USB-LOCK-RPAdvanced Systems International
|
||||||
Related Products
|
||||||
About
Tether gives IT teams full control over corporate devices worldwide. It provides device tracking, RemoteKill® data/device lockdown, full disk encryption management, and geofencing. Designed by cybersecurity experts, Tether is secure, standards-based, and proven through 20+ years of real-world use.
|
About
USB Control & Lockdown Software to Block USB Devices Access and Lock USB Ports in Windows Systems. Centralized USB Device Management, Monitoring and Whitelisting to Protect Computers in a Network. USB Device Control is an important part of Endpoint Security Management and focuses in the protection of computer systems and data assets from threats posed by unauthorized USB device usage. Controlling USB devices access to endpoints is required to secure networks that control machinery or store sensitive information.
- Centralized USB Device Management.
- Secures Groups of Computer or Specific Computers.
- Whitelists Specific Devices by Hardware ID and Blocks the rest.
-Automatically apply Group 1 protection settings to unassigned clients. NEW!
- Receives Alerts & Logs Device Connections in the Network Automatically.
-Export Status and Alerts Reports to csv format (Comma-separated value)NEW!
-Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
MSPs, IT Directors, IT Managers, Cybersecurity, CISO
|
Audience
IT security teams
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and VideosNo images available
|
Screenshots and Videos |
|||||
Pricing
$29/device/year
Free Version
Free Trial
|
Pricing
$20 per client/one-time
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationTether Security
Founded: 2006
United States
tethersecurity.com
|
Company InformationAdvanced Systems International
Founded: 2004
Peru
www.usb-lock-rp.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Mobile Device Management (MDM) Features
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
|
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
|
|||||
Integrations
Google Workspace
Microsoft Azure
Microsoft Entra
Okta
|
||||||
|
|
|