SlideShare a Scribd company logo
1 of 3
Download to read offline
Copyright © 2004 – 2015 Advanced Systems International SAC. All rights reserved
Advanced Systems International SAC
USB LOCK RP©: Developer&Licensor&Backbone Support
info@usb-lock-rp.com
www.usb-lock-rp.com
Phone +1 (972)890 9488// +51 1 723 0535 // +51 989745874
USB LOCK RP (REMOTE PROTECTOR)
NETWORK ENDPOINTSECURITY SOFTWARE SYSTEM
REMOVABLESTORAGECENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP.
SECOND TO NONEDATA ASSETS AND SYSTEMS PROTECTOR
A ten year old evolution straightforward solution that includes functionality required and suggested by real IT
Infrastructure Professionals, IT Managers and Network Systems Security Analysts of top-notch organizations. You will
find serious capacity to allow securing your network without affecting its productivity, and no useless functionality
wasting your systems resources.
Designed for automatic real-time protection of industrial or corporate windows networks.
Copyright © 2004 – 2015 Advanced Systems International SAC. All rights reserved
CAPABILITIES:
Provides automatic real-time centralized remote management of network endpoints:
Real-time easy to set Authorizations (Block all removable storage devices except the authorized)
-Network level authorization
Allows for 30 different groups of devices or specific devices to be authorize in all network client PCs
Groups of devices are allowed by hardware PID match and Specific devices by complete hardware ID match.
Easily deploy network authorization in real-time to all connected PCs.
-Client level authorizations:
Allows up to 10 USB removable storage or USB MTP media transfer protocol devices to be authorized on any client PC.
In addition to the authorized at network level.
Allows for e-Sata specific authorization.
Authorizations take effect in real-time. (No protection settings change required reboot)
Specific USB Storage Drives can be authorized when inserted at client or at the control and the device User Name,
Hardware Id, and machine name is automatically logged for easy effective identification.
Automatically receive insertion alerts and log the insertion of allowed or blocked devices at any clients in real -time.
Generate per client detailed historic reports and global security status, and global alerts reports.
Audit from any client at anytime: system information, installed software, windows updates- security patches, running
processes, and query ALL authorized devices on any client in real-time.
Auto Protect this will allow to protect all sector on a client after a select period of time.
MTP specific authorizations capability (local and network).
Compact mode allows control to run under minimal interface.
Software Install and uninstall alert/monitoring.
Central control full screen mode showing your organization logo at top right corner. (required / included at no extra cost)
Keeps your organization informed of file transfers made from client PCs to authorized or allowed USB mass storage devices:
-Automatically monitors and registers:
The name and exact size of files transferred.
Device insertion date / time and the specific device hardware identifier (ID).
The name of the PC machine and user/users logged at insertion time.
-Auto email alerts & authorized usb file extractions fully compatible with exchange mail servers and allows
authentication.
Get all insertion incomingalerts also sent to an email address at your organizations domain.
Get all details on files extracted on authorized devices also sent to an email address at your organizations domain.
Protects the information inside authorized portable devices while used to transport or store information:
-Remote portable protection assignment and distribution for the 2 main usb storage authorizations at any/all clients:
Centralized password storage: Allowing to internally troubleshooting any “lost password issues”
Automatically logs the relation: Device User-Device Id-Device Home-Device Portable Protector Password
-Smart auto-encryption:
When force encryption is set to ON, files transferred to the two main authorized devices are automatically encrypted
and the user at client PC is noted of the encryption progress by a small unobtrusive message and distinctive pitch
beep.
Forcingauto-encryption is recommended to ensure the portable protector is used.
-Portable protectors:
Run inside the usb drive offering password protected drag & drop file encryption/decryption.
SUPPORTED OPERATING SYSTEM:
Windows XP - Windows Server 2003 - Windows Vista - Windows Server 2008 RC2-Windows 7- Windows 8 - Windows Server
2012 - Windows 8.1 - Windows Server 2012 R2 - Windows Embedded POSReady 2009 & 7- WES Standard 2009 & 7 (with
minimal components)-Windows Embedded Industry 8. Applies to control & clients (32 & 64 bit)
PROTECTION SCOPE:
 USB mass storage devices
 USB MTP protocol
 Portable flash memory devices
 E-sata, Firewire,
 Digital audio players including MP3 players and iPod
 External magnetic hard drives
Copyright © 2004 – 2015 Advanced Systems International SAC. All rights reserved
 External optical drives,including CD and DVD reader and writer drives, Blue ray
 Adapters bridging between standard flash memory cards and a USB connection
 Digital cameras (Storage, mtp, Twain)
 Card readers including CF, SD, SDMicro, MMC, XD
 PDA, and handheld computers, mobile phones, smartphone, tablets
 Internal optical drives,including CD, DVD, Burners, Combos, Floppy drives
 Wireless Transceivers
 IrDA, USB Bluetooth
FULLY FUNCTIONAL DEMO AVAILABLE:
Duration 15 day - Capacity 5 clients
http://www.usb-lock-rp.com/download.html
ADVANTAGES:
Protects even if clients are disconnected from the network.
Does not restrict the normal use of non storage capable peripherals, (printers, mouse, keyboards, vcams etc)
Easy authorize specific devices.
Light on system resources. (No useless functionality hugging your systems)
Personalized Alert screens presented at clients includelicensed organization logo, automatically at no extra charge.
Recent Alerts: eight most recent alerts per client visible at a glance.
Network-wide VID-PID match authorization excellent to authorize large number of organization provided custom devices.
Local-client and/or network-wide specific device authorizations. (Granular protection).
Client silent initial deployment easy with MSI Windows Installer (included for all size orders)
Scalable and updatable, Windows multiplatform.
Allows for sub network management, also Ideal for controlling portsecurity on start ups, or field operation, remote locations.
Automatically receive and record devices insertion alerts in real-time.
Capable of automatically email you all insertion alerts blocked and extraction records as they happen.
Allows its implementation without disrupting operations.
Control application is able to run from regular PC during testing (flexible: does not require running from a server).
Effectively control large or small networks.
Elevate to network authorizations MTP and USB (drag & drop)
Real time show not logged Pcs
Remove (out) old Pcs from list, allows you to recover those licenses (drag & drop).
SOFTWARE TYPE:
Windows multiplatform two components server/client type application
HARDWARE REQUIREMENTS:
Network (Fixed or dynamic IP configuration)
(Workgroup, LAN – WAN) (Wired or wireless)
RESOURCES REQUIREMENTS:
Minimum: Low demand=Not significantly higher than the originally recommended to run the installed Operating System
MORE INFORMATION:
Main product page:
http://www.usb-lock-rp.com/usb-lock-remote-protect.html
Pricing:
http://www.usb-lock-rp.com/usb_lock_pricing.pdf

More Related Content

What's hot

CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoNCCOMMS
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesGENIANS, INC.
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted ComputingMaksim Djackov
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet GENIANS, INC.
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsSam Bowne
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomPositive Hack Days
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Operating System Support for Run-Time Security with a Trusted Execution Envir...
Operating System Support for Run-Time Security with a Trusted Execution Envir...Operating System Support for Run-Time Security with a Trusted Execution Envir...
Operating System Support for Run-Time Security with a Trusted Execution Envir...Javier González
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview GENIANS, INC.
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by KasperskyL. Duke Golden
 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityChris Sistrunk
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSChris Sistrunk
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecGENIANS, INC.
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overviewNine23Ltd
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101Wavestone
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateAlex Kwan
 

What's hot (20)

CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted Computing
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Operating System Support for Run-Time Security with a Trusted Execution Envir...
Operating System Support for Run-Time Security with a Trusted Execution Envir...Operating System Support for Run-Time Security with a Trusted Execution Envir...
Operating System Support for Run-Time Security with a Trusted Execution Envir...
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
Security in Embedded systems
Security in Embedded systems Security in Embedded systems
Security in Embedded systems
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS Security
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone Update
 

Viewers also liked

Viewers also liked (13)

Better burger
Better burgerBetter burger
Better burger
 
VilanovaDIBA14 Konstantin Grcic Cristina Grabulosa
VilanovaDIBA14 Konstantin Grcic Cristina GrabulosaVilanovaDIBA14 Konstantin Grcic Cristina Grabulosa
VilanovaDIBA14 Konstantin Grcic Cristina Grabulosa
 
Audit
AuditAudit
Audit
 
Unit G321 Mind Map Joe Dolan
Unit G321 Mind Map Joe DolanUnit G321 Mind Map Joe Dolan
Unit G321 Mind Map Joe Dolan
 
Joe Dolan Mind Map
Joe Dolan Mind MapJoe Dolan Mind Map
Joe Dolan Mind Map
 
Better burger
Better burger Better burger
Better burger
 
Sr Paper Presentation - SP14
Sr Paper Presentation - SP14Sr Paper Presentation - SP14
Sr Paper Presentation - SP14
 
Preliminary task and planning & research Joe Dolan
Preliminary task and planning & research Joe DolanPreliminary task and planning & research Joe Dolan
Preliminary task and planning & research Joe Dolan
 
As bodas do cordeiro
As bodas do cordeiroAs bodas do cordeiro
As bodas do cordeiro
 
Living Lab della Galleria d'Arte Moderna (GAM)
Living Lab della Galleria d'Arte Moderna (GAM)Living Lab della Galleria d'Arte Moderna (GAM)
Living Lab della Galleria d'Arte Moderna (GAM)
 
Main Task Hand drawn drafts
Main Task Hand drawn draftsMain Task Hand drawn drafts
Main Task Hand drawn drafts
 
Hand drawn drafts finished
Hand drawn drafts finishedHand drawn drafts finished
Hand drawn drafts finished
 
Lição 10
Lição 10Lição 10
Lição 10
 

Similar to usb-lock-rp-en

REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Securityguest95226d
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device ControlHassaanSahloul
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationJose Bittencourt
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Microprocessors and microcontrollers
Microprocessors and microcontrollersMicroprocessors and microcontrollers
Microprocessors and microcontrollersAditya Porwal
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer Englishcynapspro GmbH
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Communication Devices Inc
 
[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protectionHieu Le Dinh
 
Thin Client Smart Station Smart 2350
Thin Client Smart Station Smart 2350Thin Client Smart Station Smart 2350
Thin Client Smart Station Smart 2350Nirav Ambani
 

Similar to usb-lock-rp-en (20)

REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop Virtualization
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
unit5final
unit5finalunit5final
unit5final
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Microprocessors and microcontrollers
Microprocessors and microcontrollersMicroprocessors and microcontrollers
Microprocessors and microcontrollers
 
NodeGrid Bold
NodeGrid BoldNodeGrid Bold
NodeGrid Bold
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
 
ACTAtek 3 Introduction
ACTAtek 3 IntroductionACTAtek 3 Introduction
ACTAtek 3 Introduction
 
[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection[Codientu.org] design of a microcontroller based circuit for software protection
[Codientu.org] design of a microcontroller based circuit for software protection
 
Thin Client Smart Station Smart 2350
Thin Client Smart Station Smart 2350Thin Client Smart Station Smart 2350
Thin Client Smart Station Smart 2350
 

usb-lock-rp-en

  • 1. Copyright © 2004 – 2015 Advanced Systems International SAC. All rights reserved Advanced Systems International SAC USB LOCK RP©: Developer&Licensor&Backbone Support info@usb-lock-rp.com www.usb-lock-rp.com Phone +1 (972)890 9488// +51 1 723 0535 // +51 989745874 USB LOCK RP (REMOTE PROTECTOR) NETWORK ENDPOINTSECURITY SOFTWARE SYSTEM REMOVABLESTORAGECENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP. SECOND TO NONEDATA ASSETS AND SYSTEMS PROTECTOR A ten year old evolution straightforward solution that includes functionality required and suggested by real IT Infrastructure Professionals, IT Managers and Network Systems Security Analysts of top-notch organizations. You will find serious capacity to allow securing your network without affecting its productivity, and no useless functionality wasting your systems resources. Designed for automatic real-time protection of industrial or corporate windows networks.
  • 2. Copyright © 2004 – 2015 Advanced Systems International SAC. All rights reserved CAPABILITIES: Provides automatic real-time centralized remote management of network endpoints: Real-time easy to set Authorizations (Block all removable storage devices except the authorized) -Network level authorization Allows for 30 different groups of devices or specific devices to be authorize in all network client PCs Groups of devices are allowed by hardware PID match and Specific devices by complete hardware ID match. Easily deploy network authorization in real-time to all connected PCs. -Client level authorizations: Allows up to 10 USB removable storage or USB MTP media transfer protocol devices to be authorized on any client PC. In addition to the authorized at network level. Allows for e-Sata specific authorization. Authorizations take effect in real-time. (No protection settings change required reboot) Specific USB Storage Drives can be authorized when inserted at client or at the control and the device User Name, Hardware Id, and machine name is automatically logged for easy effective identification. Automatically receive insertion alerts and log the insertion of allowed or blocked devices at any clients in real -time. Generate per client detailed historic reports and global security status, and global alerts reports. Audit from any client at anytime: system information, installed software, windows updates- security patches, running processes, and query ALL authorized devices on any client in real-time. Auto Protect this will allow to protect all sector on a client after a select period of time. MTP specific authorizations capability (local and network). Compact mode allows control to run under minimal interface. Software Install and uninstall alert/monitoring. Central control full screen mode showing your organization logo at top right corner. (required / included at no extra cost) Keeps your organization informed of file transfers made from client PCs to authorized or allowed USB mass storage devices: -Automatically monitors and registers: The name and exact size of files transferred. Device insertion date / time and the specific device hardware identifier (ID). The name of the PC machine and user/users logged at insertion time. -Auto email alerts & authorized usb file extractions fully compatible with exchange mail servers and allows authentication. Get all insertion incomingalerts also sent to an email address at your organizations domain. Get all details on files extracted on authorized devices also sent to an email address at your organizations domain. Protects the information inside authorized portable devices while used to transport or store information: -Remote portable protection assignment and distribution for the 2 main usb storage authorizations at any/all clients: Centralized password storage: Allowing to internally troubleshooting any “lost password issues” Automatically logs the relation: Device User-Device Id-Device Home-Device Portable Protector Password -Smart auto-encryption: When force encryption is set to ON, files transferred to the two main authorized devices are automatically encrypted and the user at client PC is noted of the encryption progress by a small unobtrusive message and distinctive pitch beep. Forcingauto-encryption is recommended to ensure the portable protector is used. -Portable protectors: Run inside the usb drive offering password protected drag & drop file encryption/decryption. SUPPORTED OPERATING SYSTEM: Windows XP - Windows Server 2003 - Windows Vista - Windows Server 2008 RC2-Windows 7- Windows 8 - Windows Server 2012 - Windows 8.1 - Windows Server 2012 R2 - Windows Embedded POSReady 2009 & 7- WES Standard 2009 & 7 (with minimal components)-Windows Embedded Industry 8. Applies to control & clients (32 & 64 bit) PROTECTION SCOPE:  USB mass storage devices  USB MTP protocol  Portable flash memory devices  E-sata, Firewire,  Digital audio players including MP3 players and iPod  External magnetic hard drives
  • 3. Copyright © 2004 – 2015 Advanced Systems International SAC. All rights reserved  External optical drives,including CD and DVD reader and writer drives, Blue ray  Adapters bridging between standard flash memory cards and a USB connection  Digital cameras (Storage, mtp, Twain)  Card readers including CF, SD, SDMicro, MMC, XD  PDA, and handheld computers, mobile phones, smartphone, tablets  Internal optical drives,including CD, DVD, Burners, Combos, Floppy drives  Wireless Transceivers  IrDA, USB Bluetooth FULLY FUNCTIONAL DEMO AVAILABLE: Duration 15 day - Capacity 5 clients http://www.usb-lock-rp.com/download.html ADVANTAGES: Protects even if clients are disconnected from the network. Does not restrict the normal use of non storage capable peripherals, (printers, mouse, keyboards, vcams etc) Easy authorize specific devices. Light on system resources. (No useless functionality hugging your systems) Personalized Alert screens presented at clients includelicensed organization logo, automatically at no extra charge. Recent Alerts: eight most recent alerts per client visible at a glance. Network-wide VID-PID match authorization excellent to authorize large number of organization provided custom devices. Local-client and/or network-wide specific device authorizations. (Granular protection). Client silent initial deployment easy with MSI Windows Installer (included for all size orders) Scalable and updatable, Windows multiplatform. Allows for sub network management, also Ideal for controlling portsecurity on start ups, or field operation, remote locations. Automatically receive and record devices insertion alerts in real-time. Capable of automatically email you all insertion alerts blocked and extraction records as they happen. Allows its implementation without disrupting operations. Control application is able to run from regular PC during testing (flexible: does not require running from a server). Effectively control large or small networks. Elevate to network authorizations MTP and USB (drag & drop) Real time show not logged Pcs Remove (out) old Pcs from list, allows you to recover those licenses (drag & drop). SOFTWARE TYPE: Windows multiplatform two components server/client type application HARDWARE REQUIREMENTS: Network (Fixed or dynamic IP configuration) (Workgroup, LAN – WAN) (Wired or wireless) RESOURCES REQUIREMENTS: Minimum: Low demand=Not significantly higher than the originally recommended to run the installed Operating System MORE INFORMATION: Main product page: http://www.usb-lock-rp.com/usb-lock-remote-protect.html Pricing: http://www.usb-lock-rp.com/usb_lock_pricing.pdf