Small Appliances – Great Danger
Data security and virus protection with the USB blocker giving you data theft and viruses don’t stand a chance! Inserting a USB Blocker is very important at the present time in companies as a threat out of the Pocket can be quickly from the small, stylish mass storage devices. Be it conscious as well as unconscious transmit viruses or stealing data from E.g. the customer database. All this can be avoided by a certain degree of protection. Decide yourself how often you have already used a USB stick on a company computer, listen to some music? How many times could not use this for security reasons? Companies have numerous directives and regulations that support safe work on the PC.
Administrators perform the driver installation, and perform regular updates. But who thinks on the transmission of viruses or data theft by external devices? Companies often very carelessly deal with the topic of data security, because hardly anyone sees the dangers associated with a data transfer. A simple connecting of an external device can put a whole operating in a mess. In this manner unauthorized access to data run possible, data theft and facilitates the import of harmful software. You can counteract these problems by a USB Blocker is installed and therefore the individual PC workstations and also the identity of the company are protected. A user-specific control and management of the USB mass storage device data theft & co. is hardly a chance.
Because you want to connect a mass storage device on some PCs despite everything, so a software must be flexible to set up. Data theft is a current threat, you can counteract easily, efficiently and affordably. With the bi-cube USB blocker software manufacturer’s iSM Institute for system management (iSM) from Rostock, is a security solution for the access control of employees on storage media. The lean but effective software allows the targeted locks or the targeted share of hardware components such as USB sticks, external drives, printers, scanners, or cameras. Through an intuitive user interface, the administrator can define the blocking or specific shares for all device classes or only for a single device. Since it is based directly on the Device Manager, the hardware is detected and managed on the USB port. As soon as the user tries to connect an unauthorized device to their PC, the device is ejected again. Locking is possible not only for USB ports. Other interfaces (FireWire) and PCM/CIA ports, such as UMTS or LAN cards can be blocked.
Tags: hardware & software it