Monitor unauthorized USB memory stick activity and prevent data theft
MAHARASHTRA, India -- USB CopyNotify! is a network security software that raises an immediate alert when a portable USB storage device such as a USB memory stick/thumb drive/pen drive/Flash Drive is used on any computer on the network. This real time alert could thus prevent the unauthorized copying of confidential data on the USB drive and reduce the possibility of data theft.
CygNET Systems Pvt. Ltd. has released USB CopyNotify!, a specialized windows network security software that raises a notification as soon as a USB storage drive is used on any computer on the network. By receiving immediate notifications when a USB drive is being plugged into any computer, prevention of unauthorized copying of confidential information is possible. The software also monitors data copy operations on USB drives, and creates a notification and a log entry containing the name of each file that is being copied. Notifications of the shut down or uninstall of the USB CopyNotify! program itself are also generated.
In a simple to install procedure, the Server component of the program is loaded on the computer that will be used to recieve all alerts of USB drive activity on the network while the Client component of the program is loaded on each computer that needs be monitored for USB drive activity. Each time a USB drive is added or removed from any monitored computer, the server component receives real time notifications of the same. In addition, the program also maintains an activity log that can be printed or used for detailed reporting at a later stage.
With its capability to provide real time notifications of portable USB drive activity on the network, USB CopyNotify! is best suited for business owners who want to make sure that unauthorized individuals cannot copy private information from thier computer network or for administrators who want to audit and monitor the USB ports on all of the computers on the LAN. Future enhancements for USB CopyNotify! include SMS notifications, support for Linux and Mac OSX computers, and detection of Wifi, BlueTooth, and IEEE 1394 devices.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.