Network USB Sentry Icon

Network USB Sentry

Control and prevent usage of USB drives, Memory cards and any portable storages.

Network USB SentryOverview

Network USB Sentry offers an simple yet effective control of portable media usage in the corporate network.It helps in preventing data theft and cyber crime possibilities through misuse of corporate data. Network USB Sentry effectively keeps a tight control of the portable media usage by preventing the users from copying confidential data from their workstations.

Network USB Sentry actively prevents users from using portable medias such as

* Pen drives, Flash drives, Usb sticks
* Mp3 players
* IPods
* Portable hard drives
* Memory cards, Compact Flash Cards, Digital camera storages
* Any medium which can be used as an storage device

Network USB sentry effectively prevents users from introducing malicious programs, pirated softwares and other unwanted data like un-authorized audio and video files from getting in to the networked workstations either intentionally or accidently.

Network USB Sentry offers two modes of monitoring the portable media usage in the workstations.

1. Forcible prevention of usage
2. Stealth mode

In both modes the monitor agents keep the administrators aware of all the files being added or deleted in the portable media when they are under use. Simple and easy deployment options gets the workstations protected easily.

Network USB Sentry helps in :
1. Preventing data theft and data Infiltration through un-authorised media.
2. Preventing introduction of malicious and un-authorised softwares, media files in to the network.
3. Keeping the control of who uses the portable drives with the administrator.
4. Real time information about files being copied in and out of the portable medias in stealth mode.
5. Log the activity of portable medias like USB drives, Memory card usage

NEW

Fixed some bugs.

Network USB SentryInformation

Version
1.0
Date
07.15.09
License
Trial
Language
English
File Size
2.77MB
Developer
Category
Operating Systems
Windows Vista, 2003, XP, 2000
System Requirements
No additional system requirements.
Phone Spy Pro Icon
Phone Spy Pro - For iPhone, iPad, Android, Windows Mobile, Symbian OS Phones
Trial
Mandiant Red Curtain Icon
Red Curtain is free software for Incident Responders
Free
Microsoft Forefront Security for SharePo Icon
Security for SharePoint helps businesses protect their Portal Server.
Free
N-Stalker Web Application Security Scanner 2009 Icon
Scan and protect your Web applications from various attacks.
Free
USB Log & Lock Icon
Monitor, control, and log usage data of your USB devices.
Demo
Deep Freeze Enterprise Icon
Deep Freeze Enterprise protects and preserves baseline computer configuration.
Trial
Mandiant Web Historian Icon
MANDIANT Web Historian are stored in the history files
Free
Nsauditor Network Security Auditor Icon
Audit your network security for possible vulnerabilities.
Demo
More