Protect your data and control what portable storage and USB devices are used on your PC. See what data has been transferred from or to your PC. Prevent others from stealing data through the USB port with a USB Flash Drive or other portable device.
Sep 13, 2011 19:57:36
English, German, French
Windows ME, Windows NT, Windows XP, Windows 2003, Windows Vista
Description: Secure it Easy gives you the ability to control the use of USB Flash Drive, iPods, card readers, digital cameras, external hard drives and other portable storage devices, to prevent them from copying data from your PC or copying unwanted data to your PC. With Secure it Easy you also have the option to trace all file transfers from and to the portable storage device. With this detailed File Transfer History you can clearly monitor what user is copying what data from a protected PC.
In the past everybody that had a portable storage device was able to copy data from your PC to the portable storage device. You now have the power to stop this.
With Secure it Easy you can set specific permissions for the use of only certain portable storage devices. The devices that you permit for the use on your PC are classified as TrustedDevices and listed in a White List that only you can edit.
If a user that has access to your PC and tries to connect a USB Flash Drive that you did not authorize for use on your PC you will be notified by e-mail, alerting you of the attempted security breach.
The Secure it Easy USB Firewall allows you to maintain a high degree of data protection on your notebook, home and office PC.
Endpoint Protector Basic 188.8.131.52 To protect your PC, we recommend to use Endpoint Protector Basic to monitor and control ports and interfaces such as USB, FireWire, card reader, CD / DVD, etc on your PC. To
Intrusion prevention start-up touts 'memory firewall' JUNE 07, 2004 (COMPUTERWORLD) - The growing speed at which malicious hackers can exploit new vulnerabilities is creating a need for intrusion-prevention technologies capable of proactively detecting and blocking attacks even before software fixes become .