Average Ratings 17 Ratings
Average Ratings 1 Rating
Description
Comprehensive cybersecurity and patch automation for growing businesses
Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure.
Key Benefits:
* Remote Management with online management console
* Device Protection with next-gen antivirus
* Data Protection with Firewall, Ransomware Shield, USB Protection, Password Protection
* Online Security and Privacy with VPN, Web Shield, end Web Control
* Patch Management
Description
USB Control & Lockdown Software to Block USB devices Access and Lock USB Ports within Windows Systems. Centralized USB Device Management, Monitoring, and Whitelisting to Protect Computers within a Network. Endpoint Security Management's USB Device Control program is an important component of Endpoint Security Management. It focuses on protecting computer systems and data assets against threats from unauthorized USB device use. To protect networks that store sensitive information or control machinery, it is necessary to control USB device access to endpoints.
Latest version v12.968 (released: September 26, 2021
- Centralized USB Device Management
- Secures Computers in Groups or Specific Computers.
- Whitelists specific devices by Hardware ID and blocks the rest
-Automatically apply Group 1 protection settings to unassigned clients. NEW!
-Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW
-Receives alerts & logs USB device connections in the network.
-Exports Status and Alerts Reports to csv format (Comma-separated value)
- Presents Full Screen Locking on Blocking Devices (includes company logo).
- Monitors and Encrypts File Transfers From Endpoints to USB.
API Access
Has API
API Access
Has API
Integrations
Microsoft SharePoint
Pricing Details
$39.99/year/user
Free Trial
Free Version
Pricing Details
$20 per client/one-time
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Avast Business
Founded
1988
Country
Czech Republic
Website
www.avast.com/business/products/ultimate
Vendor Details
Company Name
Advanced Systems International
Founded
2004
Country
Peru
Website
www.usb-lock-rp.com
Product Features
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Product Features
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting