Risk
2/25/2009
01:31 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Georgia Credit Union Adds Data Loss Prevention With Code Green DLP Solution

CI-1500 Content Inspection Appliance performs ongoing content inspection to ensure that no sensitive data can be transmitted outside of a company's network

SUNNYVALE, Calif., February 25, 2009—Code Green Networks, the leader in comprehensive data loss prevention (DLP) solutions that can be deployed quickly and cost-effectively, today announced that Georgia's Own Credit Union has deployed the Code Green CI-1500 Content Inspection Appliance to protect its network against data loss.

As Georgia's third-largest credit union, Georgia's Own has more than $1 billion in assets and more than 120,000 members representing over 400 sponsoring companies. As the company's 260 employees have increased their interactions with third-party consultants over the years, Georgia's Own faced growing concerns about the security of outbound information. Based on extensive research into data loss prevention technology and solutions, Georgia's Own Credit Union selected Code Green's CI-1500 Content Inspection Appliance.

"We have been evaluating DLP technology since its infancy a few years ago, and the primary requirements for us were highly flexible data inspection capabilities, ease of administration, and price," said Scott McCall, chief information officer at Georgia's Own Credit Union. "The CI-1500 appliance makes it easy to classify and inspect our SQL-based data, and we believe that as a company, Code Green has the best approach to evolving DLP capabilities over time."

After deploying the CI-1500 appliance, McCall's staff created content inspection policies for the system based on SQL queries of the institution's database that produced highly specific descriptions of sensitive data. Based on these policies, the Code Green appliance performs ongoing content inspection to ensure that no sensitive data can be transmitted outside of the network via web mail, e-mail, or other means. Corporate e-mail is encrypted using the CI-1500's built-in e-mail encryption engine and integration with ZixCorp's (NASDAQ: ZIXI) encryption key server.

"Code Green's exclusive focus on data loss prevention technology has allowed us to deliver superior content inspection capabilities with greater ease of use and simple, value-based pricing," said Rod Murchison, vice president of marketing and strategic alliances at Code Green Networks. "As customers like Georgia's Own Credit Union have found, our efforts have resulted in solutions that quickly and cost-effectively eliminate data loss concerns."

Code Green Networks' Content Inspection appliances inspect and protect secure content on the network, and include built-in e-mail encryption that integrates from leading encryption servers from ZixCorp, Cisco, and Voltage. With all-in-one design and robust content inspection capabilities, Code Green's DLP solutions can be deployed and in operation within hours, offering customers a total cost of ownership less than half that of competing solutions.

About Zix Corporation ZixCorp is the leading provider of easy-to-use-and-deploy email encryption and e-prescribing services that Connect entities with their customers and partners to Protect and Deliver sensitive information in the healthcare, finance, insurance and government industries. ZixCorp's hosted Email Encryption Service provides an easy and cost-effective way to ensure customer privacy and regulatory compliance for corporate email. Its PocketScript' e-prescribing service saves lives and saves money by automating the prescription process between payors, doctors and pharmacies. For more information, visit www.zixcorp.com.

About Code Green Networks Code Green Networks delivers data loss prevention solutions that protect private employee and customer information and safeguard intellectual property across all electronic communications channels. The company's easy-to-deploy, easy-to-manage content inspection appliances rapidly detect and prevent potential data leaks, helping organizations automate compliance and mitigate risks from internal breaches that can result in loss of revenue, financial penalties and irreparable damage to a corporation's image, brand and customer loyalty.

Contacts: Rod Murchison Vice President of Marketing & Strategic Alliances Code Green Networks (408) 881-4037 [email protected] Michael Schoolnik Story Communications (415) 674-3816 [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Janice, I think I've got a message from the code father!
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.