SlideShare a Scribd company logo
1 of 1
Download to read offline
801 North Harbor Blvd., Fullerton, CA 92832 • www.miltonsecurity.com • 1.888.674.9001
MOBILE DEVICE & ONE TIME AUTHORIZATION CODES
USBInformer® continues protection even away from your network. On
portable devices such as laptops and tablets, enforcement and reporting
continues. All activity is locally cached and reported to the administrators
as soon as the endpoint returns to the network. This gives your
administrators a clear record of any activity that occurred while the
device was away.
One time use device authentication codes allows your IT staff to help
your mobile employees. Now when your employees take their laptop
off the network, your IT can help authorize devices without the need of
connecting back to the network. These one time use codes authorize a
single device and can never be used again. When the user returns the
computer to the network, the authorized device will be placed into the
database and can be further managed by your IT staff.
DEVICE TYPES
From storage devices to bluetooth dongles, USBInformer® recognizes
and controls all types of USB devices. It is even able to individually
control devices connected to a USB Hub. We have improved our device
detection and in USBInformer® 2.0 we are now able to help mitigate the
risk of a physical keylogger being plugged into your computer systems.
Using deep USB analytics and analysis we can alert on and block
physical keyloggers.
ADMINISTRATOR DEFINED EXCEPTIONS
There are many devices that do not need to be monitored such as mice
and keyboards. Users and administrators commonly move these devices
from computer to computer, and user to user. With USBInformer®,
administrators are able to define exception devices, allowing these
devices to roam between computers and users.
USBInformer® provides USB port security on all
your Windows endpoints, giving you granular
control over all of your USB ports. USB devices
can be used to steal confidential company data,
infect your endpoints or hack your enterprise
computers and the passwords they may contain.
USBInformer® stops access to any USB device
not approved by an administrator including
BadUSB infected devices. Central management
allows administrators to remotely grant, reject,
and monitor usage of new and existing USB
devices.
Provides Granular Control over USB ports
based on a combination of:
User USB Device IDComputer

More Related Content

What's hot

Cell phone based security system & advanced
Cell phone based security system  & advancedCell phone based security system  & advanced
Cell phone based security system & advanced
samarth109
 
Voicemail_Protection
Voicemail_ProtectionVoicemail_Protection
Voicemail_Protection
Ron Healy
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker system
Ecwayt
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
 
Cybersecurity – best practices for protecting identities and assets
Cybersecurity – best practices for protecting identities and assetsCybersecurity – best practices for protecting identities and assets
Cybersecurity – best practices for protecting identities and assets
michael hsieh
 

What's hot (20)

Cell phone based security system & advanced
Cell phone based security system  & advancedCell phone based security system  & advanced
Cell phone based security system & advanced
 
Voicemail_Protection
Voicemail_ProtectionVoicemail_Protection
Voicemail_Protection
 
HUNDURE HTA-500PEF-N Price In Bangladesh
HUNDURE HTA-500PEF-N Price In Bangladesh HUNDURE HTA-500PEF-N Price In Bangladesh
HUNDURE HTA-500PEF-N Price In Bangladesh
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
T 7800 series ip intercom & pa system server t-7800 a
T 7800 series ip intercom & pa system server t-7800 aT 7800 series ip intercom & pa system server t-7800 a
T 7800 series ip intercom & pa system server t-7800 a
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSM
 
Tab Smarti Presentation General
Tab Smarti Presentation GeneralTab Smarti Presentation General
Tab Smarti Presentation General
 
Home automation system
Home automation systemHome automation system
Home automation system
 
POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker system
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Input devices lecture 5
Input devices lecture 5Input devices lecture 5
Input devices lecture 5
 
Heartbleed
HeartbleedHeartbleed
Heartbleed
 
Cybersecurity – best practices for protecting identities and assets
Cybersecurity – best practices for protecting identities and assetsCybersecurity – best practices for protecting identities and assets
Cybersecurity – best practices for protecting identities and assets
 
Rivetz Corp. - Building the hardware protected wallet
Rivetz Corp. - Building the hardware protected walletRivetz Corp. - Building the hardware protected wallet
Rivetz Corp. - Building the hardware protected wallet
 
Home automation
Home automationHome automation
Home automation
 
System 6000
System 6000System 6000
System 6000
 
Biometric devices & Malware
Biometric devices  & MalwareBiometric devices  & Malware
Biometric devices & Malware
 

Similar to USBiFlyer2016

Similar to USBiFlyer2016 (20)

REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 
Lesson one introduction to mc
Lesson one  introduction to mcLesson one  introduction to mc
Lesson one introduction to mc
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Hexnode UEM Remote Device Management
 Hexnode UEM Remote Device Management Hexnode UEM Remote Device Management
Hexnode UEM Remote Device Management
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Mobi manager mdm
Mobi manager mdmMobi manager mdm
Mobi manager mdm
 
Unit 2.design computing architecture 2.1
Unit 2.design computing architecture 2.1Unit 2.design computing architecture 2.1
Unit 2.design computing architecture 2.1
 
Empower your business with TeamViewer 13
Empower your business with TeamViewer 13Empower your business with TeamViewer 13
Empower your business with TeamViewer 13
 
Device Hacking
Device HackingDevice Hacking
Device Hacking
 
The People Terminating Unit
The People Terminating UnitThe People Terminating Unit
The People Terminating Unit
 
USB Physical Ports Security Using Python
USB Physical Ports Security Using PythonUSB Physical Ports Security Using Python
USB Physical Ports Security Using Python
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 

USBiFlyer2016

  • 1. 801 North Harbor Blvd., Fullerton, CA 92832 • www.miltonsecurity.com • 1.888.674.9001 MOBILE DEVICE & ONE TIME AUTHORIZATION CODES USBInformer® continues protection even away from your network. On portable devices such as laptops and tablets, enforcement and reporting continues. All activity is locally cached and reported to the administrators as soon as the endpoint returns to the network. This gives your administrators a clear record of any activity that occurred while the device was away. One time use device authentication codes allows your IT staff to help your mobile employees. Now when your employees take their laptop off the network, your IT can help authorize devices without the need of connecting back to the network. These one time use codes authorize a single device and can never be used again. When the user returns the computer to the network, the authorized device will be placed into the database and can be further managed by your IT staff. DEVICE TYPES From storage devices to bluetooth dongles, USBInformer® recognizes and controls all types of USB devices. It is even able to individually control devices connected to a USB Hub. We have improved our device detection and in USBInformer® 2.0 we are now able to help mitigate the risk of a physical keylogger being plugged into your computer systems. Using deep USB analytics and analysis we can alert on and block physical keyloggers. ADMINISTRATOR DEFINED EXCEPTIONS There are many devices that do not need to be monitored such as mice and keyboards. Users and administrators commonly move these devices from computer to computer, and user to user. With USBInformer®, administrators are able to define exception devices, allowing these devices to roam between computers and users. USBInformer® provides USB port security on all your Windows endpoints, giving you granular control over all of your USB ports. USB devices can be used to steal confidential company data, infect your endpoints or hack your enterprise computers and the passwords they may contain. USBInformer® stops access to any USB device not approved by an administrator including BadUSB infected devices. Central management allows administrators to remotely grant, reject, and monitor usage of new and existing USB devices. Provides Granular Control over USB ports based on a combination of: User USB Device IDComputer