Why Control Removable Media Access to Endpoints:
USB Device Control and Removable media management software is required to protect organizations endpoint computers that control machinery or store sensible data. Device Control remains one of the most important aspects of Endpoint Security and focuses in the protection of endpoint systems and data assets from external or internal threat. Removable media is an attack vector by itself and a probable Initial attack vector in an infection sequence. Windows Operating Systems are by design friendly to removable storage and portable devices, this is a good feature, nevertheless in industrial and business environments usb drives and other removable devices access to endpoints need to be controlled to prevent the risk of systems infection and data loss.
Why Choose USB-Lock-RP Device Control:
USB-Lock-RP Device Control is the strongest endpoint security software solution specialized in controlling USB devices access to networked SCADA, ICS and PCs, in the market today. It protects a broad range of Windows Operating Systems, servers and station (NT 10 to NT 5.1) from incoming and outgoing of data by means of:
Device Control Protection Scope: USB, eSATA and Firewire removable drives, mobile phones, MTP portable devices, Smart Cards, Compact discs, and Bluetooth, IrDA, Wi-Fi transceivers, as well as badUSBs such as USB Rubber Ducky devices that can inflict keystroke injection attacks by HID Impersonation
Start protecting your network endpoints in minutes. Very easy to operate. Protection scope is divided in 4 sectors; just select a client machine and press the desired lock to keep threats away.
Prevents Zero-day USB-based exploit from entering your systems. Blocks Incoming and outgoing of data. Authorized Devices Hardware IDs working storage is AES 256 variable key, variable initiation vector CBC Mode encrypted. Prevents Devices Hardware ID spoofing.
Easy authorize specific usb removable drives and specific smart phones on specific endpoints or on all endpoint computers in the network and block the rest. Prevents unauthorized USB devices and other Removable Media from accessing the operating systems in your Network infrastructure.
Set or change security measures and automatically receive and log details on blocked, and authorized devices as they are plugged into endpoints in real-time. As well as records of files transferred from endpoint computers to authorized USB thumb drives.
Presents informative alerts screens at client computers upon blocking devices, screens presented at endpoint computers (clients) are personalized with end-user organization logo.
Designed not to interfere with the use of non storage capable peripherals, but detects and protects against keystroke injection and malicious payload attacks by devices such as USB Rubber Ducky that impersonate HID keyboards.
Monitoring of authorized usb thumb drives file extractions and capable of sending these records to an SMTP email within your domain in real-time. Function allows for TLS or SSL transmission protocols.
Protects information contained on authorized USB Thumb drives by optionally forcing AES 256 encryption of all transferred data to authorized USB devices.
USB-Lock-RP device control, management software is Licensed by top notch organizations:
End-user Organization Perpetual use Licenses.
Doesn’t require internet.
Doesn’t require Active directory. Protects even if client endpoint is disconnected from the network. Protects at System level. Starts protecting even if no user is logged into the system.
Fully functional DEMO ready for download. Test how USB-Lock-RP security software manages USB Devices access to endpoints with ease and monitor authorized Thumb drives without time limitation in up to 5 clients.
USB-Lock-RP: USB Device Endpoint Security Software
Briefly Explained, USB-Lock-RP Endpoint Security Functionality:
How to Regulate Removable media:
Step # 1: Select a client PC from the USB-Lock-RP Control network list.(Administrative Console)
Step # 2: Click on the left side lock. Done!
You have just protected the selected computer removable drives sector. Now access is denied to the following devices: USB, eSATA and Firewire drives, Mobile phones (MTP Protocol), Smart cards.
Note: Also included in this sector is protection against badUSB devices such as USB Rubber Ducky, this devices are extremely dangerous as they have modified firmware to impersonate Human interface devices (HID) such as keyboards and inflict keystroke attacks and introduce malware malicious payloads that could harm endpoint computers and network infrastructure.
Authorizing specific USB pen drives and Mobile phones is as easy, just insert the device you need to authorize (at the control or at the client) and press authorize. Done!
Besides usb device control, three other sectors to manage are available and are as easy to protect: CD/DVD sector, iRDA/Bluetooth sector,and WiFi sector.
All blocked or authorized device connection to endpoints (clients) automatically generate an event recorded at the Control showing the date, time, Hardware ID, logged user and machine name.
All blocked devices at endpoint generate a full screen alert visible at client bearing the licensed organization logo at top left corner. The full screen alert remains until the device is removed.
How to Monitor Thumb drives:
USB Monitoring is activated or deactivated with just one click independently of the removable drives sector protection state. (while protected or unprotected state)
Collected data include the name and exact weight of trasfered files from the client endpoint PC to flash drives, logged user, device hardware ID, source machine name, date/time when the event started.
Records are sent encrypted AES 256 hex masked from the endpoint computer to the control in near real-time and are organized at the control by endpoint machine name/date/time for review as needed.
At the control the collected data remains encrypted and is only readable within the the USB-Lock-RP Device Control interface.
USB Encryption can also be turned ON or OFF with just one click. (USB Monitoring needs to be activated for USB Encryption to work).
When USB Encryption is active all files transferred from the endpoint computer to USB flash drives are automatically AES 256 encrypted. (all the data not just the headers)
Stored files on encrypted USB Thumb drives can be opened within the endpoint originating client or within any other endpoint USB-Lock-RP client that has USB Encryption activated.
This function ensures that information contained inside authorized Thumb drives is only accessible within determined computers in the network.
About USB-Lock-RP USB Device Control - EndPoint Security Software:
The Advanced Systems team started USB-Lock-RP device control software development in 2004 with the set goal to provide a light-weight, strong EndPoint Security Software Solution to protect windows networks from the risk associated with portable storage use, and has focused on incorporating support to newer operating systems, and to include new portable device technologies under its protection scope, without dropping support to legacy operating systems. It has remained true to its original concept of providing a straightforward tool to allow effective device control and prevent data loss and systems infection in windows organizations networks.
Today in 2018 while complex highly integrated solutions proliferate. Both IIoT and IoT challenge Cybersecurity providers.
Since the Stuxnet attack, removable media has been recognized by critical infrastructure IT as an initial attack vector in an infection sequence. Therefore stopping USB-Based Zero-day or known exploits is a top concern.
USB-Lock-RP™© remains a specialized tool that brings ease to complexities and provides device control capable of preventing data loss and stopping USB-based exploits before they spread. Put USB-Lock-RP to the test today!
It's Device Control that comes with perpetual use license, reasonable cost, operates without requiring internet connection, and offers its service as a tool you can call your own.