Usb Security
Browse 117 usb security tools
FEATURED
Automated CrowdStrike EDR deployment & mgmt platform for macOS & Windows devices
Automated CrowdStrike EDR deployment & mgmt platform for macOS & Windows devices
Host-based security sensor for OT endpoints with threat prevention capabilities
Host-based security sensor for OT endpoints with threat prevention capabilities
USB-based malware scanner for air-gapped OT/ICS devices without installation
USB-based malware scanner for air-gapped OT/ICS devices without installation
EPP antivirus with signature-based and behavioral malware detection
EPP antivirus with signature-based and behavioral malware detection
Business endpoint protection with antivirus, malware defense, and mgmt tools
Business endpoint protection with antivirus, malware defense, and mgmt tools
DLP solution for Mac endpoints with real-time monitoring and data protection
DLP solution for Mac endpoints with real-time monitoring and data protection
DLP solution for Linux systems to prevent data leaks and protect sensitive data
DLP solution for Linux systems to prevent data leaks and protect sensitive data
USB-based secure OS for BYOD remote access to corporate apps and VDI
USB-based secure OS for BYOD remote access to corporate apps and VDI
Endpoint management solution with privilege & device control policy enforcement
Endpoint management solution with privilege & device control policy enforcement
Pre-boot USB device for scanning laptops/desktops with multi-engine malware detection
Pre-boot USB device for scanning laptops/desktops with multi-engine malware detection
Cross-platform SDK for integrating endpoint security capabilities into products
Cross-platform SDK for integrating endpoint security capabilities into products
Endpoint DLP solution for discovering, protecting, and monitoring sensitive data
Endpoint DLP solution for discovering, protecting, and monitoring sensitive data
Multi-OS DLP solution for endpoint data discovery, monitoring, and protection
Multi-OS DLP solution for endpoint data discovery, monitoring, and protection
Enterprise DLP solution for endpoint, network, and print data leakage prevention
Enterprise DLP solution for endpoint, network, and print data leakage prevention
Endpoint DLP solution for detecting, classifying, and controlling sensitive data
Endpoint DLP solution for detecting, classifying, and controlling sensitive data
A bash-based anti-forensic script that monitors USB ports and triggers system shutdown when unauthorized devices are detected.
A bash-based anti-forensic script that monitors USB ports and triggers system shutdown when unauthorized devices are detected.
An anti-forensic kill-switch tool for USB ports to shut down the computer immediately in case of unauthorized access.
An anti-forensic kill-switch tool for USB ports to shut down the computer immediately in case of unauthorized access.
An anti-forensic Linux Kernel Module kill-switch for USB ports.
An anti-forensic Linux Kernel Module kill-switch for USB ports.
A command-line forensics tool for tracking and analyzing USB device artifacts and connection history on Linux systems.
A command-line forensics tool for tracking and analyzing USB device artifacts and connection history on Linux systems.
Ghost USB Honeypot emulates USB storage devices to detect and analyze malware that spreads via USB without requiring prior threat intelligence.
Ghost USB Honeypot emulates USB storage devices to detect and analyze malware that spreads via USB without requiring prior threat intelligence.
A daemon for blocking USB keystroke injection devices on Linux systems
A daemon for blocking USB keystroke injection devices on Linux systems