Security Software Works Transparently, Reliably

The need for good security software is becoming more obvious everyday. The educational arena, having computer labs with hundreds of machines used by thousands of people, presents a special challenge to companies making security software.

Instructors, administrators and students all need access to certain areas, such as word processing and multimedia applications, but some users must also be prevented from accessing other confidential areas, such as student grades or financial records.

The need also exists to make the security software as user-friendly as possible, for time-challenged educators generally can't fit it in their schedule to sit down and learn a complex program.

Software Makes Big Entrance

Enter usrEZ Software, based in Irvine, Calif. The firm's ultra-SHIELD security software has gained quite a following in the two years since it has been released, and for good reason. The program was voted Best Macintosh Security Product by readers of Infosecurity News, who cited ease-of-use, reliability, compatibility, genuine security and customer service as reasons for choosing ultraSHIELD.

What Dr. Kurt Bartelmehs, of The University of Texas at Austin, has to say about the product emphatically affirms the validity of that award. Acting as the computer coordinator for the department of Geological Sciences, he is responsible for all computer systems including PCs, Sun and SGI workstations, and Macs, of which there are about 40, ranging from Mac IIsi to Power Mac models.

Bartelmehs relates that when he took on this responsibility, there was no consistency from one Mac to another in their configurations. Another thing he quickly discovered was because of their user-friendly nature, "users were always messing with items in the Control Panel as well as tampering with the applications themselves." He reasons that users weren't always trying to be malicious, but were trying to set up the machines the way they thought was best, whether they knew what they were doing or not.

Unanimously Upgraded

The first thing Bartelmehs did to help bring some consistency to the Macs was to research security software. Any changes he made to the Macs without appropriate security software protecting them would probably be gone within a few days, thus the immediate need for security. After looking at several alternatives, Bartelmehs chose ultraSHIELD.

Bartelmehs explains exactly how he uses ultraSHIELD: "During the course of upgrading, I installed ultraSHIELD on every Mac. I found the software extremely easy to use and setup. Since that time, I have had zero problems with people tampering with the machines. The software works in such a way that you can lock users out of any folder containing the system software and other applications. I then place aliases for all the applications under the Apple menu, which allows users to use any application without actually going to the application folder.

"In addition, users cannot change any of the system settings. Also important, ultraSHIELD permits me to lock the Desktop folder so users are not allowed to store their files anywhere on the computer except a folder I have designated, resulting in the computers remaining clean from users leaving their files in undesired locations."

The overall result for users, says Bartelmehs, is that the machines will behave the same way every time they sit down to use them, reducing frustration and keeping the administrator from constantly having to reconfigure machines. "The first semester I used ultraSHIELD, I literally did not have to fix a single Mac."

Fixing Bugs & Other Things

Bartelmehs also credits the company for adding to his overall satisfaction with the product. "They always listen to my suggestions and are genuinely concerned about the quality of their product," he says. When he found some small bugs in the software, the company promptly fixed the bugs and shipped out an updated version.

Recently, the firm has added an ultraSHIELD Educational Template that contains tutorials of the product and extensive details on how beginning users can configure machines to permit normal use of the computer while retaining full security functions.

Featured

  • cloud with binary code and technology imagery

    Hybrid and AI Expansion Outpacing Cloud Security

    A survey from the Cloud Security Alliance and Tenable finds that rapid adoption of hybrid, multi-cloud and AI systems is outpacing the security measures meant to protect them, leaving organizations exposed to preventable breaches and identity-related risks.

  • teacher typing on a computer in a classroom on the left and a smiling parent using a smartphone on the right

    4 Keys to Building Stronger School Home Connections

    K–12 leaders know that strong family engagement drives student success. It leads to better achievement, fewer behavior issues, stronger relationships between schools and families, and a more positive learning environment.

  • hand holding globe and environmental icons in front of a green background

    CoSN, SETDA, UDT Release Guidelines for Environmentally Responsible Technology Purchasing

    CoSN and SETDA, in partnership with IT and telecommunications solution provider UDT, recently released a set of Sustainability Procurement Guidelines designed to help K-12 school and district leaders, procurement officers, and technology directors make purchasing decisions that are both environmentally responsible and operationally effective.

  • students raising their hands and participating in a classroom discussion

    Report Explores Link Between Student Engagement and Learning

    Over 90% of teachers, principals, and superintendents agree that student engagement is a critical metric for understanding overall achievement, according to a new survey report from Discovery Education.