A twelve year old evolution straightforward solution that includes functionality required and suggested by real IT Infrastructure Professionals, IT Managers and Network Systems Security Analysts of top-notch organizations. You will find serious capacity to allow securing your network without affecting its productivity, and no useless functionality wasting your systems resources. Designed for automatic real-time protection of industrial or corporate windows networks. Protection scope: USB mass storage devices; USB MTP protocol; Portable flash memory devices; E-sata, Firewire; Digital audio players including MP3 players and iPod; External magnetic hard drives; External optical drives, including CD and DVD reader and writer drives, Blue ray; Adapters bridging between standard flash memory cards and a USB connection; Digital cameras (Storage, mtp, Twain); Card readers including CF, SD, SDMicro, MMC, XD; PDA, and handheld computers, mobile phones, smartphone, tablets; Internal optical drives, including CD, DVD, Burners, Combos, Floppy drives; Wireless Transceivers; IrDA, USB Bluetooth.
Advantages: Protects even if clients are disconnected from the network. Does not restrict the normal use of non storage capable peripherals, (printers, mouse, keyboards, vcams etc) Easy authorize specific devices. Light on system resources.(no useless functionality hugging your systems) Personalized Alert screens presented at clients include licensed organization logo, automatically at no extra charge. Network-wide PID match authorization excellent to authorize large number of organization provided custom devices. Local-client and/or network-wide specific device authorizations.(Granular protection). Client silent initial deployment easy with MSI Windows Installer (included for all size orders). Scalable and updatable. Allows for sub network management, also Ideal for controlling port security on start ups, or field operation, remote locations. Automatically receive and record devices insertion alerts in real-time. Capable of automatically email you all insertion alerts blocked and extraction records as they happen. Allows its implementation without disrupting operations. Control application is able to run from regular PC during testing (flexible: does not require running from a server).
What is new in this release:
60 network-wide Authorizations.
Windows 10 compatible.
What is new in version 8.55:
1. Auto Protect this will allow to protect all sector on a client after a select period of time.
2. Recent Alerts: most recent alerts per client visible at a glance.
3. Authorizations visible at a glance.
4. MTP specific authorizations capability (local and network).
5. Elevate to network authorizations MTP and USB (drag & drop).
6. Real time show not logged Pcs.
7. Remove (out) old Pcs from list (drag & drop).
8. Compact mode allows control to run under minimal interface.
9. Software Install and uninstall alert/monitoring.
10. Full screen mode with the personalization logo.
11. Files usb storage monitoring list auto update.
12. Improved Status report.
13. Lower system resources consumption.
14. New Operating Manual.
What is new in version 7.20:
Version 7.20 adds Multi-monitor blocking:
This update ensures all monitors on a client are covered by alert screen.
Internal card reader issue:
This update solved issues presented by internal cardreader ussing generic driver.
Auto e-mail function:
Supports SMTP TLS or SSL transmission protocols.
New alert screens design.
Other Windows Software of Developer «Advanced Systems International»:
USB Lock Standard USB Lock Standard gives real-time protection of all user accounts, running light at operating system level, without affecting the normally used usb peripherals: keyboards, mouse, most printers, scanner, and v-cams. It is able to run on manual or auto mode.
Identity Lifecycle Manager 180-Day Evaluation Microsoft Identity Lifecycle Manager (ILM) 2007 brings together metadirectory, certificate management, and user provisioning into one solution that works across Windows and other enterprise systems. This version is the first release on CNET Download.com.Wh
NTFS Security Manager NTFS Permissions management on Windows File Servers is now made easy with Vyapin's NTFS Security Manager - a powerful NTFS permissions management tool to secure your Shares, Folders and Files on windows servers and workstations across your entire network.
Cyclope Internet Filtering Proxy Cyclope Internet Filtering Proxy monitors the entire Internet traffic and blocks the access to websites and files according to the chosen filter. The requested web pages are displayed only if they comply with the specified filters. The Internet Filter allo
GFI WebMonitor GFI WebMonitor monitors and controls Internet access, reports on users' website browsing habits and downloads, and provides web security features such as antivirus and malware protection in real time for SMBs by using multiple antivirus engines. Giving IT
Spyrix Employee Monitoring Spyrix Employee Monitoring - cloud-based platform for tracking your employee computer activities. Spyrix allows remote (via web account) control of employees activity in the Internet including chats, messengers , Skype, social networks Facebook, LinkedIn,
Mirracrypt Encryption for Outlook Mirracrypt Encryption for Outlook integrates seamlessly with Outlook 2003 & 2007 to provide powerful Sender-to-Receiver E-mail Encryption that is convenient and easy-to-use. Mirracrypt is the perfect add-on program for any Outlook user who requires confide
cPWD Security requirements demand dynamic password changes across hundreds of systems. Use cPWD to maintain multiple, local account passwords on all NT and Windows 2000 systems participating in the domain. Flexible filters allow you to target specific systems a
Lencom Content Guard Simplifies discovery of content theft, plagiarism, and content duplication. Any of your original content, on your desktop computer or on your Web site, LCG protects content carefully analyzing uniqueness of the text, searching and comparing it using differ
Trusteer Mobile App (Secure Browser) Trusteer Mobile App provides end users with a secure mobile browser that ensures safe web access. Fake websites and Man-in-the-Middle attacks are detected by the secure mobile browser, and end users are prevented from accessing the fraudulent site. Device
Google Hack Database The Google Hack Database is a completely free tool from one of the leading publishers of IT security software: SecPoint. The tool will help you to find out if any sensitive information has been leaked from your web servers into Google. The program is easy
Supported Operating Systems:
Windows 10 |
Windows 2000 |
Windows 2003 |
Windows 7 |
Windows 8 |
Windows Vista |
Windows XP |
Comments on USB Lock RP:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10