DriveSentry offers 'firewall' for hard drives
It uses whitelist of acceptable programs
IDG News Service - A Mountain View, Calif.-based start-up company has developed what it calls a storage "firewall" to prevent computer viruses from wrecking the data on desktop computers.
DriveSentry Inc.'s software sets up a whitelist of trusted programs that are allowed to write to certain folders or file types. Should another program try to write to the drive, DriveSentry generates a pop-up window and asks the user if this should be allowed.
"What we've developed is a number of low-level drivers that basically can intercept the drive traffic," said John Safa, chief technology officer and founder of the company. "We've built a complex engine that monitors this traffic in real time and can then present an issue to you visibly on-screen."
This software could block a virus from writing to a .doc file used by Word or to the Windows registry. But if a user tried to edit that same document using OpenOffice.org, DriveSentry would first ask if this was OK and would then place OpenOffice.org on the whitelist.
DriveSentry can also be used to prevent rootkits and keyloggers from writing to the hard drive, and it works with peripheral storage devices like USB drives.
Safa came up with the idea for DriveSentry several years ago, after he downloaded software that he meant to test for security purposes. In fact, the code turned out to be a malicious Trojan horse program.
DriveSentry will be available for download Monday. It costs $29, but the company will also offer a free version that will allow users to monitor five different file types and two folders on their computers.
The software will work with Windows 2000, Windows XP, Windows Server 2003 and Windows Vista.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts