USB Security Analyzer Detects and Responds to Potential Threats

Real-time alerts when USB devices are connected can help protect sensitive data

詳細
表示を減らす

USB detection of unauthorized usage

USB detection of unauthorized usage

USB devices are easily available, which increases the risk of data loss and breaches due to insecure transfer of sensitive data. Security Event Manager comes with USB Defender, which is built on endpoint USB security technology used to protect your sensitive data against potential threats. USB Defender monitors the usage of USB devices, including mass storage media devices on phones, cameras, and wireless networking devices. Use the built-in filters, or build custom filters to focus on USB events that are important to you.

Read more

Automatically respond to USB security threats

Automatically respond to USB security threats

With Security Event Manager, you can use out-of-the-box active response rules to disable USB devices when USB access is detected for blacklisted user accounts. You can set the active response rule to check if the device belongs to the whitelisted, user-defined group of authorized USB devices. If an unauthorized USB is detected, execute active response as a preventive measure, which includes automatically detaching USB devices, killing process by ID or name, blocking IP addresses, or shutting down machines.

Read more

Auditing and reporting USB usage

Auditing and reporting USB usage

Monitoring a network for USB threats is a requirement for compliance regulations, including PCI DSS. Effective USB management can help prevent users from copying unauthorized files to external devices, and identify unauthorized applications launched from USB devices. With Log & Event Manger's USB analyzer, you can monitor the log activity of all USB devices and audit their file activities to track suspicious user activity, like unwarranted data transfer from an authorized USB port. You can also generate built-in reports to help demonstrate compliance.

Read more

USB security, detection, prevention, and more

Security Event Manager

  • 業界特有のIT規制フレームワーク全体で監査できるコンプライアンスを達成することは容易ではありません。

  • 企業の規模に関わらず、セキュリティ上の脅威を検出してからそれに対応するまでに時間がかかると、大きなコストが発生してしまいます。

  • セキュリティ イニシアチブの有効性は、セキュリティの脅威に迅速に対応する能力に大きく依存します。

最低価格: $4,665
詳細を表示
お問い合わせ先
24時間365日、 いつでもお問い合わせください。
+1-866-530-8100
Unauthorized USB usage leads to security breaches and increases the risk of data loss
{{STATIC CONTENT}}
{{CAPTION_TITLE}}

{{CAPTION_CONTENT}}

{{TITLE}}