USB Security Analyzer Detects and Responds to Potential Threats

Use USB security software with real-time alerts to help automatically protect important business data

USB security software can detect unauthorized usage

USB devices are readily available and often go unmonitored, potentially serving as a blind spot in a network’s security. Due to this, these devices present a risk of data loss and breaches since they make potentially insecure transfers of data easy. 

When you install the SolarWinds® Security Event Manager (SEM) agent, you will also have the option to install USB Defender. The USB Defender Local Policy connector is an endpoint USB security technology designed to protect your data against potential USB threats. 

USB Defender enables a SEM agent to monitor the usage of USB devices, including phones, cameras, and mass storage devices on your domain controller server, with the ability to send real-time notifications when USB drivers are installed. USB Defender is also built with the ability to manually and automatically send commands to detach offending devices. 

Respond to USB security threats with device control/lockdown

With SolarWinds SEM, you can enhance your USB port security by using preset, out-of-the-box active response rules or creating your own rules. Active response rules are designed to block USB devices when USB access poses a threat—for instance, if deployed by a blacklisted user account. Using USB Defender, you can set active response rules to automatically check if a device belongs to the whitelisted, user-defined group of authorized USB devices. If an unauthorized USB is detected, you can execute preventive measures like automatically detaching the USB device, killing processes by ID or name, blocking IP addresses, and shutting down machines.

USB Defender also writes events related to USB devices attached to SEM agents by default. These events can be parsed for other field information to create more complex blacklist comparisons in addition to more restricted policies for which types of devices should be allowed in the USB Defender Local Policy whitelist users and devices file.

Easily run reports with a USB activity monitor

Monitoring a network for USB threats is a requirement for a number of compliance regulations, including PCI DSS. To help demonstrate compliance, SEM offers both built-in and customizable report templates designed for easier compliance reporting. Run reports on key metrics by using the USB analyzer file auditing feature in SEM to monitor activity of USB devices to track suspicious user activity, like unwarranted data transfer from an authorized USB port to better understand whether users are copying unauthorized files to external devices. The USB activity monitor and compliance reporting tool in SEM can also help admins identify unauthorized applications launched from USB devices by auditing USB file activities.

Get More on USB Security Software
Do you find yourself asking…

USB security software provides threat detection and prevention

Security Event Manager

  • Demonstrate compliance and prove proper USB usage
  • Stay proactive with automatic responses to USB security threats
  • Help ensure that USB devices don’t threaten business security

Starts at

Subscription and Perpetual Licensing options available

EMAIL LINK TO TRIALFully functional for 30 days
Let’s talk it over.
Contact our team. Anytime.