Risk
2/25/2009
01:31 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Georgia Credit Union Adds Data Loss Prevention With Code Green DLP Solution

CI-1500 Content Inspection Appliance performs ongoing content inspection to ensure that no sensitive data can be transmitted outside of a company's network

SUNNYVALE, Calif., February 25, 2009—Code Green Networks, the leader in comprehensive data loss prevention (DLP) solutions that can be deployed quickly and cost-effectively, today announced that Georgia's Own Credit Union has deployed the Code Green CI-1500 Content Inspection Appliance to protect its network against data loss.

As Georgia's third-largest credit union, Georgia's Own has more than $1 billion in assets and more than 120,000 members representing over 400 sponsoring companies. As the company's 260 employees have increased their interactions with third-party consultants over the years, Georgia's Own faced growing concerns about the security of outbound information. Based on extensive research into data loss prevention technology and solutions, Georgia's Own Credit Union selected Code Green's CI-1500 Content Inspection Appliance.

"We have been evaluating DLP technology since its infancy a few years ago, and the primary requirements for us were highly flexible data inspection capabilities, ease of administration, and price," said Scott McCall, chief information officer at Georgia's Own Credit Union. "The CI-1500 appliance makes it easy to classify and inspect our SQL-based data, and we believe that as a company, Code Green has the best approach to evolving DLP capabilities over time."

After deploying the CI-1500 appliance, McCall's staff created content inspection policies for the system based on SQL queries of the institution's database that produced highly specific descriptions of sensitive data. Based on these policies, the Code Green appliance performs ongoing content inspection to ensure that no sensitive data can be transmitted outside of the network via web mail, e-mail, or other means. Corporate e-mail is encrypted using the CI-1500's built-in e-mail encryption engine and integration with ZixCorp's (NASDAQ: ZIXI) encryption key server.

"Code Green's exclusive focus on data loss prevention technology has allowed us to deliver superior content inspection capabilities with greater ease of use and simple, value-based pricing," said Rod Murchison, vice president of marketing and strategic alliances at Code Green Networks. "As customers like Georgia's Own Credit Union have found, our efforts have resulted in solutions that quickly and cost-effectively eliminate data loss concerns."

Code Green Networks' Content Inspection appliances inspect and protect secure content on the network, and include built-in e-mail encryption that integrates from leading encryption servers from ZixCorp, Cisco, and Voltage. With all-in-one design and robust content inspection capabilities, Code Green's DLP solutions can be deployed and in operation within hours, offering customers a total cost of ownership less than half that of competing solutions.

About Zix Corporation ZixCorp is the leading provider of easy-to-use-and-deploy email encryption and e-prescribing services that Connect entities with their customers and partners to Protect and Deliver sensitive information in the healthcare, finance, insurance and government industries. ZixCorp's hosted Email Encryption Service provides an easy and cost-effective way to ensure customer privacy and regulatory compliance for corporate email. Its PocketScript' e-prescribing service saves lives and saves money by automating the prescription process between payors, doctors and pharmacies. For more information, visit www.zixcorp.com.

About Code Green Networks Code Green Networks delivers data loss prevention solutions that protect private employee and customer information and safeguard intellectual property across all electronic communications channels. The company's easy-to-deploy, easy-to-manage content inspection appliances rapidly detect and prevent potential data leaks, helping organizations automate compliance and mitigate risks from internal breaches that can result in loss of revenue, financial penalties and irreparable damage to a corporation's image, brand and customer loyalty.

Contacts: Rod Murchison Vice President of Marketing & Strategic Alliances Code Green Networks (408) 881-4037 Rod.murchison@codegreennetworks.com Michael Schoolnik Story Communications (415) 674-3816 michael@storypr.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2808
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a rel...

CVE-2014-9713
Published: 2015-04-01
The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.

CVE-2015-0259
Published: 2015-04-01
OpenStack Compute (Nova) before 2014.1.4, 2014.2.x before 2014.2.3, and kilo before kilo-3 does not validate the origin of websocket requests, which allows remote attackers to hijack the authentication of users for access to consoles via a crafted webpage.

CVE-2015-0800
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2...

CVE-2015-0801
Published: 2015-04-01
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.