Security Software Works Transparently, Reliably

The need for good security software is becoming more obvious everyday. The educational arena, having computer labs with hundreds of machines used by thousands of people, presents a special challenge to companies making security software.

Instructors, administrators and students all need access to certain areas, such as word processing and multimedia applications, but some users must also be prevented from accessing other confidential areas, such as student grades or financial records.

The need also exists to make the security software as user-friendly as possible, for time-challenged educators generally can't fit it in their schedule to sit down and learn a complex program.

Software Makes Big Entrance

Enter usrEZ Software, based in Irvine, Calif. The firm's ultra-SHIELD security software has gained quite a following in the two years since it has been released, and for good reason. The program was voted Best Macintosh Security Product by readers of Infosecurity News, who cited ease-of-use, reliability, compatibility, genuine security and customer service as reasons for choosing ultraSHIELD.

What Dr. Kurt Bartelmehs, of The University of Texas at Austin, has to say about the product emphatically affirms the validity of that award. Acting as the computer coordinator for the department of Geological Sciences, he is responsible for all computer systems including PCs, Sun and SGI workstations, and Macs, of which there are about 40, ranging from Mac IIsi to Power Mac models.

Bartelmehs relates that when he took on this responsibility, there was no consistency from one Mac to another in their configurations. Another thing he quickly discovered was because of their user-friendly nature, "users were always messing with items in the Control Panel as well as tampering with the applications themselves." He reasons that users weren't always trying to be malicious, but were trying to set up the machines the way they thought was best, whether they knew what they were doing or not.

Unanimously Upgraded

The first thing Bartelmehs did to help bring some consistency to the Macs was to research security software. Any changes he made to the Macs without appropriate security software protecting them would probably be gone within a few days, thus the immediate need for security. After looking at several alternatives, Bartelmehs chose ultraSHIELD.

Bartelmehs explains exactly how he uses ultraSHIELD: "During the course of upgrading, I installed ultraSHIELD on every Mac. I found the software extremely easy to use and setup. Since that time, I have had zero problems with people tampering with the machines. The software works in such a way that you can lock users out of any folder containing the system software and other applications. I then place aliases for all the applications under the Apple menu, which allows users to use any application without actually going to the application folder.

"In addition, users cannot change any of the system settings. Also important, ultraSHIELD permits me to lock the Desktop folder so users are not allowed to store their files anywhere on the computer except a folder I have designated, resulting in the computers remaining clean from users leaving their files in undesired locations."

The overall result for users, says Bartelmehs, is that the machines will behave the same way every time they sit down to use them, reducing frustration and keeping the administrator from constantly having to reconfigure machines. "The first semester I used ultraSHIELD, I literally did not have to fix a single Mac."

Fixing Bugs & Other Things

Bartelmehs also credits the company for adding to his overall satisfaction with the product. "They always listen to my suggestions and are genuinely concerned about the quality of their product," he says. When he found some small bugs in the software, the company promptly fixed the bugs and shipped out an updated version.

Recently, the firm has added an ultraSHIELD Educational Template that contains tutorials of the product and extensive details on how beginning users can configure machines to permit normal use of the computer while retaining full security functions.

Featured

  • blue AI cloud connected to circuit lines, a server stack, and a shield with a padlock icon

    Report: AI Security Controls Lag Behind Adoption of AI Cloud Services

    According to a recent report from cybersecurity firm Wiz, nearly nine out of 10 organizations are already using AI services in the cloud — but fewer than one in seven have implemented AI-specific security controls.

  • stacks of glowing digital documents with circuit patterns and data streams

    Mistral AI Intros Advanced AI-Powered OCR

    French AI startup Mistral AI has announced Mistral OCR, an advanced optical character recognition (OCR) API designed to convert printed and scanned documents into digital files with "unprecedented accuracy."

  • robot waving

    Copilot Updates Aim to Personalize AI

    Microsoft has introduced a range of updates to its Copilot platform, marking a new phase in its effort to deliver what it calls a "true AI companion" that adapts to individual users' needs, preferences and routines.

  • teenager interacts with a chatbot on a computer screen

    Character.AI Rolls Out New Parental Insights Feature Amid Safety Concerns

    Chatbot platform Character.AI has introduced a new Parental Insights feature aimed at giving parents a window into their children's activity on the platform. The feature allows users under 18 to share a weekly report of their chatbot interactions directly with a parent's e-mail address.