This White Paper discusses how you can take advantage of the power of high capacity USB storage devices like thumb/flash drives without leaving your operation wide open to critical company information being misappropriated. Until now the choice has been to either shut down USB devices — either in Active Directory or through more extreme methods (the “glue in the USB port” trick comes to mind) — or simply trust every user to do the right thing.

This paper introduces a third way that Prism Microsystems calls “Trust but Verify” which is made possible by EventTracker’s advanced USB monitoring capability.


By submitting this form, you consent to being contacted by Netsurion about Netsurion solutions. If you want more information on how we collect and use your personal data, please read our privacy policy. You may withdraw your consent at any time by following the instructions contained within any Netsurion email.