The internal computer will restrict the reading of external memory devices by convenient setting and generate an “encrypted flash drive” with specific conditions. Only specific computer environment and personnel can read and write the data of the flash drive.
uSAFE can effectively avoid unknown data or program placement to prevent viruses from intruding the internal computers of the enterprise or the use of people with bad intentions when the flash drive is missing. It also secures the safety of the enterprise’s internal devices and data while checking the data sharing process.
Flash drive virusThe verification rules of the “encrypted flash drive” can be configured based on the demand: account/password, PIN code, key (registering the editor value), specific file assignment, domain verification.
Diversified rule setting enables those qualified to use the encrypted flash drive. Single or various verification methods can be selected freely.
Advanced setting of read-only or read-write functions
uSAFE can effectively prevent USB shuttle attacks and data leaks, which traditional antivirus software is unable to defend against human error and insider threats.
The computer can be configured not to read any external storage device but only the encrypted flash drive to manage the use of internal devices effectively.
If the validation of the encrypted flash drive failed repeatedly, the flash drive will be locked to prevent virus intrusion or breach of important data.
When using a nonconforming flash drive, the individual warning message will be displayed, the device will be removed automatically, and the use record will be saved in the database.
The record information includes time, computer name, domain, account, verification information, USB serial number, serial number of nonconforming token and warning message.
Documents waiting for process can be seen clearly at a glance to approve and follow up document conveniently.
The key rules can be managed autonomously and the rules of (burned) encrypted flash drives can be configured repeatedly based on the policy. Also, the enterprise can adjust the policy freely.
Free from agent installation. The access permissions of offline or external computer can also be configured via password or other verification method.
Available to configure the whitelist of specific devices.
The user can access the system without connecting to the internet and there is no need to establish the server and database.
The wizard setting mode provides fast and convenient management platform.
The exempting from encryption/decryption may result in the risk of file damage and inconvenient usage.
The system generates and deploys the setup file for the IT management personnel to easily deploy the internal computer with convenient management and usage.
Web-Based portal for searching: IT manager can conveniently monitor the status.
Comprehensive Search: Block records, uSAFE drive saving records/ verifying records and other saving records to exceptional drives, and white-list records.
Above Windows 7
Above 2008 R2
Above Windows 7
Above 2008 R2
Above Windows XP
Above 2008 R2
Taoyuan Metro
Young Optics
Motion Technology Electric & Machinery
Frank & Associates Plastic Co. Ltd.
Laser Tek
LuxNet Corporation
Taiwan Industry Service
Taipei Port Container Terminal Crop.
Chiang-Chin Foundation of Nursing Perspectives