DriveSentry offers 'firewall' for hard drives
It uses whitelist of acceptable programs
IDG News Service - A Mountain View, Calif.-based start-up company has developed what it calls a storage "firewall" to prevent computer viruses from wrecking the data on desktop computers.
DriveSentry Inc.'s software sets up a whitelist of trusted programs that are allowed to write to certain folders or file types. Should another program try to write to the drive, DriveSentry generates a pop-up window and asks the user if this should be allowed.
"What we've developed is a number of low-level drivers that basically can intercept the drive traffic," said John Safa, chief technology officer and founder of the company. "We've built a complex engine that monitors this traffic in real time and can then present an issue to you visibly on-screen."
This software could block a virus from writing to a .doc file used by Word or to the Windows registry. But if a user tried to edit that same document using OpenOffice.org, DriveSentry would first ask if this was OK and would then place OpenOffice.org on the whitelist.
DriveSentry can also be used to prevent rootkits and keyloggers from writing to the hard drive, and it works with peripheral storage devices like USB drives.
Safa came up with the idea for DriveSentry several years ago, after he downloaded software that he meant to test for security purposes. In fact, the code turned out to be a malicious Trojan horse program.
DriveSentry will be available for download Monday. It costs $29, but the company will also offer a free version that will allow users to monitor five different file types and two folders on their computers.
The software will work with Windows 2000, Windows XP, Windows Server 2003 and Windows Vista.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts