Categories
Blog USB Copy Protection

Updating Content on USB Flash Drives After Distribution

CD/DVD is still one of the most popular mediums for content distribution because it is cheap, convenient to produce and easy to handle and deliver for content producers. In comparison to streaming and download services, a CD/DVD does not require an authentication process through e-mail or an internet connection. This technology makes it so that only people who own the physical CD/DVDs can access their content.

However, if the content on a CD or DVD needs to be regularly (or irregularly) modified, CD/DVD is not a good medium for content distribution because you will have to redistribute a new CD/DVD every time the content is changed. You should prepare new physical CDs/DVDs again, burn new content to them and redeliver them to hundreds or thousands of users. That is time consuming and may cost a lot of money. In addition, if you have to keep integrity of data, you’ll have trouble of ensuring that only the newest content is used by recipients after each redistribution.

A streaming/downloading service is also not a good option if (a) internet connection is not guaranteed among users, (b) the file size is large and/or there is not enough network bandwidth to properly deliver it to users, (c) the content is so sensitive that producers need to mitigate the risk of unauthorized access (d) users may not be familiar enough with the Internet-service environment to use a streaming or downloading service.

In any case, Secudrive USB Copy Protection is an effective alternative.

Secudrive USB Copy Protection makes it possible for media producers to set up a URL for clients to download updated content that was previously distributed on a USB flash drive. If you have to update content after the first distribution Secudrive USB Copy Protection makes it so that you only have to upload the new content to a folder and then register the content folder. Secudrive USB Copy Protection automatically compares the content to the original and creates a kind of encrypted .zip file. After you upload this updated file, it is downloaded and updated automatically when you plug the original USB flash into any PC connected to the Internet. Because only the modified files are updated in this situation, Network traffic is minimized

Furthermore, this system makes it so that specific USB flash drives can be prohibited from using the content, or specific USB flash drives can be completely wiped remotely using the update feature. You can also check whether or not a specific user has updated the content.

The bottom line is that Secudrive USB Copy Protection is a copy-protection solution that distributes content through USB flash drives. It can set password access, block access or wipe all the content on a USB flash drive if an incorrect password is used a certain number of times. You can set an allowable period of time in which users can access the content on the flash drives or specify a maximum number of logins. In addition, it allows you to white-list which applications users can access, and you can prevent printing, screen capture, network transfer or copying of the content on the USB flash drives. All these features make Secudrive USB Copy Protection an ideal solution for those needing to exercise maximum control over distributed content.

Categories
Blog File Server Security USB Sescurity

File Activity Monitoring in a File Server

In many businesses, a great deal of confidential information is stored in a file server or a Network Attached Storage(NAS) and shared by employees, contractors, consultants, and business associates. Although we easily share files in shared folders to work together, the management may often worry that a confidential file can be modified, deleted, or even copied by an unauthorized person because of somebody’s mistake or malicious actions.

We usually control users’ access rights first to prevent unauthorized access to a shared folder and then give read-only or read/write permission to users who have access rights to the folder. But users are sometimes given access rights and permissions in exceptional cases, and often, these are not taken back. If this happens repeatedly, things can get messed up. Ultimately, access control and permission management efforts are often given up.

Finally, we look for file activity log features. We try to monitor who creates, modifies, copies, and deletes files and when, because we believe we can detect unauthorized or suspicious activity when a user tries to do so. And users who recognize that their file activity is always monitored can also proactively protect themselves from unauthorized and suspicious actions. File activity log monitoring is more useful in small- and medium-sized businesses where there is no dedicated administrator for a file server.

Of course, there is a log management feature that is provided as a default option by Windows file servers. However, if you set up some options to generate file activity logs, you will find tons of logs, struggle to sort what you really want out of them, and finally end up in big trouble with storage capacity management for the huge logs. This is why some expensive third-party log management solutions for Windows file servers are successful in the market.

Secudrive File Server shows at a glance file activity logs on users who create, read, modify, copy, and delete a file. Customers say that Secudrive File Server’s file activity log feature is useful enough to monitor users’ file activity in a file server without opting for any expensive log management solutions.

Secudrive File Server is basically a data leakage prevention solution for Windows file servers. Secudrive File Server makes it possible to manage users’ rights for copying, printing, screen capture, and network transfers of files from shared folders, while keeping existing shared folders and users’ access rights and permissions in existing Windows file servers. If we block users’ rights to copy, print, screen capture, and network transfer in shared folders and keep all confidential files in the shared folders through their life cycles from creation to deletion, we can completely prevent data breach from the folders.

Secudrive File Server can be utilized differently according to customers’ situations: 1) if users’ rights do not need to be changed often, their rights to copy, print, screen capture, and network transfer are all blocked, and all file activity logs are monitored. This is the most secure option. 2) If users’ rights need to be changed often and there is no dedicated system administrator, we can utilize the file activity monitoring feature for audit as a minimum safeguard to prevent data leakage from a file server instead of blocking all of the users’ rights.

When a user transfers a file from a file server to outside, the Secudrive File Server can back up the file in a certain storage area for audit, encrypt the transferring file, and let it be decrypted only in a copy-protected device such as another file server that has installed Secudrive File Server or a Secudrive USB flash drive.