System administration
 » Security
 » » Access
Sections : System administration > Security > Access
Not rated by visitors

Get & buy Steel USB Sentry 2.0

Control and prevent usage of USB drives


Thank you for downloading Steel USB Sentry from our download portal.

Current files are located on the following IPs:

Outer mirror site one (

Outer mirror site two (

Note: We prefer to use WinZip, WinRar, WinAce, 7zip to extract zip, rar, 7z, ace files. For data iso files we recommend you use freeware Daemon Toos lite.

Note: All files listed on this site are tested by the ESET Smart Security. If you like to test this file by another security software we recommend you select some in our antivirus section.

Sponsored download:

Development of the Steel USB Sentry was probably finished, try the other options

FIPS Encryption Protection for Files, USB Sticks, USB Drives, CD-ROMs, DVDs and Endpoint Security securing your data and your clients...DeltaCrypt USB mobile data encryption protection is...decrypts outside the network without protection secures USB flash drives...Point Security controls and ensures that...only authorized mobile devices and drives are...that its sensitive data is protected at...

eScan Internet Security Suite with Cloud Security for SMB 14.x
...evolving threats to network security and the...on technology and networks as much as...substantial resources to defend against network handle the security of their network...specially designed comprehensive security solution to fulfill...console helps the network administrator set policies...productivity through web access control and application...levels of IT security to ensure business...Dashboard for better Security Management Endpoint Security...

Avira Endpoint Security
...Avira Endpoint Security will protect your...Avira Endpoint Security brings together the...This ensures your network is secure against...roll out your network security quickly...

Comodo Endpoint Security Manager 2.1 2.1
...Comodo Endpoint Security Manager centrally manages...automatic enforcement of security policy and...malware shield on endpoint machines by combining...beating endpoint security software from all...panoramic view and control over endpoint security...customization of CIS security policies on...that apply when devices connect from remote...

Best Network Security 3.3
...Best Network Security is the best...lot of network PC workstations located...workstations to change security settings or install...Best Network Security is intended for...workstations over your network as well as...and tweaks to control access to every...You can deny access to each individual...component of several Control Panel applets...Best Network Security supports over to restrict access to almost every...

Steel USB Sentry categories

portable storage control, data security, control portable, usb control, end point security, usb drives, endpoint security, ipod lock, endpointsecurity, network access control, block storage devices, usb security, usb lock

Steel USB Sentry permissions

SHAREWARE DISTRIBUTION. These additional terms apply to distribution of the unregistered shareware version of the SOFTWARE.

DISTRIBUTION. The following may distribute the unregistered shareware version of the SOFTWARE without further permission provided they convey a complete and unaltered shareware version of the SOFTWARE and provided they make no claim to ownership of the SOFTWARE:

- Private individuals charging no fees.

- Members of Association of Shareware Professionals (ASP) and other shareware associations.

- Other bona fide shareware distributors and directories including FTP and WWW sites, BBSs, user groups, mail-order disk vendors, CD-ROM publishers, file-distribution networks etc.

BUNDLING. In no case may the SOFTWARE be bundled with hardware or other non-shareware software without prior written permission from Steelsonic Technical Services.

VIRUSES. All distribution of the SOFTWARE is further restricted with regard to sources which also distribute virus source code and related virus construction/creation materials. It is unlawful to attach any virus to the SOFTWARE and the SOFTWARE may not be made available on any site, CD-ROM, or with any package which makes available or contains viruses, virus source code, virus construction programs, or virus creation material.

TRANSFERABILITY. Permission to distribute the SOFTWARE is not transferable, assignable, saleable or franchisable. Each entity wishing to distribute the package must independently satisfy the terms of the distribution license.

REVOKATION. Steelsonic Technical Services may revoke any distribution permissions granted here, by notifying you in writing. All rights not expressly granted here are reserved to Steelsonic Technical Services.