USBInformer Now with Managed Support
Our MDR team will monitor for unauthorized devices being plugged into your machines 24 hours a day, 7 days a week. With managed support we also help you maintain your system by performing all adds, moves, and changes you need done on your system. We ensure your system is fully up to date with the latest patches and we even provide an offsite backup of your database.
Control USB Port Access
Your IT infrastructure is vulnerable to the ever growing threats from USB devices. USBInformer® provides USB port securityon all your Windows endpoints giving you granular control over all of your USB ports. USB devices can be used to steal confidential company data, infect your endpoints or hack your enterprise computers and the passwords they may contain.
USBInformer® stops access to any USB device not approved by an administrator including BadUSB infected devices and Physical Keyloggers. Central management allows administrators to remotely grant, reject, and monitor usage of new and existing USB devices. Managing Computers and Devices has never been easier. With the new Management view in USBInformer® 2.0, you can quickly manage any computer and the devices connecting to it. The revamped interface allows for smaller learning curves for your help desk.
Every device plugged in to a monitored computer is recorded and the information is sent back to the administrator portal, who are then able to review which users attempted to plug in unauthorized devices.
Mobile Devices and One Time Authorization Codes
USBInformer®continues protection even away from your network. On portable devices such as laptops and tablets, enforcement and reporting continues. All activity is locally cached and reported to the administrators as soon as the endpoint returns to the network. This gives your administrators a clear record of any activity that occurred while the device was away.
One time use device authentication codes allows your IT staff to help your mobile employees. Now when your employees take their laptop off the network, your IT can help authorize devices without the need of connecting back to the network. These one time use codes authorize a single device and can never be used again. When the user returns the computer to the network, the authorized device will be placed into the database and can be further managed by your IT staff.
From storage devices to bluetooth dongles, USBInformer® recognizes and controls all types of USB devices. It is even able to individually control devices connected to a USB Hub. We have improved our device detection and in USBInformer® 2.0 we are now able to help mitigate the risk of a physical keylogger being plugged into your computer systems. Using deep USB analytics and analysis we can alert on and block physical keyloggers.
Administrator Defined Exceptions
There are many devices that do not need to be monitored such as mice and keyboards. Users and administrators commonly move these devices from computer to computer, and user to user. With USBInformer®, administrators are able to define exception devices, allowing these devices to roam between computers and users.
We have worked hard to improve every aspect of the system to make it more stable, secure and silent. With 2.0 we have improved how and when the clients report back to the server. We have decreased the traffic needed to perform these actions and we have enhanced the security of the in data that is transmitted across the network. USBInformer® 2.0 is the best USB protection solution we have ever produced.