The Check Point Media Encryption Software Blade provides centrally-enforceable encryption of removable storage media such as USB flash drives, backup hard drives, CDs and DVDs, for maximum data protection. Educating users on when to share and not share corporate data via UserCheck prevents future data sharing mistakes. Port control enables management of all endpoint ports, plus centralized logging of port activity for auditing and compliance.
Keeping sensitive files on an external hard disk has other advantages. When traveling, there are places that a relatively small 2.5 inch external hard disk can go that a laptop computer can not. And, although they are larger than USB flash drives, an external 2.5 inch hard drive is probably small enough that it never has to leave your side. usb access control This doesn’t really help; now you’re requireing people to know a password for their firmware – something most people don’t have as it is. Heck, they don’t even have a password for the users on the desktop operating system (i.e. windows). This doesn’t make the problem with increasing the installation complexity go away; it just changes it.
The security of encrypted flash drives is constantly tested by individual hackers as well as professional security firms. At times (as in January 2010) data on flash drives that have been positioned as secure were found usb access control 14 to have a bug that potentially could give access to data without knowledge of the correct password. Keyboard-spoofing is not the most sophisticated type of attack possible through a malicious USB stick however.