DriveSentry offers 'firewall' for hard drives
It uses whitelist of acceptable programs
IDG News Service - A Mountain View, Calif.-based start-up company has developed what it calls a storage "firewall" to prevent computer viruses from wrecking the data on desktop computers.
DriveSentry Inc.'s software sets up a whitelist of trusted programs that are allowed to write to certain folders or file types. Should another program try to write to the drive, DriveSentry generates a pop-up window and asks the user if this should be allowed.
"What we've developed is a number of low-level drivers that basically can intercept the drive traffic," said John Safa, chief technology officer and founder of the company. "We've built a complex engine that monitors this traffic in real time and can then present an issue to you visibly on-screen."
This software could block a virus from writing to a .doc file used by Word or to the Windows registry. But if a user tried to edit that same document using OpenOffice.org, DriveSentry would first ask if this was OK and would then place OpenOffice.org on the whitelist.
DriveSentry can also be used to prevent rootkits and keyloggers from writing to the hard drive, and it works with peripheral storage devices like USB drives.
Safa came up with the idea for DriveSentry several years ago, after he downloaded software that he meant to test for security purposes. In fact, the code turned out to be a malicious Trojan horse program.
DriveSentry will be available for download Monday. It costs $29, but the company will also offer a free version that will allow users to monitor five different file types and two folders on their computers.
The software will work with Windows 2000, Windows XP, Windows Server 2003 and Windows Vista.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!