The wide-spread use of USB flash drives is a major issue for business leaders. How do you protect sensitive data when it is so easy to copy onto a USB device?

Secured eUSB lets you take control. Secured eUSB is a comprehensive, easy-to-use solution for USB security that incorporates all the functionality necessary to safeguard your intellectual property and comply with data protection laws and regulations. Secured eUSB provides strong USB encryption, centralized control of USB security policies, password policies and user access rights, and extensive Data Content Reporting, enabling you to deploy and control USB security across your entire network. With Secured eUSB you can be confident that the data on all USB flash drives in the organization is secured and that you have full visibility of data movement.

Business Benefits

  • Encrypt any USB drive, use it anywhere

    It doesn’t matter what USB flash drives your employees buy or get given for free, Secured eUSB can encrypt any brand and will secure its entire available storage. A secured USB flash drive can be used in any Windows-based computer as all the software required for operating it is on the drive.

  • Encrypt CDs/DVDs, track their use

    Empower end users to encrypt CD/DVDs through a simple process. Once encrypted the CD/DVD can be used on any Windows-based computer. Every encrypted CD/DVD has the intelligence to report all user actions to the central management console for comprehensive reporting capabilities.

  • Encrypt external hard drives, protect data

    Empower end users to encrypt any brand of portable external hard drive in minutes and use it on any Windows-based computer. Every encrypted portable hard drive has the intelligence to report all user actions to the central management console for comprehensive reporting capabilities.

  • Enforce encryption of portable storage devices

    For most organizations with regulatory compliance obligations, it’s important to ensure that all data that is saved to a portable device is encrypted. With the Secured eUSB solution it is possible to configure it so users are obliged to encrypt USB flash drives, external hard drives and CD/DVDs in order to be able to store information on them. For example, IT can set up a device policy to ensure that end users can read data from private flash drives and customer flash drives but in order to be able to store data on a flash drive it must be encrypted with the Secured eUSB technology.

  • Kill Pill Anti-theft system

    If a user loses or misplaces a secured portable device IT can issue a ’lockout’ command to block access to the device - administrators can unlock the device if required. The "Kill Pill" command will wipe the portable device completely clean to ensure complete data protection, even over the Internet.

  • Track device ownership

    For each secured portable device, the system automatically assigns ownership to an Active Directory user. IT can therefore track usage of secured portable devices and generate data loss reports if a secured portable device is lost or stolen. If a user leaves the organization, IT can quickly identify which secured portable device the user owns and ask for them to be returned.

  • High security standards

    The highest security standards

    Secured eUSB creates a secure working environment. The user can open or create any Microsoft file within the secure working area of the device and make changes without ever moving documents to an insecure environment. Any temporary files created by Microsoft during the editing process are wiped. A secured Recycle Bin travels with the device to ensure that data is not moved to an unsecured recycle bin, enabling restore at a later date.

  • Enable users to take responsibility for removable media security

    The Simple Encryption Platform (SEP) allows IT to centrally manage and enforce removable media security policies - create custom environments, define roles and permissions for groups and users, and then deploy this across the entire network. Users are then able to define who can access their encrypted portable device, and what they can do with a document: eg. read only, or read/write.

  • Client application or zero footprint deployment

    You choose how you want to manage the removable media encryption process: deploy client software to all end point computers, so that users can execute the removable media encryption on their own flash drives automatically, or centrally manage the encryption process in the IT department, distributing pre-encrypted devices on demand.

  • Full reporting and audit trail for compliance

    Full compliance reporting and audit trail

    Automatic reporting ensures a complete record of removable media security in the organization. Reports include inventory listing of all secured portable devices, and real time analysis of what data is on each device and where it originated. If a device is lost or stolen, IT can quickly do a data loss report. IT can also track data content movement on each device - copy, rename, delete - to audit for possible illegal activity or data leakage.

  • Helpdesk

    Help desk support for lost password recovery

    A built-in password recovery system significantly reduces the workload for the help desk by speeding up the process for verifying the user’s identity before a recovery password is issued.

Top Features

  • Fast encryption process

    For the encryption of a portable device to be as fast as possible, the file system is converted to NTFS. Automatic data compression speeds up data transfers from the computer to the USB flash drive. As a result encryption is extremely fast - a 16GB flash drive takes less than one minute to secure.

  • Full reporting and audit trail for compliance

    Data Content Reporting

    The Simple Encryption Platform (SEP) provides central management, control and reporting for administrators. SEP uses Global Object Synchronization allowing the intelligent client to communicate with the SEP manager for real time reporting of data movements and user actions. SEP can run on a virtual environment such as VMWare.

  • Key Management

    Stealth key technology

    Our patented automatic key encryption method (EPM) lets the user decide who to share the secured device with, and what role that user/group will have when accessing secured content. EPM Stealth Keys are automatically generated and synchronized between server and clients, IT administrators don’t have the hassle of managing them.

  • Seamless integration with existing infrastructure

    Secured eUSB is designed to leverage existing directory applications such as Active Directory. Every secured USB flash drive is registered to an Active Directory user. Users can define which AD users and groups will be able to access the secured device.

  • Brute force protection

    Built in brute force protection system protects the inherent encryption methodology against professional hackers.

  • Automatic data compression

    Device storage capacity is increased, as data is automatically compressed up to 5 to 1. The storage capacity of a 1 GB drive increases to 5 GB and a 4 GB drive to a 20 GB capacity.

Technical Specifications

SEP Client Requirements

Client Hardware Hardware:
  • Pentium 2.2 GHz processor
  • 512 MB of RAM
  • 100MB available hard disk space
Supported Operating Systems: SEP Client is Windows 7 Certified
  • Microsoft Windows® 8
  • Microsoft Windows® 7
  • Microsoft Windows® Vista
  • SEP driverless client (Secured eUSB is not supported on Windows servers):
    • Microsoft Windows® Server 2003, 2008, 2008 R2, 2012
General Requirements:
  • Internet connection
  • Microsoft Internet Explorer® 7 or higher

SEP Management Console

Client Hardware Hardware Minimum Requirements:
  • Computer/Processor with Pentium 1.5 GHz
  • 2 GB of RAM
  • 500 MB of available hard disk space
Supported Operating Systems:
  • Windows® Server 2012
  • Windows® Server 2008 SP2, 2008 R2 SP1
  • Windows® Server 2003 SP3, 2003 R2
  • Windows® 8
  • Windows® 7 SP1
  • Windows® Vista SP2
General & Software Requirements:
  • Internet connection
  • Microsoft .Net Framework 4.0
  • Request a Call

Customer Success Stories

To see all Customer Success Stories and Case Studies relating to this product, please click here.

  • NCC Construction

    Large workplaces must take effective security measures. The priority is to guarantee the safety of the employees and ensure they can perform their assignments under safe circumstances. But it is also important to secure the organization’s data and resources, to protect the company whilst also supporting a smooth workflow and secure working environment. Download the Case Study

  • Arthur D. Little

    Founded in 1886, Arthur D. Little is the world’s first management consultancy firm. Today, they are unique in Link Strategy, Innovation & Technology to master their clients’ business complexity and deliver sustainable solutions. The organization works as a global service provider and employs 1.000 staff members in over 20 countries. Together with their partner, Altran Technologies, they offer over 17.000 professionals at clients’ disposal. Download the Case Study

  • Request a Call

Simple Encryption Platform

Simple Encryption Platform Concept Image

The Simple Encryption Platform from Cryptzone is designed to empower end users to secure data easily. Whether information is in transit; email, flash drives, portable media, or stored on a corporate network or SharePoint intranet, SEP will secure it.

The struggle for data control within organizations is not a new problem as laws and regulations dictate compliance. Historically encryption solutions have been notoriously difficult to implement, use and manage with many organizations hesitating to implement encryption solutions. With SEP from Cryptzone, encrypt and secure data with its simple encryption technology at the click of a button or implement policies to do this automatically.

Products in the Simple Encryption Platform

Resources & Related Literature

Other Literature

Data Sheets: PDF Download

Secured eUSB