Risk
2/25/2009
01:31 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Georgia Credit Union Adds Data Loss Prevention With Code Green DLP Solution

CI-1500 Content Inspection Appliance performs ongoing content inspection to ensure that no sensitive data can be transmitted outside of a company's network

SUNNYVALE, Calif., February 25, 2009—Code Green Networks, the leader in comprehensive data loss prevention (DLP) solutions that can be deployed quickly and cost-effectively, today announced that Georgia's Own Credit Union has deployed the Code Green CI-1500 Content Inspection Appliance to protect its network against data loss.

As Georgia's third-largest credit union, Georgia's Own has more than $1 billion in assets and more than 120,000 members representing over 400 sponsoring companies. As the company's 260 employees have increased their interactions with third-party consultants over the years, Georgia's Own faced growing concerns about the security of outbound information. Based on extensive research into data loss prevention technology and solutions, Georgia's Own Credit Union selected Code Green's CI-1500 Content Inspection Appliance.

"We have been evaluating DLP technology since its infancy a few years ago, and the primary requirements for us were highly flexible data inspection capabilities, ease of administration, and price," said Scott McCall, chief information officer at Georgia's Own Credit Union. "The CI-1500 appliance makes it easy to classify and inspect our SQL-based data, and we believe that as a company, Code Green has the best approach to evolving DLP capabilities over time."

After deploying the CI-1500 appliance, McCall's staff created content inspection policies for the system based on SQL queries of the institution's database that produced highly specific descriptions of sensitive data. Based on these policies, the Code Green appliance performs ongoing content inspection to ensure that no sensitive data can be transmitted outside of the network via web mail, e-mail, or other means. Corporate e-mail is encrypted using the CI-1500's built-in e-mail encryption engine and integration with ZixCorp's (NASDAQ: ZIXI) encryption key server.

"Code Green's exclusive focus on data loss prevention technology has allowed us to deliver superior content inspection capabilities with greater ease of use and simple, value-based pricing," said Rod Murchison, vice president of marketing and strategic alliances at Code Green Networks. "As customers like Georgia's Own Credit Union have found, our efforts have resulted in solutions that quickly and cost-effectively eliminate data loss concerns."

Code Green Networks' Content Inspection appliances inspect and protect secure content on the network, and include built-in e-mail encryption that integrates from leading encryption servers from ZixCorp, Cisco, and Voltage. With all-in-one design and robust content inspection capabilities, Code Green's DLP solutions can be deployed and in operation within hours, offering customers a total cost of ownership less than half that of competing solutions.

About Zix Corporation ZixCorp is the leading provider of easy-to-use-and-deploy email encryption and e-prescribing services that Connect entities with their customers and partners to Protect and Deliver sensitive information in the healthcare, finance, insurance and government industries. ZixCorp's hosted Email Encryption Service provides an easy and cost-effective way to ensure customer privacy and regulatory compliance for corporate email. Its PocketScript' e-prescribing service saves lives and saves money by automating the prescription process between payors, doctors and pharmacies. For more information, visit www.zixcorp.com.

About Code Green Networks Code Green Networks delivers data loss prevention solutions that protect private employee and customer information and safeguard intellectual property across all electronic communications channels. The company's easy-to-deploy, easy-to-manage content inspection appliances rapidly detect and prevent potential data leaks, helping organizations automate compliance and mitigate risks from internal breaches that can result in loss of revenue, financial penalties and irreparable damage to a corporation's image, brand and customer loyalty.

Contacts: Rod Murchison Vice President of Marketing & Strategic Alliances Code Green Networks (408) 881-4037 [email protected] Michael Schoolnik Story Communications (415) 674-3816 [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.