VerSec enables fine grained control and auditing of the devices that can be used on endpoint computers.
Administrators, for example, can control the use of external storage devices (including but not limited to USB drives, iPods, SD and MMC card readers, floppy and ZIP drives and MP3 Players), optical media (CD-RW, DVD+/-RW, DVD-R/W, DVD+-/RW), as well as PDA’s, modems, network adaptors (including Wi-Fi) and Bluetooth radios providing policy based restrictions on access to these devices by device class and/or hardware id (unique to device make and model) and serial number.
RIM BlackBerry’s, Windows Mobile PDAs and SmartPhones and Pocket PC’s can be controlled and audited via their unique PINs and serial numbers and authorized to individual users. Phones and PDA’s that are not authorized to a particular user who attempts to connected them to and sync them with a secured machine will automatically be ejected..
USB storage devices that have unique serial numbers (such as Kingston’s DataTraveler Secure) can be controlled and audited via this unique serial number and authoirzied to individual users. Storage devices that are not authorized to a particular user who attempts to connect them to a secured machine will automatically be ejected.
VerSec features such as Override codes and Away policies allow the security policy to automatically adapt to the endpoints current environment ensuring a high degree of business continuity and enforced security.
The VerSec Management Console includes a FREE clientless tool to scan selected computers and report back on the devices that are and have been installed! Use this tool to investigate and determine the risk your organisations faces from devices such as Removable Media, Portable Storage Devices, WiFi, Modems, Bluetooth etc.