Risk
2/25/2009
01:31 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Georgia Credit Union Adds Data Loss Prevention With Code Green DLP Solution

CI-1500 Content Inspection Appliance performs ongoing content inspection to ensure that no sensitive data can be transmitted outside of a company's network

SUNNYVALE, Calif., February 25, 2009—Code Green Networks, the leader in comprehensive data loss prevention (DLP) solutions that can be deployed quickly and cost-effectively, today announced that Georgia's Own Credit Union has deployed the Code Green CI-1500 Content Inspection Appliance to protect its network against data loss.

As Georgia's third-largest credit union, Georgia's Own has more than $1 billion in assets and more than 120,000 members representing over 400 sponsoring companies. As the company's 260 employees have increased their interactions with third-party consultants over the years, Georgia's Own faced growing concerns about the security of outbound information. Based on extensive research into data loss prevention technology and solutions, Georgia's Own Credit Union selected Code Green's CI-1500 Content Inspection Appliance.

"We have been evaluating DLP technology since its infancy a few years ago, and the primary requirements for us were highly flexible data inspection capabilities, ease of administration, and price," said Scott McCall, chief information officer at Georgia's Own Credit Union. "The CI-1500 appliance makes it easy to classify and inspect our SQL-based data, and we believe that as a company, Code Green has the best approach to evolving DLP capabilities over time."

After deploying the CI-1500 appliance, McCall's staff created content inspection policies for the system based on SQL queries of the institution's database that produced highly specific descriptions of sensitive data. Based on these policies, the Code Green appliance performs ongoing content inspection to ensure that no sensitive data can be transmitted outside of the network via web mail, e-mail, or other means. Corporate e-mail is encrypted using the CI-1500's built-in e-mail encryption engine and integration with ZixCorp's (NASDAQ: ZIXI) encryption key server.

"Code Green's exclusive focus on data loss prevention technology has allowed us to deliver superior content inspection capabilities with greater ease of use and simple, value-based pricing," said Rod Murchison, vice president of marketing and strategic alliances at Code Green Networks. "As customers like Georgia's Own Credit Union have found, our efforts have resulted in solutions that quickly and cost-effectively eliminate data loss concerns."

Code Green Networks' Content Inspection appliances inspect and protect secure content on the network, and include built-in e-mail encryption that integrates from leading encryption servers from ZixCorp, Cisco, and Voltage. With all-in-one design and robust content inspection capabilities, Code Green's DLP solutions can be deployed and in operation within hours, offering customers a total cost of ownership less than half that of competing solutions.

About Zix Corporation ZixCorp is the leading provider of easy-to-use-and-deploy email encryption and e-prescribing services that Connect entities with their customers and partners to Protect and Deliver sensitive information in the healthcare, finance, insurance and government industries. ZixCorp's hosted Email Encryption Service provides an easy and cost-effective way to ensure customer privacy and regulatory compliance for corporate email. Its PocketScript' e-prescribing service saves lives and saves money by automating the prescription process between payors, doctors and pharmacies. For more information, visit www.zixcorp.com.

About Code Green Networks Code Green Networks delivers data loss prevention solutions that protect private employee and customer information and safeguard intellectual property across all electronic communications channels. The company's easy-to-deploy, easy-to-manage content inspection appliances rapidly detect and prevent potential data leaks, helping organizations automate compliance and mitigate risks from internal breaches that can result in loss of revenue, financial penalties and irreparable damage to a corporation's image, brand and customer loyalty.

Contacts: Rod Murchison Vice President of Marketing & Strategic Alliances Code Green Networks (408) 881-4037 [email protected] Michael Schoolnik Story Communications (415) 674-3816 [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Why else would HR ask me if I have a handicap?"
Current Issue
The Changing Face of Identity Management
Mobility and cloud services are altering the concept of user identity. Here are some ways to keep up.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.