Short Description: Working in the Cloud, Action1 Block USB Devices discovers all of your endpoints in seconds and you can query your entire network of workstations to immediately see what USB devices, SD cards and other removable media is being used and where.
Long Description 1: Action1 Block USB Devices is a free USB removable media real-time monitoring tool that is entirely SaaS, running in your web browser (no management tools to install) and it has zero cost for basic functionality. Working in the Cloud, Action1 discovers all of your endpoints in seconds and you can query your entire network of workstations to immediately see what USB devices, SD cards and other removable media is being used and where.
Long Description 2: Action1 Block USB Devices is a free USB removable media real-time monitoring tool that is entirely SaaS, running in your web browser (no management tools to install) and it has zero cost for basic functionality. Working in the Cloud, Action1 discovers all of your endpoints in seconds and you can query your entire network of workstations to immediately see what USB devices, SD cards and other removable media is being used and where. Action1 Block USB Devices is a part of Action1 Endpoint Security Platform.
Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints in seconds and you can query your entire network in plain English.
Action1 Endpoint Security Platform helps IT departments to keep their endpoints secure and corporate data safe by providing up-to-date information on all endpoints in their network:
- Which workstations have Dropbox installed or IIS running?
- List of endpoints exposing file shares to ransomware.
- Show endpoints with remote registry service enabled.
- List of workstations having Guest account enabled.
- Who copies sensitive corporate data to external USB media?
- Check if 'ransomware.exe' or 'putty.exe' processes are running on any of your endpoints.
- Users storing sensitive files locally on unsecured laptops.
- Systems at risk because of outdated firmware.
|