SlideShare a Scribd company logo
1 of 11
Secure USB Innovations
ABOUT BRAINZSQUARE Int.
Since 2006, our corporation entered the market with the
intention to revolutionize the way personal information and
confidential data were being secured in the fast-changing IT
environment. Having the core technology for data encryption,
copy protection systems, and PC peripheral devices control, we
produced products that safely and efficiently secured corporate
business information as well as your personal information. The
main products manufactured for this area supplies the
customer with secure USB flash drive, confidential data theft
protection, unauthorized copy protection, peripheral device
control, and screen capture prevention. With partners from
different parts of the world, our corporation is thriving in the
space it has acquired in the market.
WHY DO WE NEED IT?
If a USB flash drive is lost or stolen, or is infected with a virus, whether it
be at work or at home, it could be devastating to the company and the
individual. In another example, when the USB stick is being shared with
another person, data leakage or confidential data theft could become a
potential threat to the user. With SECUDRIVE USBs, these threats are
blocked within the device, keeping our customer’s confidential and
private information secure even when the USB flash drive is lost or
stolen.
FIND WHAT YOU NEED…
SECUDRIVE USB BASIC
 AES 256-bit crypto chip - The AES 256 crypto chip automatically encrypts all of the data being stored in the USB flash drive. Even if the
USB flash drive is lost or stolen, data leakage will not be a problem.
 Data erase for wrong password input - All of the data stored in the USB flash drive will be deleted after 10 consecutive failed
password entry attempts. Once deleted the files are no longer recoverable.
 USB auto lock - If SECUDRIVE USB Basic does not detect PC action for a certain period of time, the USB flash drive will automatically lock
itself, preventing data leakage when the user is away.
 Diagnosis and removal of virus - With embedded Trend Micro USB Security ™2.0, SECUDRIVE USB Basic V series prevents malicious
code from entering into the USB flash drive. When files are infected inside the device, the anti-virus program quarantines them.
 One year pattern and engine update for free - SECUDRIVE USB Basic V series is embedded with Trend Micro USB Security
™2.0 and provides 1 year of pattern and engine update service free of charge.
SECUDRIVE USB OFFICE
 AES 256-bit crypto chip - The AES 256 crypto chip automatically encrypts all of the data being stored in the USB flash drive. Even if the
USB flash drive is lost or stolen, data leakage will not be a problem.
 Data erase for wrong password input - All of the data stored in the USB flash drive will be deleted after 10 consecutive failed
password entry attempts. Once deleted the files are no longer recoverable.
 Copy protection - Customizable copy protection features including file copy & paste prevention, screen capture prevention, file printing
prevention and network transfer control.
 Limited valid period or number of usage - The administrator can set valid period and maximum number of login for each USB
Office. When this limitation is met, the user will no longer be able to access the secure zone of the USB drive.
 Log collection - The administrator can view the log history, which records all actions done by SECUDRIVE USB Office. This information can be
used for future audit purposes.
SECUDRIVE USB ENTERPRISE
 Blocks File Copy & Paste, Save As - The protected files stored in the SECUDRIVE USB flash drives will not be allowed to be ‘Copy &
Paste’ to another disk, nor ‘Save As’ as an another file in the Local PC.
 Prevents Clipboard Copy & Paste - After opening a file, a user could Copy & Paste (Ctrl + C, Ctrl + V) or Copy All (Ctrl + A), the
contents of the file to the clipboard. SECUDRIVE USB protects the file against the clipboard copy operation.
 Disables Printing Block or gives Watermark - The protected file can be configured to allow printing with Watermark or block
the file from printing.
 Screen Capture Protection - SECUDRIVE USB protects the file from ‘Screen Capture’ functions. When the user tries to ‘Screen Capture’
by using the Print Screen key or tools, the user will only have a green screen copied.
 Blocks File Transfer - Files stored in the secure zone of the USB flash drive will be protected against file transferring. The user will not be
able to attach the file to e-mails and messenger applications.
 Sets valid period and login count - The number of access a user has to the USB flash drive can be set by the administrator. The
deadline usage of the USB flash drive can also be set by the administrator. If it exceeds the limit, the user cannot login to the USB drive anymore.
 Log collection - It is possible to collect event log of file use on the USB flash drive, such as read, write, delete, rename, transfer, copy
prevention, etc.
 Malicious code and program protection - The accesses of malicious codes or P2P programs are blocked by SECUDRIVE USBs.
 AES 256-it crypto chip -The AES 256 bit encryption chip automatically encrypts all the files stored into the secure zone of the USB flash
drive. You will not need to worry about data leakage when you lose or someone steals your SECUDRIVE USB.
 USB auto lock - The USB will lock itself automatically when a set of unsuccessful password entries are made. A user without the correct
password will not be able to enter the USB drive.
SECUDRIVE USB PERSONAL
 AES 256-bit crypto chip - The AES 256 crypto chip automatically encrypts all of the data being stored in the USB flash drive. Even if the
USB flash drive is lost or stolen, data leakage will not be a problem.
 Data erase for wrong password input - All of the data stored in the USB flash drive will be deleted after 10 consecutive failed
password entry attempts. Once deleted the files are no longer recoverable.
 USB auto lock - If SECUDRIVE USB Basic does not detect PC action for a certain period of time, the USB flash drive will automatically lock
itself, preventing data leakage when the user is away.
 Secure backup of USB data - Data in the USB flash drive can be backed up securely to your local PC.
 File Eraser - Provides deletion mechanisms used by the U.S. Department of Defense, which overwrites the entire designated file sector
multiple times with different digit-combinations.
 File synchronization - Keeps your data secure from loss by automatic backup of either newly added or edited files.
 Diagnosis and removal of virus - With embedded Trend Micro USB Security ™2.0, SECUDRIVE USB Basic V series prevents malicious
code from entering into the USB flash drive. When files are infected inside the device, the anti-virus program quarantines them.
 One year pattern and engine update for free - SECUDRIVE USB Basic V series is embedded with Trend Micro USB Security
™2.0 and provides 1 year of pattern and engine update service free of charge.
XP SP2+
SPECIFICATIONS
OS Windows XP SP2+, Vista, 7 (32-bit and 64-bit editions)
Interface USB 2.0 and 1.1
Power USB Bus Power
Capacity 4GB, 8GB, 16GB, 32GB
Size 60.6×18.0×8.1mm
Weight 10g
Temperature 0℃~45℃
Documentation
MS Office XP/2003/2007/2010, (Word, Excel, PowerPoint, Access),
OpenOffice
Design Adobe CS3 Photoshop / Illustrator / Flash
Video Player Windows Media Player
Editor EditPlus, UltraEdit, Notepad
Zip WinRAR, Alzip, 7-zip
QUESTIONS?
THANK YOU!

More Related Content

Similar to Secudrive

How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11Muhammad Arsalan
 
Usb Control
Usb ControlUsb Control
Usb Controltafinley
 
2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UKmfoudi
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPJavier Arrospide
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Learn How to Detect, Prevent, and Replace the Use of USB Drives
Learn How to Detect, Prevent, and Replace the Use of USB DrivesLearn How to Detect, Prevent, and Replace the Use of USB Drives
Learn How to Detect, Prevent, and Replace the Use of USB DrivesSolarWinds
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Securityvenkasureantivirus
 
Best 15 file and folder locker for Windows 11
Best 15 file and folder locker for Windows 11Best 15 file and folder locker for Windows 11
Best 15 file and folder locker for Windows 11gaurav yadav
 
Secured E-Learning Content on USB/HDD Device
Secured E-Learning Content on USB/HDD DeviceSecured E-Learning Content on USB/HDD Device
Secured E-Learning Content on USB/HDD DeviceIOSR Journals
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Imation loc kv20-e manual
Imation loc kv20-e manualImation loc kv20-e manual
Imation loc kv20-e manualJaui Puma
 

Similar to Secudrive (20)

BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Usb Drive Protector
Usb Drive ProtectorUsb Drive Protector
Usb Drive Protector
 
How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11
 
Usb Control
Usb ControlUsb Control
Usb Control
 
2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Learn How to Detect, Prevent, and Replace the Use of USB Drives
Learn How to Detect, Prevent, and Replace the Use of USB DrivesLearn How to Detect, Prevent, and Replace the Use of USB Drives
Learn How to Detect, Prevent, and Replace the Use of USB Drives
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
D0312427
D0312427D0312427
D0312427
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
 
Best 15 file and folder locker for Windows 11
Best 15 file and folder locker for Windows 11Best 15 file and folder locker for Windows 11
Best 15 file and folder locker for Windows 11
 
Secured E-Learning Content on USB/HDD Device
Secured E-Learning Content on USB/HDD DeviceSecured E-Learning Content on USB/HDD Device
Secured E-Learning Content on USB/HDD Device
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Imation loc kv20-e manual
Imation loc kv20-e manualImation loc kv20-e manual
Imation loc kv20-e manual
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Secudrive

  • 2. ABOUT BRAINZSQUARE Int. Since 2006, our corporation entered the market with the intention to revolutionize the way personal information and confidential data were being secured in the fast-changing IT environment. Having the core technology for data encryption, copy protection systems, and PC peripheral devices control, we produced products that safely and efficiently secured corporate business information as well as your personal information. The main products manufactured for this area supplies the customer with secure USB flash drive, confidential data theft protection, unauthorized copy protection, peripheral device control, and screen capture prevention. With partners from different parts of the world, our corporation is thriving in the space it has acquired in the market.
  • 3. WHY DO WE NEED IT? If a USB flash drive is lost or stolen, or is infected with a virus, whether it be at work or at home, it could be devastating to the company and the individual. In another example, when the USB stick is being shared with another person, data leakage or confidential data theft could become a potential threat to the user. With SECUDRIVE USBs, these threats are blocked within the device, keeping our customer’s confidential and private information secure even when the USB flash drive is lost or stolen.
  • 4. FIND WHAT YOU NEED…
  • 5. SECUDRIVE USB BASIC  AES 256-bit crypto chip - The AES 256 crypto chip automatically encrypts all of the data being stored in the USB flash drive. Even if the USB flash drive is lost or stolen, data leakage will not be a problem.  Data erase for wrong password input - All of the data stored in the USB flash drive will be deleted after 10 consecutive failed password entry attempts. Once deleted the files are no longer recoverable.  USB auto lock - If SECUDRIVE USB Basic does not detect PC action for a certain period of time, the USB flash drive will automatically lock itself, preventing data leakage when the user is away.  Diagnosis and removal of virus - With embedded Trend Micro USB Security ™2.0, SECUDRIVE USB Basic V series prevents malicious code from entering into the USB flash drive. When files are infected inside the device, the anti-virus program quarantines them.  One year pattern and engine update for free - SECUDRIVE USB Basic V series is embedded with Trend Micro USB Security ™2.0 and provides 1 year of pattern and engine update service free of charge.
  • 6. SECUDRIVE USB OFFICE  AES 256-bit crypto chip - The AES 256 crypto chip automatically encrypts all of the data being stored in the USB flash drive. Even if the USB flash drive is lost or stolen, data leakage will not be a problem.  Data erase for wrong password input - All of the data stored in the USB flash drive will be deleted after 10 consecutive failed password entry attempts. Once deleted the files are no longer recoverable.  Copy protection - Customizable copy protection features including file copy & paste prevention, screen capture prevention, file printing prevention and network transfer control.  Limited valid period or number of usage - The administrator can set valid period and maximum number of login for each USB Office. When this limitation is met, the user will no longer be able to access the secure zone of the USB drive.  Log collection - The administrator can view the log history, which records all actions done by SECUDRIVE USB Office. This information can be used for future audit purposes.
  • 7. SECUDRIVE USB ENTERPRISE  Blocks File Copy & Paste, Save As - The protected files stored in the SECUDRIVE USB flash drives will not be allowed to be ‘Copy & Paste’ to another disk, nor ‘Save As’ as an another file in the Local PC.  Prevents Clipboard Copy & Paste - After opening a file, a user could Copy & Paste (Ctrl + C, Ctrl + V) or Copy All (Ctrl + A), the contents of the file to the clipboard. SECUDRIVE USB protects the file against the clipboard copy operation.  Disables Printing Block or gives Watermark - The protected file can be configured to allow printing with Watermark or block the file from printing.  Screen Capture Protection - SECUDRIVE USB protects the file from ‘Screen Capture’ functions. When the user tries to ‘Screen Capture’ by using the Print Screen key or tools, the user will only have a green screen copied.  Blocks File Transfer - Files stored in the secure zone of the USB flash drive will be protected against file transferring. The user will not be able to attach the file to e-mails and messenger applications.  Sets valid period and login count - The number of access a user has to the USB flash drive can be set by the administrator. The deadline usage of the USB flash drive can also be set by the administrator. If it exceeds the limit, the user cannot login to the USB drive anymore.  Log collection - It is possible to collect event log of file use on the USB flash drive, such as read, write, delete, rename, transfer, copy prevention, etc.  Malicious code and program protection - The accesses of malicious codes or P2P programs are blocked by SECUDRIVE USBs.  AES 256-it crypto chip -The AES 256 bit encryption chip automatically encrypts all the files stored into the secure zone of the USB flash drive. You will not need to worry about data leakage when you lose or someone steals your SECUDRIVE USB.  USB auto lock - The USB will lock itself automatically when a set of unsuccessful password entries are made. A user without the correct password will not be able to enter the USB drive.
  • 8. SECUDRIVE USB PERSONAL  AES 256-bit crypto chip - The AES 256 crypto chip automatically encrypts all of the data being stored in the USB flash drive. Even if the USB flash drive is lost or stolen, data leakage will not be a problem.  Data erase for wrong password input - All of the data stored in the USB flash drive will be deleted after 10 consecutive failed password entry attempts. Once deleted the files are no longer recoverable.  USB auto lock - If SECUDRIVE USB Basic does not detect PC action for a certain period of time, the USB flash drive will automatically lock itself, preventing data leakage when the user is away.  Secure backup of USB data - Data in the USB flash drive can be backed up securely to your local PC.  File Eraser - Provides deletion mechanisms used by the U.S. Department of Defense, which overwrites the entire designated file sector multiple times with different digit-combinations.  File synchronization - Keeps your data secure from loss by automatic backup of either newly added or edited files.  Diagnosis and removal of virus - With embedded Trend Micro USB Security ™2.0, SECUDRIVE USB Basic V series prevents malicious code from entering into the USB flash drive. When files are infected inside the device, the anti-virus program quarantines them.  One year pattern and engine update for free - SECUDRIVE USB Basic V series is embedded with Trend Micro USB Security ™2.0 and provides 1 year of pattern and engine update service free of charge.
  • 9. XP SP2+ SPECIFICATIONS OS Windows XP SP2+, Vista, 7 (32-bit and 64-bit editions) Interface USB 2.0 and 1.1 Power USB Bus Power Capacity 4GB, 8GB, 16GB, 32GB Size 60.6×18.0×8.1mm Weight 10g Temperature 0℃~45℃ Documentation MS Office XP/2003/2007/2010, (Word, Excel, PowerPoint, Access), OpenOffice Design Adobe CS3 Photoshop / Illustrator / Flash Video Player Windows Media Player Editor EditPlus, UltraEdit, Notepad Zip WinRAR, Alzip, 7-zip