Risk

2/25/2009
01:31 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Georgia Credit Union Adds Data Loss Prevention With Code Green DLP Solution

CI-1500 Content Inspection Appliance performs ongoing content inspection to ensure that no sensitive data can be transmitted outside of a company's network

SUNNYVALE, Calif., February 25, 2009—Code Green Networks, the leader in comprehensive data loss prevention (DLP) solutions that can be deployed quickly and cost-effectively, today announced that Georgia's Own Credit Union has deployed the Code Green CI-1500 Content Inspection Appliance to protect its network against data loss.

As Georgia's third-largest credit union, Georgia's Own has more than $1 billion in assets and more than 120,000 members representing over 400 sponsoring companies. As the company's 260 employees have increased their interactions with third-party consultants over the years, Georgia's Own faced growing concerns about the security of outbound information. Based on extensive research into data loss prevention technology and solutions, Georgia's Own Credit Union selected Code Green's CI-1500 Content Inspection Appliance.

"We have been evaluating DLP technology since its infancy a few years ago, and the primary requirements for us were highly flexible data inspection capabilities, ease of administration, and price," said Scott McCall, chief information officer at Georgia's Own Credit Union. "The CI-1500 appliance makes it easy to classify and inspect our SQL-based data, and we believe that as a company, Code Green has the best approach to evolving DLP capabilities over time."

After deploying the CI-1500 appliance, McCall's staff created content inspection policies for the system based on SQL queries of the institution's database that produced highly specific descriptions of sensitive data. Based on these policies, the Code Green appliance performs ongoing content inspection to ensure that no sensitive data can be transmitted outside of the network via web mail, e-mail, or other means. Corporate e-mail is encrypted using the CI-1500's built-in e-mail encryption engine and integration with ZixCorp's (NASDAQ: ZIXI) encryption key server.

"Code Green's exclusive focus on data loss prevention technology has allowed us to deliver superior content inspection capabilities with greater ease of use and simple, value-based pricing," said Rod Murchison, vice president of marketing and strategic alliances at Code Green Networks. "As customers like Georgia's Own Credit Union have found, our efforts have resulted in solutions that quickly and cost-effectively eliminate data loss concerns."

Code Green Networks' Content Inspection appliances inspect and protect secure content on the network, and include built-in e-mail encryption that integrates from leading encryption servers from ZixCorp, Cisco, and Voltage. With all-in-one design and robust content inspection capabilities, Code Green's DLP solutions can be deployed and in operation within hours, offering customers a total cost of ownership less than half that of competing solutions.

About Zix Corporation ZixCorp is the leading provider of easy-to-use-and-deploy email encryption and e-prescribing services that Connect entities with their customers and partners to Protect and Deliver sensitive information in the healthcare, finance, insurance and government industries. ZixCorp's hosted Email Encryption Service provides an easy and cost-effective way to ensure customer privacy and regulatory compliance for corporate email. Its PocketScript' e-prescribing service saves lives and saves money by automating the prescription process between payors, doctors and pharmacies. For more information, visit www.zixcorp.com.

About Code Green Networks Code Green Networks delivers data loss prevention solutions that protect private employee and customer information and safeguard intellectual property across all electronic communications channels. The company's easy-to-deploy, easy-to-manage content inspection appliances rapidly detect and prevent potential data leaks, helping organizations automate compliance and mitigate risks from internal breaches that can result in loss of revenue, financial penalties and irreparable damage to a corporation's image, brand and customer loyalty.

Contacts: Rod Murchison Vice President of Marketing & Strategic Alliances Code Green Networks (408) 881-4037 [email protected] Michael Schoolnik Story Communications (415) 674-3816 [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
1.9 Billion Data Records Exposed in First Half of 2017
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/20/2017
Get Serious about IoT Security
Derek Manky, Global Security Strategist, Fortinet,  9/20/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.