
This White Paper discusses how you can take advantage of the power of high capacity USB storage devices like thumb/flash drives without leaving your operation wide open to critical company information being misappropriated. Until now the choice has been to either shut down USB devices — either in Active Directory or through more extreme methods (the “glue in the USB port” trick comes to mind) — or simply trust every user to do the right thing.
This paper introduces a third way that Prism Microsystems calls “Trust but Verify” which is made possible by EventTracker’s advanced USB monitoring capability.