Memory manufacturer SanDisk has introduced TrustWatch, a software suite designed to reduce the security threat posed by USB Flash drives.
TrustWatch includes a network appliance and management console, through which IT administrators can configure and deploy USB Flash drives, while preventing information being copied to unapproved devices.
Employees can use a TrustWatch device on a borrowed PC without leaving any trace of their activity on that PC. If the USB Flash drive is lost or stolen, the data can be destroyed remotely.
TrustWatch offers data encryption, stealth web browsing and Microsoft Outlook file synchronisation, and includes RSA's SecurID dual-factor authentication technology which enables the devices to be used as authenticators.
The means that users must possess the USB Flash drive as well as a password in order to access data and applications stored within a corporate network.
TrustWatch has three components. TrustWatch Access provides security on the USB Flash drive, including password protection.
It integrates secure browser, email client, spyware scanner, Citrix ICA web client, optional VPN client and data storage, and creates an activity log tracking all data moving to and from approved devices.
TrustWatch Vault establishes Fips 140-2 certified encryption on the drive, sufficient for HIPAA, Sarbanes-Oxley and other compliance regulations.
TrustWatch Manager offers a centralised browser-based console for IT administrators, allowing remote deployment, updating, tracking, and disabling of thousands of USB Flash drives.
TrustWatch to secure for SanDisk USB security
TrustWatch offers secure configuration and deployment of USB Flash drives.
Got a news tip for our journalists? Share it with us anonymously here.
Sponsored Whitepapers

See everything. Do more.

Lindentech Secures Digital Identity with Zero Trust and Microsoft Entra

Diamond IT Delivers GRC Transformation with Microsoft Purview

Linktech Powers Energy Trader’s Essential Eight Compliance in Just Eight Weeks

Byte Delivers Future-Ready IT: Transforming Endpoint Security and Productivity with a Cloud-First Strategy