DEKSI USB Security Icon

DEKSI USB Security Full Description

Allows you to block unauthorized USB devices from any PC or your entire network.

Full Description

Version:
2.8.1
Released:
31, July 2013
License:
Shareware
Size:
7964 Kb
Price:
$250 to buy
Rating:
1
10

0

Product Info

DEKSI USB Security allows you to block unauthorized USB devices from any PC or your entire network. DEKSI USB Security will prevent unauthorized USB devices from being connected to your computer. DEKSI USB Security blocks unauthorized USB devices such as memory card readers and USB flash drives, removable storage and USB hard disks while allowing devices such as keyboards, mice and printers to be used as they would normally be. DEKSI USB Security is effective at small offices or in corporations with very large networks. DEKSI USB Security offers centralized deployment and management, and DEKSI USB Security is essential for enforcing security policies on removable storage devices, and it helps control file transfers as well as prevents infections from viruses that can bring your network operations to a halt. Blocking unauthorized USB devices is a small fraction of what DEKSI USB Security offers. DEKSI USB Security makes it possible to white-list USB devices that are considered safe such as printers, scanners, keyboards and mice, as well as any other devices that are allowed by the system administrator or network administrator. To allow access to removable storage devices, you can assign passwords specifically to them. If the device is connected to a computer running DEKSI USB Security, it can be used if the correct password is used. DEKSI USB Security operates completely in the background, and is undetectable to computer users. There are no pop-up windows and warning messages unless you want them to be configured that way. Running without being visible, DEKSI USB Security logs all attempts to connect authorized and disallowed USB devices, allowing system administrators to perform comprehensive audits of DEKSI USB Security whenever they want to check to make sure their operations are safe and secure. Now with encryption!

Requirements
512MB RAM

Please contact DEKSI USB Security publisher, DEK Software International if you have questions or issues regarding this product.
ESET NOD32 Antivirus 5.0 scan report
Scanned files: 1 Threats detected: 0 Time: 0s
Clean and Safe Certified
Download version 2.8
was tested on www.softarea51.com
with ESET NOD32 Antivirus
on 7, July 2013
Kaspersky Anti-Virus 2013 scan report
Scanned files: 66 Threats detected: 0 Time: 4s
Clean and Safe Certified
Download version 2.8
was tested on www.softarea51.com
with Kaspersky Anti-Virus
on 7, July 2013
Awful
Poor
Average
Good
Excelent
 
Share DEKSI USB Security Review, Block unauthorized USB devices from any p.c. Page  Share
Page URL: 
Using a crack or a pirated serial or key generator to activate DEKSI USB Security full version without buying a license key is against the law.

Exclusive Giveaway for Softarea51.com users
Featured downloads
Google Talk Review Google Talk is a simple and free way to talk with and send instant messages to your friends.
Adobe Flash Player Review Flash Player is a cross-platform browser plug-in that delivers breakthrough Web experiences to over 98% of Internet users
Ad-Aware 2008 Free Review The bottom line: Ad-Aware is your best option for keeping spyware and adware under control on your PC
Related downloads
Computer Lock Up Computer Lock Up
Lock your PC when leaving it and prevent unauthorized access! Set the unlock password that cannot be bypassed in safe mode or ignored by a user with administrative rights. The smart software locks keyboard shortcuts, mouse, CD/DVD drives and screen.
Pdf Locker Pdf Locker
Pdf Locker software locks batch pdf files with user password security and owner restrictions. Tool instantly set pdf open password and disallow pdf editing, printing & content copying by setting pdf owner permission password.
DeviceLock DeviceLock
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, ZIPs, Bluetooth, etc.) on a local computer.
MyUSBOnly MyUSBOnly
Lock the Bad Guys out of your USB ports with MyUSBOnly; Endpoint security solution MyUSBOnly prevents unauthorized access to USB devices and prevent sensitive data from leaking out and secure your files. Syslog entries for copied files/folders.
ID Devices Lock ID Devices Lock
ID Devices Lock ensures your data safety by preventing it from being stolen from your personal files or folders.
The Lock The Lock
Provides user audit, monitoring, access, Internet and system security for any computer running Windows XP or later. Meets requirements outlined in NISPOM, Chapter 8, as well as system security and auditing required by Sarbanes-Oxley and HIPPA.
Lock PDF Lock PDF
Easy yet powerful Lock PDF program to lock pdf files & lock pdf documents. Now users can use Lock PDF program to lock pdf from printing, lock pdf from copying, lock pdf from editing. Lock PDF is the most suitable tool to secure pdf, protect pdf.
Protect Adobe Pdf with Password Protect Adobe Pdf with Password
Pdf Encryption is an advance utility supports encryption of 40-128 bit RC4 and 128 bit AES level security. It can disable pdf printing, block pdf editing, disallows pdf content copying, deny form filling, signing, commenting and page extraction etc.
GFI EndPointSecurity GFI EndPointSecurity
Control use of portable storage devices, such as USB drives, iPods and PDAs on your network, preventing users from taking confidential data or introducing malware to your network. Includes BitLocker To Go support. Freeware version is also available!
Related Press Releases
Advanced Drive Protector lets you protect, hide and lock your local, network, Floppy, CD DVD and USB drives and disable the AutoRun feature for them to ensure your security and privacy
Advanced Drive Protector -http://www.advanceddriveprot ector.comWho needs disk drive security softwareAdvanced Drive Protector is intended for PC users who want to protect, hide and locktheir local, network, Floppy and USB drives, and disable the AutoRun feature forthem to ensure both security and privacy. This software lets you apply a range ofsecurity options to individual drives ranging from...
G-Lock Software announces the release of anti-spam software G-Lock SpamCombat 2 65 for Windows 95 98 ME NT 2000
G-Lock SpamCombat is probably the most popular and effectivespam fighting software from an independent software developer. After all, Alexaranks www.glocksoft.com among top 100000 websites on the Internet and Google searchfor G-Lock SpamCombat produces over 25000 results, which is three times as much assome of the commercially grown anti-spam solutions.The reason for G-Lock SpamCombat...
Comvigo, Inc announces the release of IM Lock Professional, a desktop security software for business, home, and education
Media ReleaseContact:Comvigo, Inc.6800 Villa Del Costa Dr.Orlando, FL 32821Phone: 213-804-5172Fax: 240-255-4093Email: sales@comvigo.comNovember 15, 2005FOR IMMEDIATE RELEASE(Orlando, FL) Comvigo, Inc. announces the release of IM Lock Professional, a desktopsecurity software for business, home, and education. Did you know that Americans waste more than two hours a day at work, costingcompanies...
Lock My PC 4 2 - Computer lock is now more powerful and more secure
October, 2006 FSPro Labs Releases Lock My PC 4.2, a newversion of its security utility, designed to restrict access to a computer. Lock MyPC locks the computer screen, keyboard, mouse and all CD/DVD ROM doors by apassword. Lock My PC locks the computer at Windows startup, or when the computer is idle, oron the user request. When the computer is locked, it is impossible to access itwithout...
Lock My PC 4 4 - Computer lock is now more powerful and more secure
June, 2007 FSPro Labs Releases Lock My PC 4.4, a new versionof its security utility, designed to restrict access to a computer. Lock My PC locksthe computer screen, keyboard, mouse and all CD/DVD ROM doors by a password. Lock My PC locks the computer at Windows startup, or when the computer is idle, oron the user request. When the computer is locked, it is impossible to access itwithout...
Lock My PC 4 - Computer lock is now more powerful and more secure
October, 2006 FSPro Labs Releases Lock My PC 4.0, a newversion of its security utility, designed to restrict access to a computer. Lock MyPC locks the computer screen, keyboard, mouse and all CD/DVD ROM doors by apassword. Lock My PC locks the computer at Windows startup, or when the computer is idle, oron the user request. When the computer is locked, it is impossible to access itwithout...
Related software and technology conferences
CFP: Nano-Network 2008
**************** Nano-Net 2008 ********************* CALL FOR PAPERS 3rd International Conference on Nano-Networks Boston, USA, Sept 15-17, 2008 http://www.nanonets.org Sponsors: Create-Net, ICST, EU (IST-FET), ENIAC Industry Sponsor: STMicroelectronics...
SANS Network Security 2008
SANS Network Security 2008 returns to Caesars Palace in Las Vegas, September 28-October 6. Register by Wednesday, August 20, and save $350 on tuition fees. Choose from over 40 courses including: NEW! Security 560 : Network Penetration Testing and Ethical Hacking Security 504 : Hacker Techniques, Exploits & Incident Handling Security 401 : SANS Security Essentials Bootcamp Style...
Cyber Defense & Network Security
takes place just as the White House puts the finishing touches on the 2013 cybersecurity executive order and lays out the strategies and initiatives for the upcoming decade. Speakers from CYBERCOM, the Air Force, and Marine Corps will all share the latest cyber challenges and opportunities, while speakers from the Department of Homeland Security, National Security Agency and NATO will present...
Network Enabled Operations Summit
IDGA Network Enabled Operations Summit will emphasize the demands of the operator and how to rapidly deliver capabilities that provide a decisive advantage. US and Coalition forces must be agile enough to fight and win regardless of terrain, enemy force structure and tactics, or operational limitations. An agile force relies on battlefield commanders’ access to current, accurate and reliable...