SlideShare una empresa de Scribd logo
1 de 2
Copyright © 2004 – 2013 Advanced Systems International SAC. All rights reserved
Advanced Systems International SAC
USB LOCK RP©: Developer&Licensor&Backbone Support
info@advansysperu.com
www.advansysperu.com
Phone 1(214) 628 06 17 // + 51 1 723 0535 // + 51 989 745874
USB LOCK RP NETWORK ENDPOINT SECURITY SOFTWARE SYSTEM
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP.
SECOND TO NONE DATA ASSETS PROTECTOR
An eight year evolution straightforward solution that includes functionality required and suggested by real systems
administrators and security officers of top-notch organizations. You will find serious capacity to allow securing your
network without affecting its productivity, and no useless functionality wasting your systems resources.
Designed for automatic real-time protection of windows networks, it’s presented to you in three versions to exactly
fit your requirements and organizations budget: USB LOCK RP - USB LOCK RP PLUS - USB LOCK RP-E
USB LOCK RP
Provides automatic real-time centralized remote management of network endpoints:
Real-time easy to set Authorizations (Block all removable storage devices except the authorized)
-Network level authorization
Allows for 30 different groups of devices or specific devices to be authorize in all network client PCs
Groups of devices are allowed by hardware VID or PID match and Specific devices by hardware device ID match.
Easily deploy in real-time to all connected PCs and set auto deployment to PCs that are not connected.
-Client level authorizations:
Allows up to 10 usb storage devices to be authorized on any client PC. In addition to the authorized at network level.
Authorizations can be made remotely and in real-time.
Devices can be authorized when inserted at client or at the control and the device User Name, Hardware Id, and
machine name is automatically logged for easy effective identification.
. Automatically receive insertion alerts and log the insertion of allowed or blocked devices at any clients in real-time.
Generate at any time per client detailed historic reports and/or global security status, and/or global alerts reports.
Audit from any client at anytime: system information, installed software, windows updates- security patches, running
processes, and query ALL authorized devices on any client in real-time.
USB LOCK RP Plus
Provides automatic real-time centralized remote management of network endpoints +
Keeps your organization informed of file transfers made from client PCs to authorized or allowed devices:
Automatically monitors and registers:
The name and exact size of files transferred.
Device insertion date/time and the specific device hardware identifier (ID).
The name of the PC machine and user/users logged at insertion time.
Auto email alerts & authorized usb file extractions fully compatible with exchange mail servers and allows authentication.
Get all insertion incoming alerts also sent to an email address at your organizations domain.
Get all details on files extracted on authorized devices also sent to an email address at your organizations domain.
USB LOCK RP E
Provides automatic real-time centralized remote management of network endpoints +
Keeps your organization informed of file transfers made from client PCs to authorized or allowed devices. +
Protects the information inside authorized portable devices while used to transport or store information:
Remote portable protection assignment and distribution for the 2 main usb storage authorizations at any/all clients.
Centralized password storage: Allowing to internally troubleshooting any “lost password issues”
Automatically logs the relation: Device User-Device Id-Device Home-Device Portable Protector Password
Smart auto-encryption: When force encryption is set to ON, files transferred to the two main authorized devices are
automatically encrypted and the user at client PC is noted of the encryption progress by a small unobtrusive message and
distinctive pitch beep.
Forcing auto-encryption is recommended to ensure the portable protector is used.
Copyright © 2004 – 2013 Advanced Systems International SAC. All rights reserved
USB lock RP-E Portable protectors run inside the usb drive offering password protected drag & drop file encryption/decryption.
SUPPORTED OPERATING SYSTEM:
Windows 2000-Windows XP-Windows Server 2003 -Windows Vista-Windows Server 2008-Windows 7- Windows 8 (32-64 bit)
(Applies to all version control and clients)
PROTECTION SCOPE:
Portable flash memory devices
E-sata, Firewire, USB drives
Digital audio players including MP3 players and iPod
External magnetic hard drives
External optical drives, including CD and DVD reader and writer drives
Adapters bridging between standard flash memory cards and a USB connection
Digital cameras (Storage, mtp media transfer protocol, Twain)
Card readers including CF, SD, SDMicro, MMC, XD
PDA, and handheld computers, mobile phones
Internal optical drives, including CD, DVD, Burners, Combos, Floppy drives
Wireless Transceivers
IrDA, USB Bluetooth
FULLY FUNCTIONAL DEMO AVAILABLE:
Duration 15 day - Capacity 5 clients
ADVANTAGES:
Protects even if clients are disconnected from the network.
Does not restrict the normal use of non storage capable peripherals, (printers, mouse, keyboards, vcams etc)
Easy authorize specific devices.
Light on system resources.(no useless functionality hugging your systems)
Personalized Alert screens presented at clients include licensed organization logo, automatically at no extra charge.
Network-wide VID match authorizations, very useful for large number of vector based build in devices.
Network-wide VID-PID match authorization excellent to authorize large number of organization provided custom devices.
Local-client and/or network-wide specific device authorizations.(Granular protection).
Client silent initial deployment easy with MSI Windows Installer (for orders of RP60 or more)
Scalable and updatable, Windows multiplatform.
Allows for sub network management, also Ideal for controlling port security on start ups, or field operation.
Automatically receive and record devices insertion alerts in real-time.
Capable of automatically email you all insertion alerts blocked and extraction records as they happen.
Allows its implementation without disrupting operations.
Control application is able to run from regular PC during testing (flexible: does not require running from a server).
Effectively control large or small networks.
Corporations see also Master Control, capable of offering higher hierarchy management.
http://www.advansysperu.com/usb_lock_rp_master-control_en.pdf
SOFTWARE TYPE:
Windows multiplatform two components server/client type application
HARDWARE REQUIREMENTS:
Network (Fixed or dynamic IP configuration)
(Workgroup, LAN – WAN) (Wired or wireless)
RESOURCES REQUIREMENTS:
Minimum: Low demand=Not significantly higher than the originally recommended to run the installed Operating System
MORE INFORMATION:
Main product page:
http://www.advansysperu.com/usb-lock-remote-protect.html
Authorized distributors list:
http://www.advansysperu.com/usb_lock_distributors.pdf
Pricing:
http://www.advansysperu.com/usb_lock_pricing.pdf

Más contenido relacionado

La actualidad más candente

Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!
Teddy Reed
 
Final project
Final projectFinal project
Final project
rippea
 
Steve brueckner-atc-ny
Steve brueckner-atc-nySteve brueckner-atc-ny
Steve brueckner-atc-ny
jcaire
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
NCS Computech Ltd.
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
Imran Khan
 

La actualidad más candente (20)

Sierra Access and Door Control with InduSoft
Sierra Access and Door Control with InduSoftSierra Access and Door Control with InduSoft
Sierra Access and Door Control with InduSoft
 
Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
Final project
Final projectFinal project
Final project
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
 
It security
It securityIt security
It security
 
UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)
 
Blancco Drive Eraser
Blancco Drive EraserBlancco Drive Eraser
Blancco Drive Eraser
 
Steve brueckner-atc-ny
Steve brueckner-atc-nySteve brueckner-atc-ny
Steve brueckner-atc-ny
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
System 6000
System 6000System 6000
System 6000
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Security in Embedded systems
Security in Embedded systems Security in Embedded systems
Security in Embedded systems
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104
 

Destacado

Presentación efectiva rmr
Presentación efectiva rmrPresentación efectiva rmr
Presentación efectiva rmr
Ricardo Mendez
 
Desarrollo del Internet 1997-2014
Desarrollo del Internet 1997-2014Desarrollo del Internet 1997-2014
Desarrollo del Internet 1997-2014
Luisa Gomez
 
Guía didáctica yuyo cuida lo tuyo
Guía didáctica yuyo cuida lo tuyoGuía didáctica yuyo cuida lo tuyo
Guía didáctica yuyo cuida lo tuyo
rositamejiag
 
第二章-共同基金的投資困境/ 單筆投資(上)
第二章-共同基金的投資困境/ 單筆投資(上)第二章-共同基金的投資困境/ 單筆投資(上)
第二章-共同基金的投資困境/ 單筆投資(上)
chihchih204
 
Tenologias de la innovacion en la educacion presentacion final
Tenologias de la innovacion en la educacion presentacion finalTenologias de la innovacion en la educacion presentacion final
Tenologias de la innovacion en la educacion presentacion final
omar lugo
 
Cartaz ativ. pre escolar dezembro 2011-12
Cartaz ativ. pre  escolar dezembro 2011-12Cartaz ativ. pre  escolar dezembro 2011-12
Cartaz ativ. pre escolar dezembro 2011-12
bibdjosei2006
 
Ciclo stirling maz 244
Ciclo stirling   maz 244Ciclo stirling   maz 244
Ciclo stirling maz 244
leonardoftc
 

Destacado (18)

Presentación efectiva rmr
Presentación efectiva rmrPresentación efectiva rmr
Presentación efectiva rmr
 
Desarrollo del Internet 1997-2014
Desarrollo del Internet 1997-2014Desarrollo del Internet 1997-2014
Desarrollo del Internet 1997-2014
 
PENGOBATAN SAKIT JANTUNG
PENGOBATAN SAKIT JANTUNGPENGOBATAN SAKIT JANTUNG
PENGOBATAN SAKIT JANTUNG
 
Guía didáctica yuyo cuida lo tuyo
Guía didáctica yuyo cuida lo tuyoGuía didáctica yuyo cuida lo tuyo
Guía didáctica yuyo cuida lo tuyo
 
Navigating turbulent waters
Navigating turbulent watersNavigating turbulent waters
Navigating turbulent waters
 
Los valores
Los valoresLos valores
Los valores
 
Desarrollo fase1 amaldo molinares
Desarrollo fase1 amaldo molinaresDesarrollo fase1 amaldo molinares
Desarrollo fase1 amaldo molinares
 
第二章-共同基金的投資困境/ 單筆投資(上)
第二章-共同基金的投資困境/ 單筆投資(上)第二章-共同基金的投資困境/ 單筆投資(上)
第二章-共同基金的投資困境/ 單筆投資(上)
 
Tenologias de la innovacion en la educacion presentacion final
Tenologias de la innovacion en la educacion presentacion finalTenologias de la innovacion en la educacion presentacion final
Tenologias de la innovacion en la educacion presentacion final
 
Aquatic Sports and Adventures
Aquatic Sports and AdventuresAquatic Sports and Adventures
Aquatic Sports and Adventures
 
Decreto convocatoria 183
Decreto convocatoria 183Decreto convocatoria 183
Decreto convocatoria 183
 
40 fotògrafs per Marta Nicolau
40 fotògrafs per Marta Nicolau40 fotògrafs per Marta Nicolau
40 fotògrafs per Marta Nicolau
 
Cartaz ativ. pre escolar dezembro 2011-12
Cartaz ativ. pre  escolar dezembro 2011-12Cartaz ativ. pre  escolar dezembro 2011-12
Cartaz ativ. pre escolar dezembro 2011-12
 
Metodo cualitativo papas francesas, euripides peña, politecnico costa atlantica
Metodo cualitativo papas francesas, euripides peña, politecnico costa atlanticaMetodo cualitativo papas francesas, euripides peña, politecnico costa atlantica
Metodo cualitativo papas francesas, euripides peña, politecnico costa atlantica
 
28 julio
28 julio28 julio
28 julio
 
Slideshare
SlideshareSlideshare
Slideshare
 
Ciclo stirling maz 244
Ciclo stirling   maz 244Ciclo stirling   maz 244
Ciclo stirling maz 244
 
Bloque de cierre
Bloque de cierreBloque de cierre
Bloque de cierre
 

Similar a REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP

Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
HassaanSahloul
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
bora.gungoren
 
Institutional IT Security
Institutional IT SecurityInstitutional IT Security
Institutional IT Security
CRISIL Limited
 

Similar a REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP (20)

Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
unit5final
unit5finalunit5final
unit5final
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
NodeGrid Bold
NodeGrid BoldNodeGrid Bold
NodeGrid Bold
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Secure containers for trustworthy cloud services: business opportunities
 Secure containers for trustworthy cloud services: business opportunities Secure containers for trustworthy cloud services: business opportunities
Secure containers for trustworthy cloud services: business opportunities
 
Institutional IT Security
Institutional IT SecurityInstitutional IT Security
Institutional IT Security
 
Computer Security Issues
Computer Security IssuesComputer Security Issues
Computer Security Issues
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Презентация компании Siemens "Противовзломные системы Spc tools"
Презентация компании Siemens "Противовзломные системы Spc tools"Презентация компании Siemens "Противовзломные системы Spc tools"
Презентация компании Siemens "Противовзломные системы Spc tools"
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
 

Último

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
Renandantas16
 

Último (20)

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 

REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP

  • 1. Copyright © 2004 – 2013 Advanced Systems International SAC. All rights reserved Advanced Systems International SAC USB LOCK RP©: Developer&Licensor&Backbone Support info@advansysperu.com www.advansysperu.com Phone 1(214) 628 06 17 // + 51 1 723 0535 // + 51 989 745874 USB LOCK RP NETWORK ENDPOINT SECURITY SOFTWARE SYSTEM REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP. SECOND TO NONE DATA ASSETS PROTECTOR An eight year evolution straightforward solution that includes functionality required and suggested by real systems administrators and security officers of top-notch organizations. You will find serious capacity to allow securing your network without affecting its productivity, and no useless functionality wasting your systems resources. Designed for automatic real-time protection of windows networks, it’s presented to you in three versions to exactly fit your requirements and organizations budget: USB LOCK RP - USB LOCK RP PLUS - USB LOCK RP-E USB LOCK RP Provides automatic real-time centralized remote management of network endpoints: Real-time easy to set Authorizations (Block all removable storage devices except the authorized) -Network level authorization Allows for 30 different groups of devices or specific devices to be authorize in all network client PCs Groups of devices are allowed by hardware VID or PID match and Specific devices by hardware device ID match. Easily deploy in real-time to all connected PCs and set auto deployment to PCs that are not connected. -Client level authorizations: Allows up to 10 usb storage devices to be authorized on any client PC. In addition to the authorized at network level. Authorizations can be made remotely and in real-time. Devices can be authorized when inserted at client or at the control and the device User Name, Hardware Id, and machine name is automatically logged for easy effective identification. . Automatically receive insertion alerts and log the insertion of allowed or blocked devices at any clients in real-time. Generate at any time per client detailed historic reports and/or global security status, and/or global alerts reports. Audit from any client at anytime: system information, installed software, windows updates- security patches, running processes, and query ALL authorized devices on any client in real-time. USB LOCK RP Plus Provides automatic real-time centralized remote management of network endpoints + Keeps your organization informed of file transfers made from client PCs to authorized or allowed devices: Automatically monitors and registers: The name and exact size of files transferred. Device insertion date/time and the specific device hardware identifier (ID). The name of the PC machine and user/users logged at insertion time. Auto email alerts & authorized usb file extractions fully compatible with exchange mail servers and allows authentication. Get all insertion incoming alerts also sent to an email address at your organizations domain. Get all details on files extracted on authorized devices also sent to an email address at your organizations domain. USB LOCK RP E Provides automatic real-time centralized remote management of network endpoints + Keeps your organization informed of file transfers made from client PCs to authorized or allowed devices. + Protects the information inside authorized portable devices while used to transport or store information: Remote portable protection assignment and distribution for the 2 main usb storage authorizations at any/all clients. Centralized password storage: Allowing to internally troubleshooting any “lost password issues” Automatically logs the relation: Device User-Device Id-Device Home-Device Portable Protector Password Smart auto-encryption: When force encryption is set to ON, files transferred to the two main authorized devices are automatically encrypted and the user at client PC is noted of the encryption progress by a small unobtrusive message and distinctive pitch beep. Forcing auto-encryption is recommended to ensure the portable protector is used.
  • 2. Copyright © 2004 – 2013 Advanced Systems International SAC. All rights reserved USB lock RP-E Portable protectors run inside the usb drive offering password protected drag & drop file encryption/decryption. SUPPORTED OPERATING SYSTEM: Windows 2000-Windows XP-Windows Server 2003 -Windows Vista-Windows Server 2008-Windows 7- Windows 8 (32-64 bit) (Applies to all version control and clients) PROTECTION SCOPE: Portable flash memory devices E-sata, Firewire, USB drives Digital audio players including MP3 players and iPod External magnetic hard drives External optical drives, including CD and DVD reader and writer drives Adapters bridging between standard flash memory cards and a USB connection Digital cameras (Storage, mtp media transfer protocol, Twain) Card readers including CF, SD, SDMicro, MMC, XD PDA, and handheld computers, mobile phones Internal optical drives, including CD, DVD, Burners, Combos, Floppy drives Wireless Transceivers IrDA, USB Bluetooth FULLY FUNCTIONAL DEMO AVAILABLE: Duration 15 day - Capacity 5 clients ADVANTAGES: Protects even if clients are disconnected from the network. Does not restrict the normal use of non storage capable peripherals, (printers, mouse, keyboards, vcams etc) Easy authorize specific devices. Light on system resources.(no useless functionality hugging your systems) Personalized Alert screens presented at clients include licensed organization logo, automatically at no extra charge. Network-wide VID match authorizations, very useful for large number of vector based build in devices. Network-wide VID-PID match authorization excellent to authorize large number of organization provided custom devices. Local-client and/or network-wide specific device authorizations.(Granular protection). Client silent initial deployment easy with MSI Windows Installer (for orders of RP60 or more) Scalable and updatable, Windows multiplatform. Allows for sub network management, also Ideal for controlling port security on start ups, or field operation. Automatically receive and record devices insertion alerts in real-time. Capable of automatically email you all insertion alerts blocked and extraction records as they happen. Allows its implementation without disrupting operations. Control application is able to run from regular PC during testing (flexible: does not require running from a server). Effectively control large or small networks. Corporations see also Master Control, capable of offering higher hierarchy management. http://www.advansysperu.com/usb_lock_rp_master-control_en.pdf SOFTWARE TYPE: Windows multiplatform two components server/client type application HARDWARE REQUIREMENTS: Network (Fixed or dynamic IP configuration) (Workgroup, LAN – WAN) (Wired or wireless) RESOURCES REQUIREMENTS: Minimum: Low demand=Not significantly higher than the originally recommended to run the installed Operating System MORE INFORMATION: Main product page: http://www.advansysperu.com/usb-lock-remote-protect.html Authorized distributors list: http://www.advansysperu.com/usb_lock_distributors.pdf Pricing: http://www.advansysperu.com/usb_lock_pricing.pdf