Network & comms
 » Network monitoring
 » » Network services monitoring
 System administration
 » Security
 » » Monitoring software
Sections : Network & comms > Network monitoring > Network services monitoring | System administration > Security > Monitoring software
Poor visitors rating
Click to RATE : OneTwoThreeFourFive
Buy Free USB Data Leakage Protection Software download

USB Data Leakage Protection Software 2.0.1.5

USB drive monitoring software prevent unauthorized access of USB device in LAN

 

Advertisement

USB Data Leakage Protection Software 2.0.1.5 facilities

Vendor
Vendor`s Webhttp://www.drpusoftware.com
Data theft protection webshot
OSWindows 98, Windows 2000, Windows XP, Windows Vista
LimitationsInstall and Uninstall
Actualizedmore than year ago
Downloads877
LocalizedEnglish
LicenseFree to try
SnapshotUSB Data Leakage Protection Software snapshot
Snapshot of USB Data Leakage Protection Software

Use this security logo:

100% SAFE logo

USB Data Leakage Protection Software manufacturer description

USB storage device data protection software is real time USB activities monitoring tool that prevent network from unauthorized use of any external removable storage media. Monitoring tool record connected device hardware information, storage capacity record connection / removal date and time with machine name, IP and domain name in log file. USB activities analyzer tool provides sound alert option when mass media is connected or release from any client machine connected from local area network. Data protection tool records all data transfer from USB drive and save it with performed file operation (cut / copy / paste). Utility support all branded storage media including pen drive, memory stick, multimedia card, memory card, flash card, iPods and other similar storage media. Monitoring software analyze device status even machine is not connected to server or network cable is unplugged. USB analyzer application facilitate administrator to block (read / write) or modify (only readable) access permission of any client machine USB port. USB data leakage protection tool is powerful surveillance utility to monitor multiple USB derives simultaneously in LAN and available with inbuilt step by step help procedure option.
Software Features:
* Alert by playing sound when any USB drive is connect or release.
* Enable / disable any client machine USB port in LAN.
* Monitor each connected USB storage media activities in real time.
* Record each and every performed operation on media devices.
* No additional hardware or software is required to be installed or run.
* Capable to analyze multiple systems activities simultaneously in network domain.
* Save connection / removal date, time with client’s machine information.
* Store and analyze transferred data between USB drive and computer.
* Support all branded USB storage devices including Kingston, Samsung, and Sony etc.
free download USB Data Leakage Protection Software 2.0.1.5QUICK DOWNLOAD
Free download USB Data Leakage Protection Software 2.0.1.5

Advertisement

USB Data Leakage Protection Software video tutorials

Tutorial not found. Let know us about any useful video tutorial.

USB Data Leakage Protection Software categories

software, steal, lan, network, leakage, windows, analyze, theft, protect, usb, record, permission, security, device, block, log, folders, move, data, tool, traffic, display, view, protection, file, monitor, port, transfer, store, information, storage

Given stickers for USB Data Leakage Protection Software & download buttons

NOTE: move cursor over buttons to get html sources.
Clean award
DownloadAtlas.com guarantees that USB Data Leakage Protection Software was tested by antivirus program and is absolutely clean, which means it does not contain any form of malware, including computer viruses, adware, trojans, spyware, rootkits, badware and other malicious and unwanted software.
Report view
index.html - CLEAN
Get from DownaloadAtlas.com
Get from DownaloadAtlas.com
Do you like USB Data Leakage Protection Software ? Move mouse cursor over the buttons and just copy one of those links, paste the code you copied right where you want on your blog or website.

USB Data Leakage Protection Software permissions

The LICENCOR grants you non-transferable, non-exclusive, license to install and use the Software conditional upon the following limitations:- You may: 1) Use or install one copy of the software on a single computer relating to this License Agreement 2) Copy the software onto the hard disk of the computer and retain the original for archival purposes only. You may not: 1) Use the Software for purposes other than as authorized in this License Agreement or knowingly permit anyone else to do so 2) Disclose any part of the Product to anyone or make any part of the Software, documentation or other material 3) Install the software on the network 4) Sell, transfer, sub-license, lend, rent, lease or give the product to any third party. 5) Reverse engineer, de-compile, disassemble, modify, translate, and attempt to discover the source code of the Software or permit others to do so.

End user agreement for USB Data Leakage Protection Software

End User License Agreement DRPU Software (TM) Copyright(c) 2008, DRPU Software. The entire risk of the use or the result of the use of this software and documentation remains with the user. No part of the Software may be redistributed and documentation may be reproduced by any means, electronic or mechanical, for any purpose, except as expressed in the End User License Agreement. You may: 1) Use or install one copy of the software on a single computer relating to this License Agreement 2) Copy the software onto the hard disk of the computer and retain the original for archival purposes only. You may not: 1) Use the Software for purposes other than as authorized in this License Agreement or knowingly permit anyone else to do so 2) Disclose any part of the Product to anyone or make any part of the Software, documentation or other material 3) Install the software on the network 4) Sell, transfer, sub-license, lend, rent, lease or give the product to any third party. 5) Reverse engineer, de-compile, disassemble, modify, translate, and attempt to discover the source code of the Software or permit others to do so.