Software prevents inappropriate access to personal info.

Press Release Summary:



Designed to prevent internal fraud, Compliance Commander Defender protects against improper database access and usage by monitoring all network-attached devices attempting to download private information. Database protection system offers zero-impact approach to constant auditing and analysis of database or file server activity. It inspects occasions where new device attempt, data volume change, or unknown applications are suspect and performs forensic analysis of all resource usage.



Original Press Release:



Compliance Commander Defender Prevents Inappropriate Access to Stored Personal Information



RICHARDSON, Texas, Dec. 14 -- Intrusion Inc. (NASDAQ:INTZ) ("Intrusion") announced today the release of Compliance Commander Defender, its Database Protection System designed to prevent internal fraud. Defender is the second and most recent offering in the Compliance Commander Identity Theft Prevention family. Defender protects against improper database access and usage by monitoring all network-attached devices attempting to download private information.

Defender is used by organizations whose responsibility is to safely store, process, and distribute personal consumer information, including government data such as social security and driver license numbers, financial records including bank account, credit card and loan application data, and sensitive patient healthcare information. For these organizations, the Defender system offers a zero-impact approach to constant auditing and analysis of database or file server activity that is critical to achieving regulatory requirements and privacy.

Compliance Commander Defender offers the following capabilities:

New Device Attempt

Defender monitors all data communications between network-attached computers and the database and file server. When any new device attempts to connect with the database or file server system, its identification is registered by Defender and checked against known devices with prior access permission. Any new device not previously registered triggers an immediate alert to the Compliance Commander web-based management system.

Data Volume Change

Defender monitors all data access activity of approved devices, looking for volumetric changes in resource usage. Once a given device attempts to download data records outside of a baseline range defined by Defender, an alert is triggered to the Compliance Commander Management system notifying IT staff of the data access attempt.

Unknown Applications

Defender monitors all data communications between network-attached computers and the database or file server. When a new application connects to or is used from the monitored resource, its identification is registered by Defender and checked against known devices using the application in question and alerts if it is unknown. Any new device or application not previously registered triggers an immediate alert to the Compliance Commander Management system.

Forensic Analysis

Defender offers deep forensic analysis of all resource usage for the critical IT resource, allowing the administrator to view all activity for a particular device or application using the database or file server. Changes in resource usage are tracked and displayed chronologically for different time periods, allowing the administrator a holistic view of user or application activity.

Tiered Reporting

Using the industry-leading Compliance Commander Provider Management system, administrators are given organization, division, and device-level views of resource usage changes across all monitored IT resources.

Gary Clayton, CEO of Privacy Compliance Group, Inc. explained, "In addition to those directly affected, the American public at large has become alarmed by the numerous data privacy breaches cited by the Federal Trade Commission and the almost daily news reports about ID theft incidents at on- line credit card processing firms, financial institutions and healthcare service providers. Compliance Commander Defender is a powerful tool for organizations to protect against unauthorized access to sensitive information. Compliance Commander Defender will enable organizations to take a large bite out of this growing consumer privacy threat."

Compliance Commander Defender is the latest offering by Intrusion to help commercial and government organizations prevent the loss of personal information due to unauthorized database access. In addition to its Defender solution, the Compliance Commander Identity Theft Prevention family includes the company's Sentry system used by banks, credit unions and healthcare providers to prevent leakage of unencrypted personal information over the Internet.

"Compliance Commander Defender is attacking the growing database privacy issue head-on by alerting IT staff of access attempts to obtain and use personal information without permission," stated Eric Gore, Intrusion Inc. Vice President of Worldwide Sales. "This new database protection system adds another critical component to our Compliance Commander Identity Theft Prevention suite and is available immediately through our global network of highly skilled, certified reseller partners."

About Privacy Compliance Group, Inc.

Privacy Compliance Group, Inc. is a global provider of privacy and data protection solutions for Fortune 500 and other organizations. Gary Clayton is the CEO and founder of Privacy Compliance Group and has worked closely with U.S. and global business and policymakers on Internet, technology, privacy, security, and data protection issues. Mr. Clayton has testified before the U.S. Congress and has been actively involved in helping clients comply with European and other international privacy and data protection requirements. Mr. Clayton has appeared on national news programs including CNBC, CNN, and CNNfn and has been quoted in the Wall Street Journal, USA Today, Financial Times, and other major publications. He is a frequent author and speaker on privacy and data protection issues.

About Intrusion Inc.

Intrusion Inc. is a leading global provider of regulated information compliance, entity identification systems, data privacy protection products along with network intrusion prevention and detection solutions. In addition, Intrusion offers deployment technologies along with security services for the information-driven economy. Intrusion's product families include the Compliance Commander(TM) for regulated information and data privacy protection, TraceCop(TM) identification and location service, Intrusion SpySnare(TM) for real-time inline blocking of spyware and unwanted P2P applications, and Intrusion SecureNet(TM) for network intrusion prevention and detection. Intrusion's products help protect critical information defenders by quickly detecting, protecting, analyzing and reporting attacks or misuse of classified, private and regulated information for government and enterprise networks. For more information, please call 1-888-637-7770 or visit www.intrusion.com .

All Topics