Check out the GFI EndPointSecurity http://www.gfi.com. Very affordable.
Very flexible deployment scenarios too. 

-----Original Message-----
From: Stephen Hefner [mailto:[EMAIL PROTECTED] 
Sent: Thursday, June 15, 2006 2:11 AM
To: 'Desai, Manish'; 'Ken S'; [email protected];
[email protected]
Subject: RE: Controlling specific USB devices on Windows XP

The only question that comes to mind is do they (or any other product)
prevent users from putting in unauthorized USB thumb drives. If you want
to
prevent data from leaving or programs, bugs etc from coming in and still
have a need to keep the USB enabled; can you control it? 

-----Original Message-----
From: Desai, Manish [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, June 14, 2006 7:05 AM
To: Ken S; [email protected]; [email protected]
Subject: RE: Controlling specific USB devices on Windows XP

Ken, There are other commercial packages like Reflex Disknet pro and
Control Guards's Endpoint access manager. I have evaulated both. Both
these are good. One feature that's stands out in Reflex Disknet pro is
you encrypt USB Memory stick and also allocate Mem stick for corp and
private purposes such that policy will dictate encryption for crop usage
and not for private use. Yes they support , adminster and manage
BIOMETRIC USB storages.

Control guard is better management GUI and can approve the USB based on
serial no , vendor , make model etc..

Hope that helps ... Cheers


Manish Desai CISSP, CISSP-ISSMP , CISA, CISM

-----Original Message-----
From: Ken S [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, June 13, 2006 5:06 PM
To: [email protected]; [email protected]
Subject: Controlling specific USB devices on Windows XP

I am investigating the possibility of locking down Windows computers to
only allow specific USB devices to attach.  I'm considering the mtrust
product from www.m-systems.com, which the marketing materials say can
force users to only use their particular USB storage devices (or those
that they OEM to others, like Kingston, Verbatim, etc.).

Does anyone have experience with this package?  If so, what are the pros
and cons?

Also, are there other solutions are out there that can ensure only
specific USB storage devices are allowed on a system?

Is there anything specific for biometric USB storage?

Any comments on the effectiveness of such software?

Thanks,

Ken S

------------------------------------------------------------------------
---
------------------------------------------------------------------------
---


------------------------------------------------------------------------
---
------------------------------------------------------------------------
---




------------------------------------------------------------------------
---
------------------------------------------------------------------------
---


-----------------------------------------------------------------
KEYSYS INC

This communication is confidential and intended only for the use
of the individual(s) to whom it is addressed.  The information
contained in it may be the subject of professional privilege or
protected from disclosure for other reasons.  If you are not the
intended addressee, please delete it, notify the sender, and do
not disclose or reproduce any part of it without specific
consent.

This mail was content checked for malicious code and viruses by
MailSecurity. MailSecurity provides email content checking,
exploit detection and anti-virus for Exchange. Spam, viruses,
dangerous attachments & offensive content are removed
automatically. Key features include:

. Multiple virus engines;
. Email content & attachment checking;
. Exploit shield - email intrusion detection & defence;
. Email threats engine - analyses & defuses HTML scripts, .exe
files & more.

In addition to MailSecurity, GFI also produces the FAXmaker fax
server & LANguard network security product ranges. For more
information on our products, please visit http://www.keysys.com.

This disclaimer was sent by Mail essentials for Exchange/SMTP 
-----------------------------------------------------------------


---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to