SlideShare a Scribd company logo
Copyright 2004 – 2018. Advanced Systems International SAC. All rights reserved.
USB LOCK RP ©: Developer & Licensor & Backbone Support
USB-LOCK-RP™© (REMOTE PROTECTOR)
NETWORK ENDPOINT SECURITY SOFTWARE SYSTEM
REAL-TIME CENTRALIZED DEVICES ACCESS CONTROL FOR WINDOWS NETWORKS.
STRAIGHTFORWARD DATA LOSS PREVENTION
A 13-year-old evolution straightforward solution thatincludes functionality required and suggested by real world
IT Infrastructure Architects, IT Managers and Network Systems SecurityAnalysts of top-notch organizations. You
will find serious capacity to allow securing your network without affecting its productivity, and no useless
functionality wasting your systems resources. One USB Lock RP Control can manage up to 1000 clients.
For automatic real-time protection of industrial or corporate windows networks using operatingsystems from
NT 5.1 to NT 10.
info@usb-lock-rp.com
www.usb-lock-rp.com
Phone: +1 (972) 890 9488 // + 51 1 681 1761 // + 51 989 745874
Copyright 2004 – 2018. Advanced Systems International SAC. All rights reserved.
CAPABILITIES:
 Real-time easy to set Authorizations(Block all removable storage devices except the authorized)
 Network level authorization
 Allows for 60 different groups of devices or specific devices to be authorize in all network
clients
 Groups of devices are allowed by hardware PID match and Specific devices by complete
hardware ID match.
 Easily deploy network authorization in real-time to all connected PCs
 Client level authorizations:
 Allows up to 10 USB removable mass storage (UMS) or USB MTP media transfer protocol
devices to be authorized on any specific clientPC. (In additionto the authorizedat network
level).
 To register an authorization just insertthe device at the client or at the control and press
authorize for the selected machine.
 Authorizations registration or elimination take effect in real-time.
 Allows for e-Sata specific authorization.
 AES256 CBC MODE variable key, variable initiation vector protecting critical program records storage and
transmission.
 Automatically receive and log the insertion of allowed or blocked devices at any clients in real-time.
 Generate per client detailed historic reports and global security status, and global alerts reports.
 Audit from any client at any time: system information, installed software, windows updates- security
patches, running processes on any client in real-time.
 Auto Protect allows to protect all sector on a client after a select period of time.
 Compact mode allows control to run under minimal interface.
 Monitors and alerts of Software Installs or uninstalls on clients.
 Keeps record of file transfers made from client PCs to Thumb drives:
 Automatically monitors and registers:
 The name and exact size of files transferred.
 Device insertion date / time and the specific device hardware identifier (ID).
 The name of the PC machine and user/users logged at insertion time.
 Auto email alerts & authorized usb file extractions fully compatible with exchange mail servers and
allows authentication.
 Getall insertionincomingalertsalsosenttoanemailaddressatyourorganizationsdomain.
 Get all details on files extracted on authorized devices also sentto an email address at your
organizations domain
 Keep data transferred to Thumb drives protected:
 When encryption is set to ON, files transferred to Thumb drives are automatically Encrypted
 Encrypted Data is accessible only within clients that have encryption capability set to ON.
 Central Logging: Schedules the automatic output of status & alerts report at a fixed hour, daily or weekly.
To a set share path.
Copyright 2004 – 2018. Advanced Systems International SAC. All rights reserved.
SUPPORTED OPERATING SYSTEMS: (from Windows NT 5.1 to Windows NT 10)
 Windows Server 2016 - Windows 10 - Windows Server 2012 R2 - Windows 8.1 - Windows Server 2012 -
Windows 8 - Windows 7 - Windows Server 2008 R2 - Windows Vista - Windows Server 2003 R2 - Windows
Server 2003 - Windows XP - WindowsEmbedded POSReady2009 & 7 - WES Standard 2009 & 7 (withminimal
components) & Windows Embedded Industry 8.
(All above compatibility refers to both Control & Clients) (32 bit and 64 bit)
PROTECTION SCOPE:
 USB mass storage devices
 USB MTP protocol (extensively used in Smartphone’s and new generation devices)
 Portable flash memory devices
 E-sata, Firewire.
 Digital audio playersincluding MP3playersand iPod
 External magnetic hard drives
 External optical drives, including CD and DVD reader and writer drives, Blue ray
 Adapters bridging between standard flashmemory cards and a USB connection
 Digital cameras (Storage, mtp, Twain)
 Card readers including CF, SD, SDMicro, MMC, XD
 PDA, and handheld computers, mobile phones, smartphone, tablets
 Internal optical drives, includingCD, DVD, Burners, Combos, Floppy drives
 Wireless Transceivers
 IrDA, USB Bluetooth
FULLY FUNCTIONAL DEMO AVAILABLE:
 Capacity 5 clients (Non expiring - like getting5 licenses for free) (For testingpurpose)
https://www.usb-lock-rp.com/download.html
ADVANTAGES:
 Protects even if clients are disconnected from the network.
 Does not restrict the normal use of non-storage capable peripherals, (printers, mouse, keyboards, vcams
etc.).
 Easy authorize specific devices.
 Light on system resources.
 Personalized Alertscreens presented at clients include licensed organization logo, automatically at no extra
charge.
 Recent Alerts: Eight most recent alerts per client visible at a glance.
 Network-wide PID match authorization excellent to authorize large number of organization provided
devices.
 Local-client and/or network-wide specific device authorizations. (Granular protection).
 Client silent initial deployment easy with MSI Windows Installer (included for all size orders)
Copyright 2004 – 2018. Advanced Systems International SAC. All rights reserved.
 Scalable, Windows multiplatform.
 Allows for sub network management, also Ideal for controllingport securityon start ups, or field operation,
remote locations.
 Automatically receive and record devices insertion alerts in real-time.
 Capable of automatically email you all insertion alerts blocked and extraction records as they
happen.
 Allows its implementation without disrupting operations.
 Control application is able to run from regular PC during testing (flexible: does not require
running from a server).
 Effectively control large or small networks.
 Elevate to network authorizations MTP and USB (drag & drop)
 Real time show not logged Pcs
 Remove (out) old Pcs from list, allows you to recover those licenses (drag & drop).
 Second to none protecting processes (SCADA servers and critical systems).
SOFTWARE TYPE:
 Windows multiplatform two components server/client type application
HARDWARE REQUIREMENTS:
 Network (Fixed or dynamic IP configuration)
 (LAN, Workgroup, WAN) (Wired or wireless)
RESOURCES REQUIREMENTS:
 Minimum:Low demand=Not significantlyhigher thanthe originallyrecommended to run the installed
Operating System
MORE INFORMATION:
 Main product page:
https://www.usb-lock-rp.com
 Pricing:
https://www.usb-lock-rp.com/usb_lock_pricing.pdf

More Related Content

What's hot

Stuxnet
StuxnetStuxnet
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
William hendric
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
L. Duke Golden
 
Blancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheetBlancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheet
Christophe Elut
 
WinReporter Presentation
WinReporter PresentationWinReporter Presentation
WinReporter Presentation
IS Decisions
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
NCCOMMS
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
HassaanSahloul
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted Computing
Maksim Djackov
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
GENIANS, INC.
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
NCS Computech Ltd.
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
247infotech
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
GENIANS, INC.
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
CoreTrace Corporation
 
2FA OTP Hard Token
2FA OTP Hard Token2FA OTP Hard Token
2FA OTP Hard Token
2FA, Inc.
 
Generic_Brochure_gray
Generic_Brochure_grayGeneric_Brochure_gray
Generic_Brochure_gray
Dan Itkis
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
Positive Hack Days
 
Fortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USAFortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USA
nicholas njoroge
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
Iftikhar Ali Iqbal
 
The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architecture
G Prachi
 
TFSNET Brochure (2)
TFSNET Brochure (2)TFSNET Brochure (2)
TFSNET Brochure (2)zoe whittle
 

What's hot (20)

Stuxnet
StuxnetStuxnet
Stuxnet
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
Blancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheetBlancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheet
 
WinReporter Presentation
WinReporter PresentationWinReporter Presentation
WinReporter Presentation
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted Computing
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
2FA OTP Hard Token
2FA OTP Hard Token2FA OTP Hard Token
2FA OTP Hard Token
 
Generic_Brochure_gray
Generic_Brochure_grayGeneric_Brochure_gray
Generic_Brochure_gray
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
 
Fortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USAFortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USA
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 
The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architecture
 
TFSNET Brochure (2)
TFSNET Brochure (2)TFSNET Brochure (2)
TFSNET Brochure (2)
 

Similar to USB-Lock-RP Technical Datasheet version 11.9

REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
Network_security
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
Javier Arrospide
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
guest95226d
 
Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590
Nirav Ambani
 
Brochure - What is VTScada Software?
Brochure - What is VTScada Software?Brochure - What is VTScada Software?
Brochure - What is VTScada Software?
Trihedral
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop Virtualization
Jose Bittencourt
 
USA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOWUSA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOW
Cara Bereck Levy
 
Microprocessors and microcontrollers
Microprocessors and microcontrollersMicroprocessors and microcontrollers
Microprocessors and microcontrollers
Aditya Porwal
 
Smart Printing Technical Presentation
Smart Printing Technical PresentationSmart Printing Technical Presentation
Smart Printing Technical Presentation
JohnTileyITQ
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
Mohammad512578
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
Nine23Ltd
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
sharetech
 
Mudhrastec corporate brochur
Mudhrastec corporate brochur Mudhrastec corporate brochur
Mudhrastec corporate brochur
Mudhrastec FZE
 
Murari kumar
Murari kumarMurari kumar
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
Karteek Irukulla
 
unit5final
unit5finalunit5final
unit5final
Jonathan Paxtor
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktg
L. Duke Golden
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
NCS Computech Ltd.
 
ACTAtek unique features
ACTAtek unique featuresACTAtek unique features
ACTAtek unique features
Aurangzeb Mufti
 
Thin Client Smart Station Smart 2350
Thin Client Smart Station Smart 2350Thin Client Smart Station Smart 2350
Thin Client Smart Station Smart 2350
Nirav Ambani
 

Similar to USB-Lock-RP Technical Datasheet version 11.9 (20)

REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590
 
Brochure - What is VTScada Software?
Brochure - What is VTScada Software?Brochure - What is VTScada Software?
Brochure - What is VTScada Software?
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop Virtualization
 
USA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOWUSA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOW
 
Microprocessors and microcontrollers
Microprocessors and microcontrollersMicroprocessors and microcontrollers
Microprocessors and microcontrollers
 
Smart Printing Technical Presentation
Smart Printing Technical PresentationSmart Printing Technical Presentation
Smart Printing Technical Presentation
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
Mudhrastec corporate brochur
Mudhrastec corporate brochur Mudhrastec corporate brochur
Mudhrastec corporate brochur
 
Murari kumar
Murari kumarMurari kumar
Murari kumar
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
 
unit5final
unit5finalunit5final
unit5final
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktg
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
ACTAtek unique features
ACTAtek unique featuresACTAtek unique features
ACTAtek unique features
 
Thin Client Smart Station Smart 2350
Thin Client Smart Station Smart 2350Thin Client Smart Station Smart 2350
Thin Client Smart Station Smart 2350
 

Recently uploaded

A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
kalichargn70th171
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
kalichargn70th171
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
Tier1 app
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)
alowpalsadig
 
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
OnePlan Solutions
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and MoreManyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
narinav14
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
campbellclarkson
 
TMU毕业证书精仿办理
TMU毕业证书精仿办理TMU毕业证书精仿办理
TMU毕业证书精仿办理
aeeva
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 

Recently uploaded (20)

A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)
 
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and MoreManyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
 
TMU毕业证书精仿办理
TMU毕业证书精仿办理TMU毕业证书精仿办理
TMU毕业证书精仿办理
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 

USB-Lock-RP Technical Datasheet version 11.9

  • 1. Copyright 2004 – 2018. Advanced Systems International SAC. All rights reserved. USB LOCK RP ©: Developer & Licensor & Backbone Support USB-LOCK-RP™© (REMOTE PROTECTOR) NETWORK ENDPOINT SECURITY SOFTWARE SYSTEM REAL-TIME CENTRALIZED DEVICES ACCESS CONTROL FOR WINDOWS NETWORKS. STRAIGHTFORWARD DATA LOSS PREVENTION A 13-year-old evolution straightforward solution thatincludes functionality required and suggested by real world IT Infrastructure Architects, IT Managers and Network Systems SecurityAnalysts of top-notch organizations. You will find serious capacity to allow securing your network without affecting its productivity, and no useless functionality wasting your systems resources. One USB Lock RP Control can manage up to 1000 clients. For automatic real-time protection of industrial or corporate windows networks using operatingsystems from NT 5.1 to NT 10. info@usb-lock-rp.com www.usb-lock-rp.com Phone: +1 (972) 890 9488 // + 51 1 681 1761 // + 51 989 745874
  • 2. Copyright 2004 – 2018. Advanced Systems International SAC. All rights reserved. CAPABILITIES:  Real-time easy to set Authorizations(Block all removable storage devices except the authorized)  Network level authorization  Allows for 60 different groups of devices or specific devices to be authorize in all network clients  Groups of devices are allowed by hardware PID match and Specific devices by complete hardware ID match.  Easily deploy network authorization in real-time to all connected PCs  Client level authorizations:  Allows up to 10 USB removable mass storage (UMS) or USB MTP media transfer protocol devices to be authorized on any specific clientPC. (In additionto the authorizedat network level).  To register an authorization just insertthe device at the client or at the control and press authorize for the selected machine.  Authorizations registration or elimination take effect in real-time.  Allows for e-Sata specific authorization.  AES256 CBC MODE variable key, variable initiation vector protecting critical program records storage and transmission.  Automatically receive and log the insertion of allowed or blocked devices at any clients in real-time.  Generate per client detailed historic reports and global security status, and global alerts reports.  Audit from any client at any time: system information, installed software, windows updates- security patches, running processes on any client in real-time.  Auto Protect allows to protect all sector on a client after a select period of time.  Compact mode allows control to run under minimal interface.  Monitors and alerts of Software Installs or uninstalls on clients.  Keeps record of file transfers made from client PCs to Thumb drives:  Automatically monitors and registers:  The name and exact size of files transferred.  Device insertion date / time and the specific device hardware identifier (ID).  The name of the PC machine and user/users logged at insertion time.  Auto email alerts & authorized usb file extractions fully compatible with exchange mail servers and allows authentication.  Getall insertionincomingalertsalsosenttoanemailaddressatyourorganizationsdomain.  Get all details on files extracted on authorized devices also sentto an email address at your organizations domain  Keep data transferred to Thumb drives protected:  When encryption is set to ON, files transferred to Thumb drives are automatically Encrypted  Encrypted Data is accessible only within clients that have encryption capability set to ON.  Central Logging: Schedules the automatic output of status & alerts report at a fixed hour, daily or weekly. To a set share path.
  • 3. Copyright 2004 – 2018. Advanced Systems International SAC. All rights reserved. SUPPORTED OPERATING SYSTEMS: (from Windows NT 5.1 to Windows NT 10)  Windows Server 2016 - Windows 10 - Windows Server 2012 R2 - Windows 8.1 - Windows Server 2012 - Windows 8 - Windows 7 - Windows Server 2008 R2 - Windows Vista - Windows Server 2003 R2 - Windows Server 2003 - Windows XP - WindowsEmbedded POSReady2009 & 7 - WES Standard 2009 & 7 (withminimal components) & Windows Embedded Industry 8. (All above compatibility refers to both Control & Clients) (32 bit and 64 bit) PROTECTION SCOPE:  USB mass storage devices  USB MTP protocol (extensively used in Smartphone’s and new generation devices)  Portable flash memory devices  E-sata, Firewire.  Digital audio playersincluding MP3playersand iPod  External magnetic hard drives  External optical drives, including CD and DVD reader and writer drives, Blue ray  Adapters bridging between standard flashmemory cards and a USB connection  Digital cameras (Storage, mtp, Twain)  Card readers including CF, SD, SDMicro, MMC, XD  PDA, and handheld computers, mobile phones, smartphone, tablets  Internal optical drives, includingCD, DVD, Burners, Combos, Floppy drives  Wireless Transceivers  IrDA, USB Bluetooth FULLY FUNCTIONAL DEMO AVAILABLE:  Capacity 5 clients (Non expiring - like getting5 licenses for free) (For testingpurpose) https://www.usb-lock-rp.com/download.html ADVANTAGES:  Protects even if clients are disconnected from the network.  Does not restrict the normal use of non-storage capable peripherals, (printers, mouse, keyboards, vcams etc.).  Easy authorize specific devices.  Light on system resources.  Personalized Alertscreens presented at clients include licensed organization logo, automatically at no extra charge.  Recent Alerts: Eight most recent alerts per client visible at a glance.  Network-wide PID match authorization excellent to authorize large number of organization provided devices.  Local-client and/or network-wide specific device authorizations. (Granular protection).  Client silent initial deployment easy with MSI Windows Installer (included for all size orders)
  • 4. Copyright 2004 – 2018. Advanced Systems International SAC. All rights reserved.  Scalable, Windows multiplatform.  Allows for sub network management, also Ideal for controllingport securityon start ups, or field operation, remote locations.  Automatically receive and record devices insertion alerts in real-time.  Capable of automatically email you all insertion alerts blocked and extraction records as they happen.  Allows its implementation without disrupting operations.  Control application is able to run from regular PC during testing (flexible: does not require running from a server).  Effectively control large or small networks.  Elevate to network authorizations MTP and USB (drag & drop)  Real time show not logged Pcs  Remove (out) old Pcs from list, allows you to recover those licenses (drag & drop).  Second to none protecting processes (SCADA servers and critical systems). SOFTWARE TYPE:  Windows multiplatform two components server/client type application HARDWARE REQUIREMENTS:  Network (Fixed or dynamic IP configuration)  (LAN, Workgroup, WAN) (Wired or wireless) RESOURCES REQUIREMENTS:  Minimum:Low demand=Not significantlyhigher thanthe originallyrecommended to run the installed Operating System MORE INFORMATION:  Main product page: https://www.usb-lock-rp.com  Pricing: https://www.usb-lock-rp.com/usb_lock_pricing.pdf