Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Networking
    • Small Business
    • Storage

    Imation Upgrades Defender Collection Software Suite

    Written by

    Nathan Eddy
    Published January 5, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Government, enterprises, and small and midsized businesses have new tools for safeguarding critical data on removable storage media with enhancements to Imation’s Defender Collection Software Suite.

      At the 2011 Storage Visions Conference held this week, Imation announced additional Defender Collection software functionality that allows for central management, PC-based removable storage management, storage device management and encryption.

      Part of the full line of Imation Defender Collection secure data-storage solutions, the Defender Collection Software Suite offers the ability to customize and enforce device authentication and security policies and the capability to deploy and manage removable storage devices.

      The Defender Collection Software Suite has options for reporting, as well as the ability to recover passwords, manage keys, and remotely disable lost or stolen devices. Enhancements to the Defender Collection Software include features for both central management (available in Defender Collection Control Server) and PC-based removable storage and device management (available in Defender Collection Control Client).

      Central-management enhancements include the addition of forensic-level auditing and reporting at the file level for compliance in regulated industries. In addition, a new “remote kill” function allows for disabling devices that have been lost or stolen, and distributed provisioning allows for management and configuration of multiple devices in remote locations. Defender Collection Control Server also manages other secure storage products and devices, including Defender Collection optical media.

      PC-based device-level management enhancements include the ability to define what types of removable storage can be used or blocked on a given system, allowing IT and security officers to prevent data theft and avoid viruses on USB flash, optical, removable hard disk, flash memory cards and even MP3 players.

      The Defender Collection Control Client defines how removable storage devices can be used, granting full access, read-only or forced encryption, giving administrators the flexibility to grant or deny access to specific files without affecting access to other files on the device.

      Control Client software includes functionality to control the types of files that can be copied to removable storage devices, either by all or part of the file name or file extension, and administrators will have the ability to deploy antivirus or force a scan prior to reading any removable storage device.

      In addition, the Defender Collection includes secure optical media, USB flash and USB hard drives, with options for antivirus, strong password, fingerprint identification, and integration with common access and personal-identity-verification cards. All feature 256-bit AES (Advanced Encryption Standard) technology and are engineered to meet international standards including FIPS (Federal Information Processing Standards) validation and TAA (Trade Adjustment Assistance) compliance.

      “Businesses of all sizes need a versatile, flexible suite of software to help them effectively manage security on removable storage media,” said Subodh Kulkarni, chief technology officer and senior vice president at Imation. “The robust functionality we’ve added to the Defender Collection Software Suite gives IT management and security officers the tools they need to help users share data with those who need it and are authorized to access it, while preventing critical data from getting into the wrong hands.”

      Nathan Eddy
      Nathan Eddy
      A graduate of Northwestern University's Medill School of Journalism, Nathan was perviously the editor of gaming industry newsletter FierceGameBiz and has written for various consumer and tech publications including Popular Mechanics, Popular Science, CRN, and The Times of London. Currently based in Berlin, he released his first documentary film, The Absent Column, in 2013.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.