Take advantage of our risk-free "try before you buy" options. When you're satisfied with the repaired results, you can proceed to purchase.
With SecureGuard, part of the SecureData Remote Management Console suite, you can block access to all mass storage devices or set privileges to allow devices by PID, VID or serial number. You can set global policy and set individual policy by user. You can even block HID devices, like cameras and keyboards, all from the same console used to manage USB devices.
The SecureGuard USB software application is an easy-to-use Data Loss Prevention (DLP) service that is managed via the SecureData Remote Management Console/Services—a subscription-based SaaS. It helps companies avoid painful and costly data leaks by enforcing the use of only authorized USB devices on company-wide computers that have USB ports. It allows Admins/IT Managers to safeguard sensitive information by whitelisting authorized removable storage media and blacklisting prohibited USB pluggable devices to prevent data breaches or virus and malware uploads. Admins/IT Managers have control over device authorization through the cloud-based Remote Management console.
It safeguards sensitive information by whitelisting and blacklisting USB devices for computers with the program installed, including:
When an unauthorized device is inserted into a USB port, the program blocks the user from accessing all computer functions until the device is removed.
How it works…
Login and Management
Downloadable after purchase and easy installation on all computers. An Admin must authenticate during installation of SecureGuard USB using the same credentials from their Remote Management Account. Once the program is installed, the target computer will automatically appear in the Remote Management Account for convenient and easy management.
Remote Management
Remote Management (RM) allows Admin to manage SecureGuard USB through the internet from a remote computer. It is a user-friendly interface that allows remote control and management of the program on all computers with SecureGuard USB installed on them. RM provides Admin with a console for easy management and accessing details.
RM Console
Through RM, Admin can whitelist or blacklist devices by Vendor ID, Product ID, Serial Number or Revision. Only devices allowed by Admin can be used on a host computer. Admin has control over allowed devices and can view detailed reports of port activity on individual computers. RM features a Create New Record field to easily add devices to the whitelist or blacklist. With one click, Admin can easily remove whitelisted devices, which will go into effect within seconds. Admin can also customize authorized drives to access files in Read Only mode.
Access Log
The Report feature tracks all uses of an external drive on an individual computer, whether it is blacklisted or whitelisted. The access log shows detailed USB data, including date and time used, device type, identification numbers and if the program blocked or allowed the device. Note: data stored on external devices is not visible to Admin.
SecureGuard USB protects organizations from data breaches, data loss, and unauthorized users from
accessing information. SecureGuard USB:
Admin has access to Remote Management, a user-friendly platform that allows control over computers
across the organization via a cloud-based software. Using Remote Management, Admin can:
Standard License - Intended for small businesses and/or individuals.
Standard license limitations:
Business License - Intended for small or medium businesses.
SecureGuard USB by SecureData uses DataLock® RM and DataLock® DLP technologies licensed from ClevX, LLC. U.S. Patent. clevx.com/patents
Trusted by 3,000+ happy Customers & Organizations.
As an alternative to downloadable utility, you can get instant results with our breakthrough online file repair. With no software to download and install it's easier and faster than ever.
Repair your corrupt files by uploading them to our cloud-based platform. After upload, processing typically takes from a few seconds to a minute, after which the user is offered free and paid options for downloading the results of the recovery.
Dozens of file formats are supported, including Microsoft Word documents, Excel spreadsheets, PowerPoint presentations, Access databases, JPEG, GIF, TIFF, BMP, PNG and RAW images.
Our data repair experts can solve the most difficult data corruption situations. Corrupted files are taken apart bit by bit, and recoverable data is reconstructed into a new file.
To learn more please submit this form and one of our technicians will contact you to go over the process.