SlideShare uma empresa Scribd logo
1 de 2
Copyright © 2004 – 2013 Advanced Systems International SAC. All rights reserved
Advanced Systems International SAC
USB LOCK RP©: Developer&Licensor&Backbone Support
info@advansysperu.com
www.advansysperu.com
Phone 1(214) 628 06 17 // + 51 1 723 0535 // + 51 989 745874
USB LOCK RP NETWORK ENDPOINT SECURITY SOFTWARE SYSTEM
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP.
SECOND TO NONE DATA ASSETS PROTECTOR
An eight year evolution straightforward solution that includes functionality required and suggested by real systems
administrators and security officers of top-notch organizations. You will find serious capacity to allow securing your
network without affecting its productivity, and no useless functionality wasting your systems resources.
Designed for automatic real-time protection of windows networks, it’s presented to you in three versions to exactly
fit your requirements and organizations budget: USB LOCK RP - USB LOCK RP PLUS - USB LOCK RP-E
USB LOCK RP
Provides automatic real-time centralized remote management of network endpoints:
Real-time easy to set Authorizations (Block all removable storage devices except the authorized)
-Network level authorization
Allows for 30 different groups of devices or specific devices to be authorize in all network client PCs
Groups of devices are allowed by hardware VID or PID match and Specific devices by hardware device ID match.
Easily deploy in real-time to all connected PCs and set auto deployment to PCs that are not connected.
-Client level authorizations:
Allows up to 10 usb storage devices to be authorized on any client PC. In addition to the authorized at network level.
Authorizations can be made remotely and in real-time.
Devices can be authorized when inserted at client or at the control and the device User Name, Hardware Id, and
machine name is automatically logged for easy effective identification.
. Automatically receive insertion alerts and log the insertion of allowed or blocked devices at any clients in real-time.
Generate at any time per client detailed historic reports and/or global security status, and/or global alerts reports.
Audit from any client at anytime: system information, installed software, windows updates- security patches, running
processes, and query ALL authorized devices on any client in real-time.
USB LOCK RP Plus
Provides automatic real-time centralized remote management of network endpoints +
Keeps your organization informed of file transfers made from client PCs to authorized or allowed devices:
Automatically monitors and registers:
The name and exact size of files transferred.
Device insertion date/time and the specific device hardware identifier (ID).
The name of the PC machine and user/users logged at insertion time.
Auto email alerts & authorized usb file extractions fully compatible with exchange mail servers and allows authentication.
Get all insertion incoming alerts also sent to an email address at your organizations domain.
Get all details on files extracted on authorized devices also sent to an email address at your organizations domain.
USB LOCK RP E
Provides automatic real-time centralized remote management of network endpoints +
Keeps your organization informed of file transfers made from client PCs to authorized or allowed devices. +
Protects the information inside authorized portable devices while used to transport or store information:
Remote portable protection assignment and distribution for the 2 main usb storage authorizations at any/all clients.
Centralized password storage: Allowing to internally troubleshooting any “lost password issues”
Automatically logs the relation: Device User-Device Id-Device Home-Device Portable Protector Password
Smart auto-encryption: When force encryption is set to ON, files transferred to the two main authorized devices are
automatically encrypted and the user at client PC is noted of the encryption progress by a small unobtrusive message and
distinctive pitch beep.
Forcing auto-encryption is recommended to ensure the portable protector is used.
Copyright © 2004 – 2013 Advanced Systems International SAC. All rights reserved
USB lock RP-E Portable protectors run inside the usb drive offering password protected drag & drop file encryption/decryption.
SUPPORTED OPERATING SYSTEM:
Windows 2000-Windows XP-Windows Server 2003 -Windows Vista-Windows Server 2008-Windows 7- Windows 8 (32-64 bit)
(Applies to all version control and clients)
PROTECTION SCOPE:
Portable flash memory devices
E-sata, Firewire, USB drives
Digital audio players including MP3 players and iPod
External magnetic hard drives
External optical drives, including CD and DVD reader and writer drives
Adapters bridging between standard flash memory cards and a USB connection
Digital cameras (Storage, mtp media transfer protocol, Twain)
Card readers including CF, SD, SDMicro, MMC, XD
PDA, and handheld computers, mobile phones
Internal optical drives, including CD, DVD, Burners, Combos, Floppy drives
Wireless Transceivers
IrDA, USB Bluetooth
FULLY FUNCTIONAL DEMO AVAILABLE:
Duration 15 day - Capacity 5 clients
ADVANTAGES:
Protects even if clients are disconnected from the network.
Does not restrict the normal use of non storage capable peripherals, (printers, mouse, keyboards, vcams etc)
Easy authorize specific devices.
Light on system resources.(no useless functionality hugging your systems)
Personalized Alert screens presented at clients include licensed organization logo, automatically at no extra charge.
Network-wide VID match authorizations, very useful for large number of vector based build in devices.
Network-wide VID-PID match authorization excellent to authorize large number of organization provided custom devices.
Local-client and/or network-wide specific device authorizations.(Granular protection).
Client silent initial deployment easy with MSI Windows Installer (for orders of RP60 or more)
Scalable and updatable, Windows multiplatform.
Allows for sub network management, also Ideal for controlling port security on start ups, or field operation.
Automatically receive and record devices insertion alerts in real-time.
Capable of automatically email you all insertion alerts blocked and extraction records as they happen.
Allows its implementation without disrupting operations.
Control application is able to run from regular PC during testing (flexible: does not require running from a server).
Effectively control large or small networks.
Corporations see also Master Control, capable of offering higher hierarchy management.
http://www.advansysperu.com/usb_lock_rp_master-control_en.pdf
SOFTWARE TYPE:
Windows multiplatform two components server/client type application
HARDWARE REQUIREMENTS:
Network (Fixed or dynamic IP configuration)
(Workgroup, LAN – WAN) (Wired or wireless)
RESOURCES REQUIREMENTS:
Minimum: Low demand=Not significantly higher than the originally recommended to run the installed Operating System
MORE INFORMATION:
Main product page:
http://www.advansysperu.com/usb-lock-remote-protect.html
Authorized distributors list:
http://www.advansysperu.com/usb_lock_distributors.pdf
Pricing:
http://www.advansysperu.com/usb_lock_pricing.pdf

Mais conteúdo relacionado

Mais procurados

Sierra Access and Door Control with InduSoft
Sierra Access and Door Control with InduSoftSierra Access and Door Control with InduSoft
Sierra Access and Door Control with InduSoftAVEVA
 
Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Teddy Reed
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet GENIANS, INC.
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkMarcoAfzali
 
Final project
Final projectFinal project
Final projectrippea
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsSam Bowne
 
It security
It securityIt security
It securityavi2607
 
Blancco Drive Eraser
Blancco Drive EraserBlancco Drive Eraser
Blancco Drive EraserJemma Elliott
 
Steve brueckner-atc-ny
Steve brueckner-atc-nySteve brueckner-atc-ny
Steve brueckner-atc-nyjcaire
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overviewNine23Ltd
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityIntel IT Center
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architectureImran Khan
 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104pgmaynard
 

Mais procurados (20)

Sierra Access and Door Control with InduSoft
Sierra Access and Door Control with InduSoftSierra Access and Door Control with InduSoft
Sierra Access and Door Control with InduSoft
 
Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
Final project
Final projectFinal project
Final project
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
 
It security
It securityIt security
It security
 
UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)
 
Blancco Drive Eraser
Blancco Drive EraserBlancco Drive Eraser
Blancco Drive Eraser
 
Steve brueckner-atc-ny
Steve brueckner-atc-nySteve brueckner-atc-ny
Steve brueckner-atc-ny
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
System 6000
System 6000System 6000
System 6000
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Security in Embedded systems
Security in Embedded systems Security in Embedded systems
Security in Embedded systems
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104
 

Destaque

Presentación efectiva rmr
Presentación efectiva rmrPresentación efectiva rmr
Presentación efectiva rmrRicardo Mendez
 
Desarrollo del Internet 1997-2014
Desarrollo del Internet 1997-2014Desarrollo del Internet 1997-2014
Desarrollo del Internet 1997-2014Luisa Gomez
 
PENGOBATAN SAKIT JANTUNG
PENGOBATAN SAKIT JANTUNGPENGOBATAN SAKIT JANTUNG
PENGOBATAN SAKIT JANTUNGMas Gumilang
 
Guía didáctica yuyo cuida lo tuyo
Guía didáctica yuyo cuida lo tuyoGuía didáctica yuyo cuida lo tuyo
Guía didáctica yuyo cuida lo tuyorositamejiag
 
Navigating turbulent waters
Navigating turbulent watersNavigating turbulent waters
Navigating turbulent waterskimcab67
 
Desarrollo fase1 amaldo molinares
Desarrollo fase1 amaldo molinaresDesarrollo fase1 amaldo molinares
Desarrollo fase1 amaldo molinaresAmaldo Molinares
 
第二章-共同基金的投資困境/ 單筆投資(上)
第二章-共同基金的投資困境/ 單筆投資(上)第二章-共同基金的投資困境/ 單筆投資(上)
第二章-共同基金的投資困境/ 單筆投資(上)chihchih204
 
Tenologias de la innovacion en la educacion presentacion final
Tenologias de la innovacion en la educacion presentacion finalTenologias de la innovacion en la educacion presentacion final
Tenologias de la innovacion en la educacion presentacion finalomar lugo
 
Aquatic Sports and Adventures
Aquatic Sports and AdventuresAquatic Sports and Adventures
Aquatic Sports and AdventuresTerry Sovil
 
40 fotògrafs per Marta Nicolau
40 fotògrafs per Marta Nicolau40 fotògrafs per Marta Nicolau
40 fotògrafs per Marta NicolauMartaNR
 
Cartaz ativ. pre escolar dezembro 2011-12
Cartaz ativ. pre  escolar dezembro 2011-12Cartaz ativ. pre  escolar dezembro 2011-12
Cartaz ativ. pre escolar dezembro 2011-12bibdjosei2006
 
Metodo cualitativo papas francesas, euripides peña, politecnico costa atlantica
Metodo cualitativo papas francesas, euripides peña, politecnico costa atlanticaMetodo cualitativo papas francesas, euripides peña, politecnico costa atlantica
Metodo cualitativo papas francesas, euripides peña, politecnico costa atlanticaeuripena7303
 
Ciclo stirling maz 244
Ciclo stirling   maz 244Ciclo stirling   maz 244
Ciclo stirling maz 244leonardoftc
 
Bloque de cierre
Bloque de cierreBloque de cierre
Bloque de cierresancasas
 

Destaque (18)

Presentación efectiva rmr
Presentación efectiva rmrPresentación efectiva rmr
Presentación efectiva rmr
 
Desarrollo del Internet 1997-2014
Desarrollo del Internet 1997-2014Desarrollo del Internet 1997-2014
Desarrollo del Internet 1997-2014
 
PENGOBATAN SAKIT JANTUNG
PENGOBATAN SAKIT JANTUNGPENGOBATAN SAKIT JANTUNG
PENGOBATAN SAKIT JANTUNG
 
Guía didáctica yuyo cuida lo tuyo
Guía didáctica yuyo cuida lo tuyoGuía didáctica yuyo cuida lo tuyo
Guía didáctica yuyo cuida lo tuyo
 
Navigating turbulent waters
Navigating turbulent watersNavigating turbulent waters
Navigating turbulent waters
 
Los valores
Los valoresLos valores
Los valores
 
Desarrollo fase1 amaldo molinares
Desarrollo fase1 amaldo molinaresDesarrollo fase1 amaldo molinares
Desarrollo fase1 amaldo molinares
 
第二章-共同基金的投資困境/ 單筆投資(上)
第二章-共同基金的投資困境/ 單筆投資(上)第二章-共同基金的投資困境/ 單筆投資(上)
第二章-共同基金的投資困境/ 單筆投資(上)
 
Tenologias de la innovacion en la educacion presentacion final
Tenologias de la innovacion en la educacion presentacion finalTenologias de la innovacion en la educacion presentacion final
Tenologias de la innovacion en la educacion presentacion final
 
Aquatic Sports and Adventures
Aquatic Sports and AdventuresAquatic Sports and Adventures
Aquatic Sports and Adventures
 
Decreto convocatoria 183
Decreto convocatoria 183Decreto convocatoria 183
Decreto convocatoria 183
 
40 fotògrafs per Marta Nicolau
40 fotògrafs per Marta Nicolau40 fotògrafs per Marta Nicolau
40 fotògrafs per Marta Nicolau
 
Cartaz ativ. pre escolar dezembro 2011-12
Cartaz ativ. pre  escolar dezembro 2011-12Cartaz ativ. pre  escolar dezembro 2011-12
Cartaz ativ. pre escolar dezembro 2011-12
 
Metodo cualitativo papas francesas, euripides peña, politecnico costa atlantica
Metodo cualitativo papas francesas, euripides peña, politecnico costa atlanticaMetodo cualitativo papas francesas, euripides peña, politecnico costa atlantica
Metodo cualitativo papas francesas, euripides peña, politecnico costa atlantica
 
28 julio
28 julio28 julio
28 julio
 
Slideshare
SlideshareSlideshare
Slideshare
 
Ciclo stirling maz 244
Ciclo stirling   maz 244Ciclo stirling   maz 244
Ciclo stirling maz 244
 
Bloque de cierre
Bloque de cierreBloque de cierre
Bloque de cierre
 

Semelhante a REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP

Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Securityguest95226d
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device ControlHassaanSahloul
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer Englishcynapspro GmbH
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Secure containers for trustworthy cloud services: business opportunities
 Secure containers for trustworthy cloud services: business opportunities Secure containers for trustworthy cloud services: business opportunities
Secure containers for trustworthy cloud services: business opportunitiesATMOSPHERE .
 
Institutional IT Security
Institutional IT SecurityInstitutional IT Security
Institutional IT SecurityCRISIL Limited
 
Computer Security Issues
Computer Security IssuesComputer Security Issues
Computer Security Issuesthebestgeeks
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
Презентация компании Siemens "Противовзломные системы Spc tools"
Презентация компании Siemens "Противовзломные системы Spc tools"Презентация компании Siemens "Противовзломные системы Spc tools"
Презентация компании Siemens "Противовзломные системы Spc tools"journalrubezh
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Communication Devices Inc
 

Semelhante a REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP (20)

Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
unit5final
unit5finalunit5final
unit5final
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
NodeGrid Bold
NodeGrid BoldNodeGrid Bold
NodeGrid Bold
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Secure containers for trustworthy cloud services: business opportunities
 Secure containers for trustworthy cloud services: business opportunities Secure containers for trustworthy cloud services: business opportunities
Secure containers for trustworthy cloud services: business opportunities
 
Institutional IT Security
Institutional IT SecurityInstitutional IT Security
Institutional IT Security
 
Computer Security Issues
Computer Security IssuesComputer Security Issues
Computer Security Issues
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Презентация компании Siemens "Противовзломные системы Spc tools"
Презентация компании Siemens "Противовзломные системы Spc tools"Презентация компании Siemens "Противовзломные системы Spc tools"
Презентация компании Siemens "Противовзломные системы Spc tools"
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
 

Último

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 

Último (20)

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 

REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP

  • 1. Copyright © 2004 – 2013 Advanced Systems International SAC. All rights reserved Advanced Systems International SAC USB LOCK RP©: Developer&Licensor&Backbone Support info@advansysperu.com www.advansysperu.com Phone 1(214) 628 06 17 // + 51 1 723 0535 // + 51 989 745874 USB LOCK RP NETWORK ENDPOINT SECURITY SOFTWARE SYSTEM REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP. SECOND TO NONE DATA ASSETS PROTECTOR An eight year evolution straightforward solution that includes functionality required and suggested by real systems administrators and security officers of top-notch organizations. You will find serious capacity to allow securing your network without affecting its productivity, and no useless functionality wasting your systems resources. Designed for automatic real-time protection of windows networks, it’s presented to you in three versions to exactly fit your requirements and organizations budget: USB LOCK RP - USB LOCK RP PLUS - USB LOCK RP-E USB LOCK RP Provides automatic real-time centralized remote management of network endpoints: Real-time easy to set Authorizations (Block all removable storage devices except the authorized) -Network level authorization Allows for 30 different groups of devices or specific devices to be authorize in all network client PCs Groups of devices are allowed by hardware VID or PID match and Specific devices by hardware device ID match. Easily deploy in real-time to all connected PCs and set auto deployment to PCs that are not connected. -Client level authorizations: Allows up to 10 usb storage devices to be authorized on any client PC. In addition to the authorized at network level. Authorizations can be made remotely and in real-time. Devices can be authorized when inserted at client or at the control and the device User Name, Hardware Id, and machine name is automatically logged for easy effective identification. . Automatically receive insertion alerts and log the insertion of allowed or blocked devices at any clients in real-time. Generate at any time per client detailed historic reports and/or global security status, and/or global alerts reports. Audit from any client at anytime: system information, installed software, windows updates- security patches, running processes, and query ALL authorized devices on any client in real-time. USB LOCK RP Plus Provides automatic real-time centralized remote management of network endpoints + Keeps your organization informed of file transfers made from client PCs to authorized or allowed devices: Automatically monitors and registers: The name and exact size of files transferred. Device insertion date/time and the specific device hardware identifier (ID). The name of the PC machine and user/users logged at insertion time. Auto email alerts & authorized usb file extractions fully compatible with exchange mail servers and allows authentication. Get all insertion incoming alerts also sent to an email address at your organizations domain. Get all details on files extracted on authorized devices also sent to an email address at your organizations domain. USB LOCK RP E Provides automatic real-time centralized remote management of network endpoints + Keeps your organization informed of file transfers made from client PCs to authorized or allowed devices. + Protects the information inside authorized portable devices while used to transport or store information: Remote portable protection assignment and distribution for the 2 main usb storage authorizations at any/all clients. Centralized password storage: Allowing to internally troubleshooting any “lost password issues” Automatically logs the relation: Device User-Device Id-Device Home-Device Portable Protector Password Smart auto-encryption: When force encryption is set to ON, files transferred to the two main authorized devices are automatically encrypted and the user at client PC is noted of the encryption progress by a small unobtrusive message and distinctive pitch beep. Forcing auto-encryption is recommended to ensure the portable protector is used.
  • 2. Copyright © 2004 – 2013 Advanced Systems International SAC. All rights reserved USB lock RP-E Portable protectors run inside the usb drive offering password protected drag & drop file encryption/decryption. SUPPORTED OPERATING SYSTEM: Windows 2000-Windows XP-Windows Server 2003 -Windows Vista-Windows Server 2008-Windows 7- Windows 8 (32-64 bit) (Applies to all version control and clients) PROTECTION SCOPE: Portable flash memory devices E-sata, Firewire, USB drives Digital audio players including MP3 players and iPod External magnetic hard drives External optical drives, including CD and DVD reader and writer drives Adapters bridging between standard flash memory cards and a USB connection Digital cameras (Storage, mtp media transfer protocol, Twain) Card readers including CF, SD, SDMicro, MMC, XD PDA, and handheld computers, mobile phones Internal optical drives, including CD, DVD, Burners, Combos, Floppy drives Wireless Transceivers IrDA, USB Bluetooth FULLY FUNCTIONAL DEMO AVAILABLE: Duration 15 day - Capacity 5 clients ADVANTAGES: Protects even if clients are disconnected from the network. Does not restrict the normal use of non storage capable peripherals, (printers, mouse, keyboards, vcams etc) Easy authorize specific devices. Light on system resources.(no useless functionality hugging your systems) Personalized Alert screens presented at clients include licensed organization logo, automatically at no extra charge. Network-wide VID match authorizations, very useful for large number of vector based build in devices. Network-wide VID-PID match authorization excellent to authorize large number of organization provided custom devices. Local-client and/or network-wide specific device authorizations.(Granular protection). Client silent initial deployment easy with MSI Windows Installer (for orders of RP60 or more) Scalable and updatable, Windows multiplatform. Allows for sub network management, also Ideal for controlling port security on start ups, or field operation. Automatically receive and record devices insertion alerts in real-time. Capable of automatically email you all insertion alerts blocked and extraction records as they happen. Allows its implementation without disrupting operations. Control application is able to run from regular PC during testing (flexible: does not require running from a server). Effectively control large or small networks. Corporations see also Master Control, capable of offering higher hierarchy management. http://www.advansysperu.com/usb_lock_rp_master-control_en.pdf SOFTWARE TYPE: Windows multiplatform two components server/client type application HARDWARE REQUIREMENTS: Network (Fixed or dynamic IP configuration) (Workgroup, LAN – WAN) (Wired or wireless) RESOURCES REQUIREMENTS: Minimum: Low demand=Not significantly higher than the originally recommended to run the installed Operating System MORE INFORMATION: Main product page: http://www.advansysperu.com/usb-lock-remote-protect.html Authorized distributors list: http://www.advansysperu.com/usb_lock_distributors.pdf Pricing: http://www.advansysperu.com/usb_lock_pricing.pdf