Personal tools
You are here: Home / Use Cases / Secure USB

Secure USB

Using removable storage devices like USB-sticks can introduce a security flaw. OpenSecurity protects the user – and therefore the host system – from malware on USB devices. At the same time sensitive data can only be stored on those storage devices after being encrypted.

Windows has by default a high trust-level setting for USB devices. This means that those devices can become dangerous malware-carriers. The malware StuxNet which was transferred via USB can be given as example.

OpenSecurity mitigates this risk by allowing access to USB devices only via an isolated virtual machine – our Secure USB approach. Directly accessing the real host is not possible. This way the host is protected from harmful USB activities (e.g. rootkit installation). Additionally all incoming data is scanned for viruses or malware (either locally or centrally).

USB devices raise another risk: as they are small and transportable they can easily be lost. OpenSecurity mitigates the risk by enforcing encryption of data which is being copied to the USB devices. This way sensitive information remains protected even if a device is lost (or is stolen).

The encryption of USB-sticks is supported by the OpenSecurity interface. While writing is only possible on encrypted USB-sticks, non-encrypted removable storage devices can still be accessed as read-only devices after a successful central virus-scan.

The usability of Secure USB has been tailored to common workflows. The user will hardly notice a difference when accessing and operating with Secure USB. Switching to OpenSecurity is easily possible as the necessary training effort is minimal.

Secure Web Browsing
Central Virus-Scanning and Monitoring

 

Back to overview

Document Actions

« December 2020 »
December
MoTuWeThFrSaSu
123456
78910111213
14151617181920
21222324252627
28293031
 

Open Security

Imprint