Network USB Sentry Publisher's description
Prevent and track usage of portable storage media usage. Simplest possible end point protection for workstations in your network...
SteelSonic introduces an easiest way to control the growing menace of data theft and misuse in the IT segment through simple and effective approach to address the problems faced by every administrator in every company. A stern belief of "Prevention is better than cure" is the key word for effective data securty policies.
Network USB Sentry offers an simple yet effective control of portable media usage in the corporate network.It helps in preventing data theft and cyber crime possibilities through misuse of corporate data. Network USB Sentry effectively keeps a tight control of the portable media usage by preventing the users from copying confidential data from their workstations.
Network USB Sentry actively prevents users from using portable medias such as
* Pen drives, Flash drives, Usb sticks
* Mp3 players
* Portable hard drives
* Memory cards, Compact flash cards, Digital camera storages
* Any medium which can be used as an storage device
Network USB sentry effectively prevents users from introducing malicious programs, pirated softwares and other unwanted data like un-authorized audio and video files from getting in to the networked workstations either intentionally or accidently.
Network USB Sentry offers two modes of monitoring the portable media usage in the workstations.
1. Forcible prevention of usage
2. Stealth mode
In both modes the monitor agents keep the administrators aware of all the files being added or deleted in the portable media when they are under use. Simple and easy deployment options gets the workstations protected with out much fuss of learning curves.
If prevention is not the only requirement, instead knowing the filenames being copied is actually more important in the current recession affected IT industry, then Network USB Sentry is the simplest tool available to you!
Network USB Sentry helps in :
1. Preventing data theft and data infiltration through un-authorised media.
2. Preventing introduction of malicious and un-authorised softwares, media files in to the network.
3. Keeping the control of who uses the portable drives with the administrator.
4. Real time information about files being copied in and out of the portable medias in stealth mode.
5. Log the activity of portable medias like USB drives, Memory card usage
1. Easier agent deployments
2. Remote agent deployments
3. Real-Time alert notifications
4. File transfer informations
5. Simple logging and reporting
System Requirements:No special requirements.
Program Release Status:
Program Install Support: Install and Uninstall