Skip to main content

Endpoint Device Control – Managing Devices Access to Network Endpoints:

Controlling USB Storage & Portable Devices Access to network endpoints is required to protect organizations computers systems that control machinery or store sensible data. Endpoint Device Control remains one of the most important aspects of Network Security and focuses in the protection of networks endpoint systems and data assets from external or internal threat. Removable storage is an attack vector by itself and a probable initial attack vector in a infection sequence. Windows Operating Systems are by design friendly to removable storage and portable devices, this is a good feature, nevertheless in industrial and business environments usb ports and removable devices access to endpoints need to be controlled to prevent systems infection and data loss.

USB-Lock-RP Software to Control Devices Access to Network Endpoints:

USB-Lock-RP Device Control is the strongest endpoint security software solution specialized in controlling USB port and portable devices access to Industrial Control Systems DCS/SCADA Servers and workstations in the market today!. Its straightforward aproach and effectiveness make it a must have tool to secure ICS Supervisory Systems or any Windows computer network. It protects a broad range of Windows Operating Systems (NT 10 to NT 5.1) from incoming and outgoing of data by means of:

Device Access Controlled by USB-Lock-RP: USB, eSATA, Firewire drives, mobile phones, CD & wireless

Device Control & Port Protection Scope: USB, eSATA and Firewire removable drives, mobile phones, MTP portable devices, Smart Cards, Compact discs, and Bluetooth, IrDA, Wi-Fi transceivers, as well as bad USB devices (USB Rubber Ducky) that can inflict keystroke injection attacks by HID Impersonation

Clarifying Terms and Purpose of USB-Lock-RP Software:

Endpoint Device Control:

Refers to the protection on the Network Endpoint Computer Running Windows Operating System. It can be a Server, Workstation or Laptop. To effectively protect the endpoint a USB-Lock-RP client is deployed and operates as a system service locally. Besides local enforcement of policy the service purpose if to communicate with the USB-Lock-RP Control Application. The Control Application is installed on a Server inside the network and operates independently as the Centralized Administrative Console. Its main function is to centrally control devices access to Endpoints.

USB Access Control:

Refers to the protection of data contained inside Authorized USB Thumb Drives (Flash drives, Memory Stick) There is no installation of software required inside this devices as the service is in charge of Monitoring, Encryption and Decryption of data inside them according to the set policy by the Control Application.

Advantages & Capabilities:

Straightforward Operation:

Start protecting your network endpoint computer systems in minutes. Very easy to operate and set security policy. Protection scope is divided in 4 sectors; just select a client machine and press the desired lock to keep removable storage and portable devices threats away. Once set operation is automatic. Intuitive administrative GUI, virtually no learning curve involved.

Strong USB Port Control:

Prevents Zero-day USB-based exploit from entering your systems. Blocks Incoming and outgoing of data. Authorized Devices Hardware IDs working storage is AES 256 variable key, variable initiation vector CBC Mode encrypted and HEX masked. Prevents Devices Hardware ID spoofing. Secures systems even if user is running with administrative credentials

Centrally managed granular policy:

Easy authorize specific usb removable drives and/or specific smart phones access to specific computers or on all computers in the network and block the rest. Prevents unauthorized access to USB ports, removable storage, portable devices and other Removable Media from accessing operating systems in your network.

Real-time Endpoint Access Control:

Set or change security measures and automatically receive and log details on blocked, and authorized devices as they are plugged into endpoint computers in real-time. As well as logging and receiving records of files transferred from endpoint computers to authorized USB thumb drives, as events occur.

Personalized:

Presents informative Lockdown alerts screens at client computers upon blocking devices, Lockdown screens presented at endpoint computers are personalized with the end-user organization logo. Personalization is automatically done by our team prior to secure electronic installers and certificate download delivery (within 4 hours order made)

Smart security:

Designed not to interfere with the use of non-storage capable peripherals (mouse, keyboards, webcams, printers), But capable of detecting and unobtrusively protecting against keystroke injection and malicious payload attacks by devices such as Bad USBs (USB Rubber Ducky) that impersonate HID keyboards or mouse.

USB Aware:

Efective monitoring of data/files transferred from endpoint computers to authorized usb portable storage (thumb/flash/pen drives). Records automatically arrive and are stored secured at the Control server. The Administrative Console can be set to send these records to a SMTP (TLS/SSL) email within your domain in real-time.

USB Encryption:

Protects information contained inside authorized Thumb drives by optionally forcing automatic AES 256 encryption of all transferred data/files from network endpoint computers to allowed usb devices, Effectively protecting sensible data in cases the authorized device is lost or stolen. This function can be enabled or disabled at any time with just a click.

Perpetual use Licenses & Support:

Licenses are End-user Organization Perpetual use Licenses and include 2 years updates, after 2 years updates are optional at 20% of licensing cost. USB-Lock-RP is not support demanding, once set it works as intended, this has to do with product maturity and that at client-side it deals with hardware, not users. Support is in English at no charge by email or phone.

Independent:

Doesn’t require internet or Active directory.
Protects even if client endpoint is disconnected from the network. Protects at System level. (effective even if running under administrative account). Starts protecting even if no user is logged into the system. Works on air-gapped networks and remote locations control.

Available for testing:

Fully functional DEMO ready for download. Test how USB Lock RP security software manages USB ports and Devices access to endpoints with ease and monitor authorized Thumb drives without time limitation in up to 5 clients. Dedicated team on stand by to assist on any questions you may have (24×7).

“Best endpoint device control, usb port access management software”
usb lock rp endpoint security custumers

Licensed by top-notch organizations:

Briefly Explained, USB Lock RP Operation:

How to Regulate Removable Storage & Media:

Step # 1: Select a client PC from the USB-Lock-RP Control network list.(Administrative Console)
Step # 2: Click on the left side lock. Done!
You have just protected the selected computer removable drives sector. Now access is denied to the following devices: USB, eSATA and Firewire drives, Mobile phones (MTP Protocol), Smart cards.

Advanced USB Lock Software features: Also included in this sector is protection against badUSB device such as USB Rubber Ducky, this type of device is extremely dangerous as its firmware has modified to impersonate Human interface devices (HID) such as keyboards and inflict keystroke attacks and introduce malicious payloads that could harm endpoint computers and network infrastructure. So the program makes a quick analysis when detects any change on keyboard/mouse enumeration to prevent such attacks, other than that keyboards and mouse work normally without restriction

Authorizing specific USB pen drives and Mobile phones is as easy, just insert the device you need to authorize (at the control or at the client) and press authorize. Done!

Besides the Removable drives sector (usb device control), three other sectors to manage are available and are as easy to protect: CD/DVD sector, iRDA/Bluetooth sector,and WiFi sector.
All blocked or authorized device connection to any endpoint/client automatically generate an alert event stored encrypted at Control server. This records are readable from within the Central USB-Lock-RP Device Control Interfase and show date-time, Hardware ID, logged user & machine name.
All blocked devices at endpoint/client generate a full screen alert visible at client screen bearing the licensed organization logo at top-left corner. The full screen alert remains until the device is removed or the sector is unprotected using the Central Administrative Device Control Console.

How to Monitor Thumb-drives:

USB Monitoring is activated or deactivated with just one click independently of the removable storage sector protection state. (while protected or unprotected state)
Monitored data include the name and exact weight of transfered files from the client endpoint PC to flash drives, logged user, device hardware ID, source machine name, date/time when the event started.
Records are sent encrypted AES 256 hex masked from the endpoint computer to the control in near real-time and are organized at the control by endpoint machine name/date/time for review as needed.
At the Central control server the collected data remains encrypted and same as all device insertion attempts records is only readable within the Device Control interface.

How to Protect information inside Thumb drives (Encryption):

USB Device Access Control is done by forcing automatic Encryption, this function can also be turned ON or OFF with just one click. (USB Monitoring needs to be activated for Encryption to work).

When USB Encryption is active all files transferred from the endpoint computer to authorized USB flash drives are automatically AES 256 encrypted. (all data not just the headers)
Stored files on encrypted USB Thumb drives can be opened within the endpoint originating client or within any other endpoint USB-Lock-RP client that have USB Encryption activated. (files are automatically decrypted in those systems when opened)

This function ensures that information contained inside authorized devices is only accessible within determined computers in the network and none outside the network.

USB-Lock-RP is Centralized Device Control EndPoint Security Software that comes with perpetual use license, reasonable cost, operates without requiring internet connection, and offers its service as a tool you can call your own. We invite you to lean more about our USB access control software, solution and to download & test USB-Lock-RP today!