to provide a single dashboard to monitor and manage data to prevent it from being copied, printed or transmitted in violation of a company&#8217;s policies.  &#8220;Our customers said they&#8230;didn&#8217;t want to manage two separate monitoring reports, two separate policies,&#8221; said Jim Nisbet, Tablus&#8217; chief technology officer.  Companies are increasingly becoming concerned about sensitive information leaving their corporate networks and employees&#8217; computers, especially since new federal regulations, such as the Sarbanes-Oxley Act, have kicked in.<\/p>\n<p>Tablus&#8217; technology promises to analyze a range of data types, from databases to word-processing documents to source code.  It will check the data whether it&#8217;s moving across the network, being copied from a computer onto a small storage device or transmitted via e-mail.<\/p>\n<p>&#8220;Everyone in the security world realizes there is not just one perimeter that needs protection,&#8221; said Dan Keldsen, an analyst at the Delphi Group.<\/p>\n<p>Tablus, based in San Mateo, Calif., plans to begin full shipments of the Content Alarm combination in July.  It will offer three sensors, a controller and licenses for up to 500 desktops for $75,000.<\/p>\n<p>Another leak prevention company, PortAuthority Technologies, is expected to announce a new e-mail security feature on Monday.  The company, formerly named Vidius, plans to add monitoring of internal e-mail to its coverage of Web-based e-mail and of messages sent outside a company.  PortAuthority for Internal Mail promises to check communications sent within a company over Microsoft Exchange and Lotus Domino to make sure they don&#8217;t let workers in authorized departments&#8211;such as human resources&#8211;send social security numbers and other confidential information to unauthorized employees.<\/p>\n<p>http:\/\/news.zdnet.com\/2100-1009_22-5731369.html?part=rss&#038;tag=feed&#038;subj=zdnet<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1427","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1427"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1427\/revisions"}],"predecessor-version":[{"id":3914,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1427\/revisions\/3914"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}