USB Disk Security là một chương trình nhằm mục đích phát hiện bất kỳ virus nào trước khi nó có cơ hội lây nhiễm vào thẻ nhớ của bạn. Show
Bởi bản chất của họ, ổ đĩa USB dễ bị nhiễm trùng. Bạn gắn chúng vào các máy tính lạ, chia sẻ chúng với bạn bè và cho người khác mượn và tải xuống, vì vậy không có gì lạ khi bạn sử dụng chúng, có nguy cơ chúng có thể lây nhiễm cho máy tính của bạn với một thứ gì đó khó chịu. Một khi bạn cài đặt USB Disk Security nó sẽ tự động chạy khi một ổ đĩa flash được lắp vào. Nó kiểm tra các nhiễm trùng và cung cấp một số tính năng khác, chẳng hạn như danh sách các chương trình tự động chạy khi khởi động. USB Disk Security có các tính năng khác, chẳng hạn như công cụ quét USB và các tùy chọn sửa chữa, nhưng chúng không có sẵn trong phiên bản dùng thử. Khi được thu nhỏ, USB Disk Security sẽ nằm trong khay nhiệm vụ kín đáo. Từ menu này, bạn có thể bật và tắt tự động quét cũng như cập nhật chương trình. Những hạn chế trên phiên bản dùng thử của USB Disk Security là một chút thất vọng, nhưng chương trình này không phô trương và hiệu quả khi quét các ổ đĩa USB được chèn vào gần đây mà nó có thể đáng để tải xuống. Giới hạn phiên bản dùng thử là đáng thất vọng, nhưng USB Disk Security vẫn là một lựa chọn tốt cho bảo mật đĩa flash. Need a USB blocker to protect sensitive files against theft to portable storage? In this article you will learn why you need to block USB devices and the best USB device management tools to prevent data loss to removable media. Looking for more tools? Check out our list of the best internet filters and the best employee monitoring software Ready to prevent data loss to USB storage devices? Get started immediately with a free trial of AccessPatrol, CurrentWare’s USB blocking software. What Are the Risks of Removable Media?Data Leaks & Insider Data TheftThe theft of sensitive data via USB ports is by far the greatest risk presented by unmanaged USB devices. Companies with databases full of sensitive data such as customer information, intellectual property, and trade secrets are especially vulnerable to insider data theft as this data can be used for personal or professional gain. A USB blocker is an essential part of any data theft prevention strategy. By not restricting USB drives and other external devices from USB ports a data security incident is as simple as a user sneaking in an unauthorized USB flash drive, plugging it into an available port, initiating a download of sensitive data from the network to the device, then walking away. Data Loss & Integrity RisksUSB devices are portable, which makes them convenient for mobile data storage. It also makes them incredibly easy for a user to misplace. If a proper data backup system is not in place for crucial data there is a risk that the most up-to-date version of a file is located on a USB removable storage device. Should one of the removable devices go missing the integrity of the data will be compromised, not to mention the potential data breach if the data wasn’t encrypted. With a USB blocker you can improve data security by limiting what files are allowed to be transferred to a USB device. USB Malware & VirusesSince USB flash drives are capable of storing and transmitting data, they are potential vectors for malware. The infamous Stuxnet computer worm, for example, was able to infect air-gapped computers in an Iranian uranium enrichment plant when infected USB flash drives were plugged its USB port. Even if USB drives aren’t intentionally infected with malware, personal USB devices are at a greater risk of inadvertent infections. A USB blocker protects against rogue USB devices by blocking USB ports and allowing you to authorize trusted USB drives. Learn More: How Rogue USB Devices Harm Security Examples of Removable DevicesRemovable devices consist of a variety of compact devices that can connect to another device to transmit data from one system to another.
1) AccessPatrol – The Best USB Control Software For WindowsLast Updated: July 2022 OverviewAccessPatrol is a data loss prevention (DLP) and USB device control software solution that protects sensitive data against theft to portable storage devices and cloud storage services. AccessPatrol keeps data secure by…
AccessPatrol’s central console allows you to centrally manage devices and run reports on your user’s USB activities from the convenience of a web browser. The security policies are enforced by a software agent that is installed on your user’s computers. This keeps devices restricted and monitored even when the computers are taken off of the network. AccessPatrol operates from the same central console as the other modules in the CurrentWare Suite. It can be purchased individually for the greatest flexibility or bundled with the CurrentWare Suite for the best value. The CurrentWare Suite includes multiple solutions for protecting data:
Platforms & Deployment OptionsAccessPatrol is exclusively available on Windows. It supports Active Directory import and sync that allows you to manage your users with your existing organizational units alongside non-AD users. AccessPatrol uses a software client to enforce data loss prevention policies on devices no matter which network they are connected to, making it the ideal solution for protecting remote workers. AccessPatrol has been verified as Citrix Ready. The device control software can be installed on premises or to the cloud on a self-managed cloud virtual machine Learn More: AccessPatrol System Requirements Pros/ConsPros
Cons
PriceAccessPatrol is a module within the CurrentWare Suite. When purchased as a standalone module its pricing starts at $3.99 per license per month, paid annually. The full CurrentWare Suite starts at $8.99 and provides additional modules for internet use monitoring, web filtering, and remote PC power management. Discounts are available for prepayment and bulk licensing, managed service providers, and nonprofit/educational organizations. A free trial of AccessPatrol is available for 14 days and 10 computers. Learn More: AccessPatrol pricing and licensing FAQ Key FeaturesAccessPatrol has a variety of device control capabilities. Beyond the ability to block removable storage devices it can permit temporary or scheduled access to USB devices, selectively restrict data transfers based on file name and extension, and more. Here are AccessPatrol’s key device control features:
Learn More: ReviewsAccessPatrol is a magical weapon with cutting-edge capabilities that protects your computer from untrusted USB devices. If an unauthorized device is attached it will warn the company immediately. Md Jahan M, Digital Marketing & Full Stack Specialist (2022) Internet Industry, 10,001+ employees [AccessPatrol] has been a great benefit to secure USB devices and access to company computers. We now have the ability to secure machines that otherwise would have been exposed to threats. Jordan F., Senior IT Specialist (2022) Machinery Industry, 1001-5000 employees Data leaks have been thwarted by Accesspatrol. When an unauthorized device is detected, an email alert is sent immediately. It enables real-time audit reports on accessed and blocked devices. Karen M., Senior Director of Marketing (2022) Construction Industry, 10,001+ employees We have experienced data leaks by dishonest employees in the past and AccessPatrol has helped us avoid them and work with greater security and peace of mind for us and our customers. Julio V., Head of Information Technology (2022) Financial Services Industry, 10,001+ employees Learn how Viking Yachts protected their intellectual property from a departing employee in our case study Support
Product support for AccessPatrol is available from a variety of channels. Their support team is active 8:00 AM – 6:30 PM EST, Monday to Friday. Removable MediaPolicy Template
Get started today—Download the FREE template and customize it to fit the needs of your organization. USB Control Methods OverviewTo protect sensitive data against removable media devices you need more than a single tool. A layered cybersecurity strategy that combines physical, technical, and administrative controls is the most effective approach to preventing viruses and data loss. This section will overview a few USB control methods that you can use to mitigate this threat. USB Blocker SoftwareThe best USB blocker software (device control software) are centrally-managed device control tools that allow you to selectively enable and disable what types of peripheral devices can be used and which endpoints/users are permitted to use them. For example, you can use USB blocker software for blocking USB ports for any user or computer with access to sensitive data while leaving the USB blocker turned off for users that pose less risk. You can also enforce the exclusive use of authorized USB devices by blocking USB ports to peripheral devices that have not been added to an allow list. CurrentWare’s USB blocker software AccessPatrol allows you to block or unblock USB ports in just a few clicks, making USB security simple and scalable. AccessPatrol includes key features to prevent data leakage to portable drives:
Learn More: Which devices can I control with AccessPatrol? Pros of a USB Blocker SoftwareCons of a USB Blocker SoftwareScalable USB security. Solutions that allow for remote central policy management make managing the USB security policies of an entire business scalable. The solution is not free. While there may be some freeware solutions with limited functionality available, the best features for business use are found in paid USB lockdown softwareGreater visibility. The best USB lockdown software tools will include a feature to monitor USB activities. Timestamped reports of what devices are being used, which computer it was used on, and which user was logged in are incredibly valuable when investigating suspected data leaks. Requires a software agent. To control all the USB ports with usb lockdown software tools you need to install a software client on each machine you’d like to control. This limits your ability to control USB ports on equipment that is owned by the user.Granular control. Rather than completely blocking peripheral ports you can selectively choose what devices are allowed and who is allowed to use them. The best USB control software will allow you to selectively assign read-only, read/write, and no access to each device type. Ready to start blocking USB devices? Get started today with a free trial of AccessPatrol, CurrentWare’s USB control software. Removable Media PolicyRemovable MediaPolicy Template
Get started today—Download the FREE template and customize it to fit the needs of your organization. A removable media policy is a type of information security policy that dictates the acceptable use of portable storage devices such as USB flash drives, external hard drives, and tape drives. These policies serve as a critical administrative security control for managing the risks of removable media. They establish the security responsibilities of users, explain the importance of following security standards, and provide guidelines for protecting sensitive data when transmitting confidential data to portable storage. A USB blocker works in tandem with these administrative security controls to ensure your users avoid high-risk behavior such as using personal USB devices or stealing data for personal or professional gain. Block USB Ports With Epoxy, Super Glue, etcWhile this is an extreme form of removable device protection, it’s a surprisingly commonly suggested tool. After all, it does prevent the use of peripheral ports on a computer; albeit permanently. If you desperately need a USB blocker while on a shoestring budget, it technically get the job done. As they say, “sometimes it’s best to just take control of the physical layer and call it a day.” While using epoxy as a literal port blocker will certainly prevent the use of removable storage devices, there are several downsides… Pros of this USB BlockerCons of this USB BlockerIt’s a permanent USB blocker. The ports are truly blocked, ensuring that no devices can be used. You can’t unblock peripheral ports. With no option to block and unblock USB access, the computer is permanently unable to accept any devices for the rest of its lifespan.It’s cheap and easy! No need to purchase USB blocking software or spend time in the BIOS on each computer. Applying epoxy is as simple as pressing a plunger.It harms employee productivity. Modern day keyboards, mice, and other peripherals need a USB port to function. A permanent USB blocker prevents the use of legitimate devices.It’s unnecessarily destructive. The device immediately loses any value for resale/refurbishment. Reliably getting epoxy out of the ports simply isn’t worth the risk and labour.It’s not scalable. While this might not take too much time for a few devices, it quickly becomes too much of a hassle for an entire fleet. It lacks flexibility. Physical USB blocking can only block or unblock the USB port. It lacks granular device control such as only blocking unauthorized storage devices. USB Blocker Hardware for USB PortsSticking with the physical layer, you could try a USB port blocker. A hardware USB blocker works similarly to the epoxy method, but using a reversible lock-and-key system. While it will require a greater initial investment than epoxy, the ability to protect your ports from permanent damage is more than worth it. Since the USB ports are completely blocked, physical port locking with USB blocker hardware offers protection against all USB devices. Pros of this USB BlockerCons of this USB BlockerIt’s a functional USB blocker. The USB ports are truly blocked, ensuring that no devices can be used. It’s not scalable. While this might not take too much time for a few computers, it quickly becomes too much of a hassle for an entire fleet. With a dedicated USB blocker software you can block or unblock unlimited USB ports in just a few clicks. It’s cheap and easy! No need to purchase USB blocking software or spend time in the BIOS on each computer. It’s inconvenient. Any time a USB device needs to be allowed an authorized user needs to physically come up to the computer and remove the USB lock to unblock the port. Layered security. A physical USB blocker serves as an added layer of device control. When combined with USB blocker software a company will have full device control.It lacks flexibility. Physical USB blocking can only block or unblock the individual port. It lacks granular device control such as only blocking unauthorized USB storage devices.Platform agnostic. A physical USB lock works regardless of the operating system of the computer, though you’ll need to have unique USB blockers for each USB connection type. USB Security HardwareWith so many security risks it can be risky to support allowing even trusted users to use their USB ports. USB security hardware such as a USB data blocker (“USB condom”) can allow charging via USB without enabling data transfer. A USB firewall such as the USG can further protect against rogue USB devices by acting as an interface between a USB device and the user’s computer, limiting the USB device’s capabilities to only a few safe commands. Pros of this USB BlockerCons of this USB BlockerLayered security. USB security hardware serves as an added layer of device control. When combined with USB blocker software a company will have full device control.It’s not reliable. These devices are great for providing another layer of security, but it’s not a reliable standalone tool. All it would take is a user neglecting to use the provided protection to introduce malware.It’s great for third-party USB drives. For edge-cases where unauthorized devices may need to interface with the network, a USB firewall offers excellent protection against malware.It’s inconvenient. With this tool the user needs to remember to bring a physical USB block with them. Should they lose the tool they’ll simply be tempted to use their port anyway. Disable USB Ports on Each ComputerIf you do not need a USB blocker solution that allows you to easily unblock USB ports as-needed, you could completely disable USB ports. On Windows devices this can be accomplished using the BIOS, by modifying Registry keys, disabling USB root hubs in Device Manager, or physically removing the USB ports altogether. While this may be feasible in environments that genuinely have no use for USB ports, when you block USB ports in this way you also prevent the use of modern day keyboards and mice, among other USB devices that are essential for business use. If you choose to leave any USB ports enabled it completely defeats the purpose of using a USB blocker in the first place. A user only needs one port to use unauthorized hardware to transfer files. With a USB hub they can easily connect multiple devices to any enabled ports. Pros of this USB BlockerCons of this USB BlockerIt’s inexpensive. There’s no need to purchase software, all you need is time. It harms employee productivity. Modern day keyboards, mice, and other peripherals need a USB port to function. Completely disabling the ports prevents the use of legitimate devices.It lacks flexibility. Fully disabling ports blocks access to all devices, including those related to the business’ legitimate needs.No visibility. If any ports are left enabled there is no way to monitor their use to ensure that unauthorized devices aren’t being used. Looking for even more protection? Your cybersecurity risk management program needs to extend far beyond a USB block. Download the full CurrentWare Suite for enhanced control and visibility over your endpoints: Block dangerous websites, monitor employee computer activity, and restrict peripheral devices—all from the same central console. Prevent Data Leaks Today—Get Started With AccessPatrol USB Blocker SoftwareReady to stop data theft to USB devices? Get started today with a free trial of AccessPatrol, CurrentWare’s USB blocking software. Use AccessPatrol on a Windows PC or in a Citrix VDI deployment for free to test its USB blocking capabilities in your environment. |