Why Control USB Devices and Removable Media Access to Endpoints:
USB Device Control and Removable media management software is required to protect organizations endpoint computers that control machinery or store sensible data. Device Control remains one of the most important aspects of Endpoint Security and focuses in the protection of endpoint systems and data assets from external or internal threat. Windows Operating Systems are by design friendly to removable storage and portable devices, this is a good feature, nevertheless in industrial and business environments usb drives and other removable devices access to endpoints need to be controlled to prevent the risk of systems infection and data loss.
Why choose USB-Lock-RP straightforward Device Control:
USB-Lock-RP Device Control is the strongest endpoint security software solution specialized in controlling USB devices access to networked SCADA, ICS and PCs, in the market today.
It protects a broad range of Windows Operating Systems, servers and station (NT 10 to NT 5.1) from incoming and outgoing of data by means of:
USB, eSATA and Firewire removable drives, mobile phones, MTP portable devices, Smart Cards, Compact discs, and Bluetooth, IrDA, Wi-Fi transceivers, as well as keystroke injection attacks by HID Impersonation devices such as badUSB, USB Rubber Ducky.
Start protecting your network endpoints in minutes. Very easy to operate. Protection scope is divided in 4 sectors; just select a client machine and press the desired lock to keep threats away.
Blocks Incoming and outgoing of data. Authorized Devices Hardware IDs working storage is AES 256 variable key, variable initiation vector CBC Mode encrypted. Prevents Devices Hardware ID spoofing.
Easy authorize specific usb removable drives and specific smart phones on specific endpoints or on all enpoint computers in the network and block the rest, Preventing unauthorized USB and Removable Media from entering the operating systems in your Network infrastructure.
Set or change security measures and automatically receive and log details on blocked, and authorized devices as they are plugged into endpoints in real-time, as well as records of files transferred from endpoint computers to authorized USB thumb drives.
Presents informative alerts screens at client computers upon blocking devices, screens presented at endpoint computers (clients) are personalized with end-user organization logo.
Designed not to interfere with the use of non storage capable peripherals, but detects and protects against keystroke injection and malicious payload attacks by devices such as USB Rubber Ducky that impersonate HID keyboards.
Monitoring of authorized usb thumb drives file extractions and capable of sending these records to an SMTP email within your domain in real-time, Function allows for TLS or SSL transmission protocols.
Protects information contained on authorized USB Thumb drives by optionally forcing AES 256 encryption of all transferred data to authorized USB devices.
USB-Lock-RP device management software is Licensed by top notch organizations:
End-user Organization Perpetual use Licenses.
Doesn’t require internet,
Doesn’t require Active directory, protects even if client endpoint is disconnected from the network, Protects at System level, Starts protecting even if no user is logged into the system.
Fully functional DEMO ready for download, test how USB-Lock-RP security software manages USB Devices access to endpoints with ease and monitor authorized Thumb drives without time limitation in up to 5 clients.
The Advanced Systems team stands by to assist in any questions you may have.
USB-Lock-RP: USB Device Endpoint Security Software
Briefly Explained, USB-Lock-RP Device Control Characteristics:
Regulate USB and Removable media:
Step # 1: Select a client PC from the USB-Lock-RP Control network list.(Administrative Console)
Step # 2: Click on the left side lock. Done!
You have just protected the selected computer removable drives sector. Now access is denied to the following devices: USB, eSATA and Firewire drives, Mobile phones (MTP Protocol), Smart cards.
Note: Also included in this sector is protection against badUSB devices such as USB Rubber Ducky, this devices are extremely dangerous as they have modified firmware to impersonate Human interface devices (HID) such as keyboards and inflict keystroke attacks and introduce malware malicious payloads that could harm endpoint computers and network infrastructure.
Authorizing specific USB Thumb drives and Mobile phones is as easy, just insert the device you wich to authorize (at the control or at the client) and press authorize. Done!
Three other sectors to control are available and are as easy to protect: CD/DVD sector, iRDA/Bluetooth sector,and WiFi sector.
All blocked or authorized device connection to endpoints (clients) automatically generate an event recorded at the Control showing the date, time, Hardware ID, logged user and machine name.
All blocked devices at endpoint generate a full screen alert visible at client bearing the licensed organization logo at top left corner. The full screen alert remains until the device is removed
Monitor USB Thumb drives:
USB Monitoring is activated or deactivated with just one click independently of the removable drives sector protection state (while protected or unprotected state)
Collected data include the name and exact weight of trasfered files from the client endpoint PC to thumb drives, logged user, device hardware ID, source machine name, date/time when the event started.
Records are sent encrypted AES 256 hex masked from the endpoint computer to the control in near real-time and are organized at the control by endpoint machine name/date/time for review as needed.
At the control the collected data remains encrypted and is only readable within the the USB-Lock-RP Device Control interface.
USB Encryption can also be turned ON or OFF with just one click. (USB Monitoring needs to be activated for USB Encryption to work).
When USB Encryption is active all files transferred from the endpoint computer to USB Thumb driver are automatically AES 256 encrypted. (all the data not just the headers)
Stored files on encrypted USB Thumb drives can be opened within the endpoit originating client or within any other endpoint USB-Lock-RP client that has USB Encryption activated.
This function ensures that information contained inside authorized USB Thumb drives is only accessible within determined computers in the network.
We invite you to learn more about USB-Lock-RP USB Endpoint Security Software, download, install the DEMO, and start controlling devices access to protect you organizations data assets and systems.