Prevent sensitive data leakage from unauthorized USB device use
USB devices are easily available, which increases the risk of data loss and breaches due to insecure transfer of sensitive data. The loss of data (be it intentional or accidental) leads to serious damage not only to the intellectual property but also to an organization’s reputation and brand. Therefore monitoring removable devices with USB security software is essential to safeguard and prevent the leakage of vital data.
Log & Event Manager, with its USB Defender technology, monitors the usage of USB devices, including mass storage media devices on phones, cameras, and wireless networking devices. You can prevent users from copying unauthorized files to external devices and identify unauthorized applications launched from USB devices. Log & Event Manager includes an extensive library of active responses to trigger actions and send notifications when security threats or compliance violations are detected. Preventive measures include automatically detaching USB devices, killing process by ID or name, blocking IP addresses, or shutting down machines.
Monitor what files or processes are accessed on the drive
From the outlook of IT security, compliance, and operations, a network has to be monitored against USB threats. With Log & Event Manager, you can monitor the log activity of all USB devices, and correlate user events to:
Respond automatically to security threats and compliance violations
With Log & Event Manager you can build an Active Response rule to disable USB devices when USB access is detected for user accounts that are blacklisted. You can also have whitelisted user-accounts to identify who is authorized to have USB access. When USB devices connect to your network, USB Defender enabled workstations process the Active Response rule to:
Call us at 866.530.8100
Email us at Sales@SolarWinds.com