NetWrix Customer Case Study



                                         USB Port Protection that Hardens Endpoint Security and
                                         Streamlines Compliance
                                         “NetWrix USB Blocker accomplished what we needed it to do. The
                                         fact that it just works was enough justification for us to like the
                                         product.”
Customer: Large Collection Agency        Mark Precilla, Network Support, Large Collection Agency
Number of Users: 500
Industry: Banking and Finance            As one of the leading collection agencies in Canada, this firm helps
                                         its customers manage their financial portfolios by way of leading edge
Solution:                                technology and cost-effective services designed specifically for a wide
Endpoint Management                      variety of individual needs. The agency, founded in 2002, continues to
Compliance                               grow on a steady basis, and the company’s needs and responsibilities
                                         have accordingly evolved as well.
Products:
USB Blocker                              Challenge: Preventing Unauthorized Use of Removable Media
Vendor:
                                         via USB Ports
NetWrix Corporation                      Privacy was a major priority for many of the big-name clients using this
Phone: 888-638-9749                      collection agency, and thus, the company’s IT department understood the
Web Site: www.netwrix.com                importance of hindering illicit use of removable media via USB ports, both
                                         for protection of sensitive corporate and customer data, as well as adherence
Customer Profile:                        to compliance standards. The USB protection tool that the company was
As one of the largest collection
                                         previously using did not always work, and the IT department needed a
agencies in Canada, this firm
                                         solution that they could rely on.
helps its customers manage their
financial portfolios by way of leading    “We were looking for an easy-to-use solution that we could easily
edge technology and cost-effective       implement into our existing infrastructure,” said Precilla. “We needed a
services designed specifically for a     solution that was consistent, but prior to NetWrix, we had an alternative
wide variety of individual needs. The    solution that did not always work.”
agencycontinues to grow on a steady
basis, and currently serves all of       To both the firm, and its enterprise clients, this type of unpredictability was
Canada.                                  not acceptable, and that is when the IT department began looking for a new
                                         way to secure their endpoints.

                                         Solution: Centralized USB Port Protection That Works
                                         That is when the collection agency turned to NetWrix USB
                                         Blocker, the endpoint security solution that enforces centralized


                                              Copyright © NetWrix Corporation. All rights reserved.
NetWrix Customer CaseCase
                          NetWrix Customer Study
                          Study


access control that prevents the unauthorized            its customers with the type of security
use of removable media that connects to                  and privacy that they demand. The threat
computer USB ports, such as memory sticks,               of unauthorized data removal has since
removable hard disks, iPods and so on.                   been thwarted, and auditors can rest easy
                                                         knowing that the IT department is adhering
“We looked at several vendors, such as
                                                         to regulations.
TrendMicro, but NetWrix USB Blocker is
easy to use and the product just works,” said            “Since implementing NetWrix USB
Precilla. “It was really easy to implement               Blocker, we have found that inappropriate
NetWrix USB Blocker into our existing                    use of USB devices went down,” said
infrastructure. The software also worked on              Precilla. “Unauthorized files on our
the first try with very little configuration to          network shares went down as well.
play around with. The other software we had              From a security standpoint, our end user
before required a lot of time to work with,              workstations are now more secure than
and time is money. We started planning a few             ever, as no unauthorized devices can go
weeks prior to purchasing NetWrix. It was                undetected. This also helps us maintain
probably two weeks between inception to                  compliance, as our auditors can see that
ready-to-launch. Deployment took only an                 these types of USB port activities are not
hour or so and went smoothly.”                           possible.”
NetWrix USB Blocker relies on built-                     “I would recommend NetWrix to other
in Active Directory mechanisms and                       companies because it is a simple, easy
seamlessly integrates into existing Microsoft            to use solution,” Precilla added. “It is
environments. With only a couple clicks of the           also easy to implement in a Microsoft
mouse, the firm was able to quickly get the              environment. And the NetWrix team is
solution up and running in order to satisfy its          great to work with.”
customers and auditors.
                                                         About NetWrix Corporation
Proven Result: USB Port Protection                       Established in 2006, NetWrix Corporation
Hardens Security and Appeases Auditors                   provides innovative and cost-effective solutions
                                                         that simplify and automate the management of
USB port protection ensures that sensitive               Windows networks. With in-depth knowledge and
information remains private, protecting                  experience managing Windows environments of
against data theft and misuse. Since                     all sizes, the company delivers solutions to meet
deploying NetWrix USB Blocker, the                       complicated business requirements while fulfilling
company has been better able to provide                  the best expectations of IT professionals.



                                      Copyright © NetWrix Corporation. All rights reserved.

More Related Content

PDF
UniCredit Business Integrated Solutions
PDF
Case_Study__Juniper_Expedient_2015
PDF
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
PPTX
Building Your Business Continuity Plan
PDF
Migrate from BigFix to Ivanti
PDF
Infographic: Supercharge your Networking Career
PDF
Infographic: Why Businesses are Adopting Network Virtualization
PPTX
Remote Worker Series (Episode 1)
UniCredit Business Integrated Solutions
Case_Study__Juniper_Expedient_2015
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Building Your Business Continuity Plan
Migrate from BigFix to Ivanti
Infographic: Supercharge your Networking Career
Infographic: Why Businesses are Adopting Network Virtualization
Remote Worker Series (Episode 1)

What's hot (20)

PPTX
Remote Working Webinar (Episode 4)
PPTX
Take Control of End User Security
PDF
CIS13: The Power of the Cloud and Transformation in the Enterprise
PPTX
Insights into your IT Service Management - Middle East
PPT
Data loss prevention (dlp)
PPTX
Are you ready for Mobile?
PDF
St. Vincents Private Hospital Physical Security
PDF
Securing The Journey To The Cloud
PPTX
Zero footprint guest memory introspection from xen
PDF
DLP Executive Overview
PDF
Applied mobile chaos theory
PDF
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
PPS
Data Protection Fde Solution Presentation
PPTX
What's New in Ivanti Workspace Control 2020.0
PDF
Security Lock Down Your Computer Like the National Security Agency (NSA)
PDF
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
PDF
SYN310: Deep dive into ShareFile Enterprise functionality
PDF
PKI: Is it worth something, or what?
PPTX
Sophos Wireless Protection Overview
PDF
Symantec DLP for Tablet
Remote Working Webinar (Episode 4)
Take Control of End User Security
CIS13: The Power of the Cloud and Transformation in the Enterprise
Insights into your IT Service Management - Middle East
Data loss prevention (dlp)
Are you ready for Mobile?
St. Vincents Private Hospital Physical Security
Securing The Journey To The Cloud
Zero footprint guest memory introspection from xen
DLP Executive Overview
Applied mobile chaos theory
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
Data Protection Fde Solution Presentation
What's New in Ivanti Workspace Control 2020.0
Security Lock Down Your Computer Like the National Security Agency (NSA)
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
SYN310: Deep dive into ShareFile Enterprise functionality
PKI: Is it worth something, or what?
Sophos Wireless Protection Overview
Symantec DLP for Tablet
Ad

Viewers also liked (10)

ODP
Sophos Corporate Overview And End Poin 2016
PPTX
PPTX
Understanding Malware Lateral Spread Used in High Value Attacks
PDF
How to Replace Your Legacy Antivirus Solution with CrowdStrike
PDF
Activated Charcoal - Making Sense of Endpoint Data
PPTX
Malware evolution and Endpoint Detection and Response Technology
PPTX
Flash memory
PDF
Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack
PDF
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
PDF
What Is Next-Generation Endpoint Security and Why Do You Need It?
Sophos Corporate Overview And End Poin 2016
Understanding Malware Lateral Spread Used in High Value Attacks
How to Replace Your Legacy Antivirus Solution with CrowdStrike
Activated Charcoal - Making Sense of Endpoint Data
Malware evolution and Endpoint Detection and Response Technology
Flash memory
Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
What Is Next-Generation Endpoint Security and Why Do You Need It?
Ad

Similar to USB Port Protection that Hardens Endpoint Security and Streamlines Compliance (20)

PDF
Ensuring Data Protection by controlling the Use of Removable Media
PDF
B fujitsu uk-and_ireland_cs.en-us
PDF
Headquartered at home community publication nx n pakistan
PDF
Personal identity information protection
PDF
University of the West of Scotland implements a Multi-Campus Juniper Networks...
PDF
10-ways-the-dissolving-perimeter-kills-IT
PDF
TEUNO Summit - Presentaciones
PDF
Tech trendnotes
PDF
Video Security Goes to the cloud
PDF
Document case study-Systweak - Go4Hosting
PDF
Value Stories - 7th Issue
PDF
Introduction of Cloudflare Solution for Mobile Payment
PDF
Cybersecurity | Meta Networks: Software defined perimeter platform
PDF
Forging a Secure Path to Private 5G Networks for Enterprises
PDF
Virtela Corp Brochure
PPT
Cloud computing – an emerging paradigm
PDF
Draft Juniper Experience First Networking | Slideshare
PDF
Grupo Banco Popular: Software Deployment Case Study
PDF
Knorr-Bremse Group Strong Authentication Case Study
Ensuring Data Protection by controlling the Use of Removable Media
B fujitsu uk-and_ireland_cs.en-us
Headquartered at home community publication nx n pakistan
Personal identity information protection
University of the West of Scotland implements a Multi-Campus Juniper Networks...
10-ways-the-dissolving-perimeter-kills-IT
TEUNO Summit - Presentaciones
Tech trendnotes
Video Security Goes to the cloud
Document case study-Systweak - Go4Hosting
Value Stories - 7th Issue
Introduction of Cloudflare Solution for Mobile Payment
Cybersecurity | Meta Networks: Software defined perimeter platform
Forging a Secure Path to Private 5G Networks for Enterprises
Virtela Corp Brochure
Cloud computing – an emerging paradigm
Draft Juniper Experience First Networking | Slideshare
Grupo Banco Popular: Software Deployment Case Study
Knorr-Bremse Group Strong Authentication Case Study

More from Netwrix Corporation (18)

PPTX
File system auditing who accessed what files and where
PPTX
Top 10 critical changes to audit in your it infrastructure
PPTX
Top 5 identity management challenges and solutions
PPTX
Top 5 critical changes to audit for active directory
PDF
How to Effectively Audit your IT Infrastructure
PDF
NetWrix Change Reporter Suite - Product Review by Don Jones
PDF
Auditing Active Directory to Comply with State and Federal Regulations
PDF
Auditing Solution Enables Coaching of Staff and Pleases Auditors
PDF
Automated De-provisioning of Inactive Users Accounts
PDF
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
PDF
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
PDF
Active Directory Change Auditing in the Enterprise
PDF
Extending Change Auditing to Exchange Server
PDF
Staying Abreast of Group Policy Changes
PDF
The Business Case for Account Lockout Management
PDF
Exchange Auditing in the Enterprise
PDF
File Auditing in the Enterprise
PDF
File auditing on NetApp Filer
File system auditing who accessed what files and where
Top 10 critical changes to audit in your it infrastructure
Top 5 identity management challenges and solutions
Top 5 critical changes to audit for active directory
How to Effectively Audit your IT Infrastructure
NetWrix Change Reporter Suite - Product Review by Don Jones
Auditing Active Directory to Comply with State and Federal Regulations
Auditing Solution Enables Coaching of Staff and Pleases Auditors
Automated De-provisioning of Inactive Users Accounts
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Active Directory Change Auditing in the Enterprise
Extending Change Auditing to Exchange Server
Staying Abreast of Group Policy Changes
The Business Case for Account Lockout Management
Exchange Auditing in the Enterprise
File Auditing in the Enterprise
File auditing on NetApp Filer

USB Port Protection that Hardens Endpoint Security and Streamlines Compliance

  • 1. NetWrix Customer Case Study USB Port Protection that Hardens Endpoint Security and Streamlines Compliance “NetWrix USB Blocker accomplished what we needed it to do. The fact that it just works was enough justification for us to like the product.” Customer: Large Collection Agency Mark Precilla, Network Support, Large Collection Agency Number of Users: 500 Industry: Banking and Finance As one of the leading collection agencies in Canada, this firm helps its customers manage their financial portfolios by way of leading edge Solution: technology and cost-effective services designed specifically for a wide Endpoint Management variety of individual needs. The agency, founded in 2002, continues to Compliance grow on a steady basis, and the company’s needs and responsibilities have accordingly evolved as well. Products: USB Blocker Challenge: Preventing Unauthorized Use of Removable Media Vendor: via USB Ports NetWrix Corporation Privacy was a major priority for many of the big-name clients using this Phone: 888-638-9749 collection agency, and thus, the company’s IT department understood the Web Site: www.netwrix.com importance of hindering illicit use of removable media via USB ports, both for protection of sensitive corporate and customer data, as well as adherence Customer Profile: to compliance standards. The USB protection tool that the company was As one of the largest collection previously using did not always work, and the IT department needed a agencies in Canada, this firm solution that they could rely on. helps its customers manage their financial portfolios by way of leading “We were looking for an easy-to-use solution that we could easily edge technology and cost-effective implement into our existing infrastructure,” said Precilla. “We needed a services designed specifically for a solution that was consistent, but prior to NetWrix, we had an alternative wide variety of individual needs. The solution that did not always work.” agencycontinues to grow on a steady basis, and currently serves all of To both the firm, and its enterprise clients, this type of unpredictability was Canada. not acceptable, and that is when the IT department began looking for a new way to secure their endpoints. Solution: Centralized USB Port Protection That Works That is when the collection agency turned to NetWrix USB Blocker, the endpoint security solution that enforces centralized Copyright © NetWrix Corporation. All rights reserved.
  • 2. NetWrix Customer CaseCase NetWrix Customer Study Study access control that prevents the unauthorized its customers with the type of security use of removable media that connects to and privacy that they demand. The threat computer USB ports, such as memory sticks, of unauthorized data removal has since removable hard disks, iPods and so on. been thwarted, and auditors can rest easy knowing that the IT department is adhering “We looked at several vendors, such as to regulations. TrendMicro, but NetWrix USB Blocker is easy to use and the product just works,” said “Since implementing NetWrix USB Precilla. “It was really easy to implement Blocker, we have found that inappropriate NetWrix USB Blocker into our existing use of USB devices went down,” said infrastructure. The software also worked on Precilla. “Unauthorized files on our the first try with very little configuration to network shares went down as well. play around with. The other software we had From a security standpoint, our end user before required a lot of time to work with, workstations are now more secure than and time is money. We started planning a few ever, as no unauthorized devices can go weeks prior to purchasing NetWrix. It was undetected. This also helps us maintain probably two weeks between inception to compliance, as our auditors can see that ready-to-launch. Deployment took only an these types of USB port activities are not hour or so and went smoothly.” possible.” NetWrix USB Blocker relies on built- “I would recommend NetWrix to other in Active Directory mechanisms and companies because it is a simple, easy seamlessly integrates into existing Microsoft to use solution,” Precilla added. “It is environments. With only a couple clicks of the also easy to implement in a Microsoft mouse, the firm was able to quickly get the environment. And the NetWrix team is solution up and running in order to satisfy its great to work with.” customers and auditors. About NetWrix Corporation Proven Result: USB Port Protection Established in 2006, NetWrix Corporation Hardens Security and Appeases Auditors provides innovative and cost-effective solutions that simplify and automate the management of USB port protection ensures that sensitive Windows networks. With in-depth knowledge and information remains private, protecting experience managing Windows environments of against data theft and misuse. Since all sizes, the company delivers solutions to meet deploying NetWrix USB Blocker, the complicated business requirements while fulfilling company has been better able to provide the best expectations of IT professionals. Copyright © NetWrix Corporation. All rights reserved.