Password-based, easy to use and very efficient.
Choose from six Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console. Encrypt, manage and secure USB storage devices by safeguarding data in transit. Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. The Media Encryption Software Blade is integrated into the Software Blade Architecture. Integrated into Check Point Software Blade Architecture Email alerts can be configured to notify administrators about specific events. Access to endpoint ports such as USB, FireWire, Bluetooth, WiFi, printer, etc., can be centrally managed.Īdministrators can store device activity and file movement logs to a central database, enabling centralized auditing and reporting for easy compliance. Devices can be defined at a granular level by type, brand, size or ID, for maximum data protection. The device access settings control access to removable media, devices and ports. Kingstons DataTraveler Vault Privacy 3.0 USB Flash drive provides affordable business-grade security with 256-bit AES hardware-based encryption in XTS. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.
SanDisk has flash drives for that price that include an app named SecureAccess, which will run on all pcs, without installation or Admin rights requirements. Then it becomes read only, unless you pay. The Media Encryption Software Blade is centrally managed by the Endpoint Policy Management Software Blade, enabling central policy administration, enforcement and logging from a single, user-friendly console. Its free to download, and free to try for 30 days.
Use Check Point UserCheck™ to actively engage and educate users as they access portable media to identify potential policy incidents as they occur and remediate them immediately.
Should any changes be detected, the device will need to be re-authorized before it can be used in the protected environment again.Įngage and Educate Users with Integrated Check Point UserCheck Removable media enforcement maximizes data security by placing a unique digital signature on each encrypted device, informing the user of any unauthorized changes made to stored information. Unique to Check Point, users can securely access encrypted media from unmanaged computers, with no client installation. The centralized endpoint security manager allows administrators to set and enforce encryption policy for removable media and devices using algorithms such as AES 256-bit, for maximum data protection. Set Encryption from Centralized Security Management