USB-LOCK-RP

USB-LOCK-RP

Advanced Systems International
+

Related Products

  • ThreatLocker
    502 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    509 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Iru
    1,488 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Blumira
    149 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website

About

GoSecure, a recognized cybersecurity leader and innovator, combines more than 20+ years of market-leading security technology with highly skilled professionals who become an extension of in-house security team to mitigate threats before they can compromise business operations. GoSecure Titan® Managed Security Services pioneers the integration of endpoint, network, and email threat detection into a single Managed Extended Detection & Response (MXDR) service. Our GoSecure Titan® Platform offers superior visibility and protection, detecting more threats and reducing security costs with faster threat mitigation. GoSecure Professional Security Services provides a full portfolio of testing and assessment services to evaluate cybersecurity maturity, identify risks and gaps. We define a roadmap tailored to your situation, needs, and budget, improving security posture. Our Professional Services find issues, our Managed Services fix them, helping you thrive.

About

Cyber threat hunting is the process of proactively searching across networks and endpoints to identify threats that evade security controls. Using a combination of manual and machine assisted techniques, threat hunters search for indicators of compromise (IOCs) across an organisation’s IT environments. By hunting for evidence that a breach has occurred, threat hunting enables security teams to identify unknown threats and respond quickly and effectively to them before they cause damage and disruption. ThreatDetect™, Redscan’s outcome-focused Managed Detection and Response (MDR) service integrates the latest detection technologies and intelligence plus a team of cyber offensive security professionals to provide the hunting capability needed to proactively detect threats. Our experienced team of Red and Blue Team security professionals have a deep knowledge of offensive security and apply this knowledge to help better identify unknown threats.

About

USB Control & Lockdown Software to Block USB Devices Access and Lock USB Ports in Windows Systems. Centralized USB Device Management, Monitoring and Whitelisting to Protect Computers in a Network. USB Device Control is an important part of Endpoint Security Management and focuses in the protection of computer systems and data assets from threats posed by unauthorized USB device usage. Controlling USB devices access to endpoints is required to secure networks that control machinery or store sensitive information. - Centralized USB Device Management. - Secures Groups of Computer or Specific Computers. - Whitelists Specific Devices by Hardware ID and Blocks the rest. -Automatically apply Group 1 protection settings to unassigned clients. NEW! - Receives Alerts & Logs Device Connections in the Network Automatically. -Export Status and Alerts Reports to csv format (Comma-separated value)NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations looking to stay above the crowd, stop reacting and be in control. Companies looking to enter the continuous improvement process and optimize their investments. Through GoSecure Titan®'s Managed Security Services (which includes our Managed Extended Detection & Response (MXDR) Service) and our Professional Security Services, we are your ally to prevent breaches.

Audience

Organizations in need of a cyber threat protection solution

Audience

IT security teams

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Pricing

$20 per client/one-time
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

GoSecure
Founded: 2002
United States
www.gosecure.ai/

Company Information

Redscan
Founded: 2002
United Kingdom
www.redscan.com/services/managed-detection-and-response/cyber-threat-hunting/

Company Information

Advanced Systems International
Founded: 2004
Peru
www.usb-lock-rp.com

Alternatives

Alternatives

Alternatives

USBSecure Enterprise

USBSecure Enterprise

Lugrain Software
AccessPatrol

AccessPatrol

CurrentWare Inc.
SISA ProACT

SISA ProACT

SISA Information Security
USB Block

USB Block

NewSoftwares

Categories

Categories

Categories

Endpoint Detection and Response (EDR) Features

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Integrations

Amazon Web Services (AWS)
Axonius
Brinqa
Check Point CloudGuard
Cloudera
Cybersixgill
ESET Endpoint Security
IBM Cloud
Intelligent Management Center
Jit
LogPoint
RecruitPack
SAP Cloud Platform
Seeker
Symantec Advanced Threat Protection
Tenable One
Trellix Data Encryption
VMware Cloud

Integrations

Amazon Web Services (AWS)
Axonius
Brinqa
Check Point CloudGuard
Cloudera
Cybersixgill
ESET Endpoint Security
IBM Cloud
Intelligent Management Center
Jit
LogPoint
RecruitPack
SAP Cloud Platform
Seeker
Symantec Advanced Threat Protection
Tenable One
Trellix Data Encryption
VMware Cloud

Integrations

Amazon Web Services (AWS)
Axonius
Brinqa
Check Point CloudGuard
Cloudera
Cybersixgill
ESET Endpoint Security
IBM Cloud
Intelligent Management Center
Jit
LogPoint
RecruitPack
SAP Cloud Platform
Seeker
Symantec Advanced Threat Protection
Tenable One
Trellix Data Encryption
VMware Cloud
Claim GoSecure and update features and information
Claim GoSecure and update features and information
Claim Redscan ThreatDetect and update features and information
Claim Redscan ThreatDetect and update features and information
Claim USB-LOCK-RP and update features and information
Claim USB-LOCK-RP and update features and information