U3 Protection / Password Protection

Posted on 2009-05-11
Medium Priority
Last Modified: 2013-11-14

Does anyone know of a way to protect a USB key really simply and without installing any programs on our PC's.

I like the U3 software but I don't want to allow our users to install things and then run them on our computers from thier flash drives.

Is there a way of preventing our users from installing U3 applications but still allowing them to use the password feature.

Alternativley, is there a way of protecting USB keys that's simple to use and doesn't require installing anything on the PC?

Thanks in advance,

Question by:spen_lang
LVL 18

Accepted Solution

PowerIT earned 1500 total points
ID: 24361847
If the users are local admins then you can use truecrypt in portable mode. That's the only one I know of. Because of its nature, all encryption software either needs to be run as admin (which for other reasons is not a good idea) or be preinstalled.
The other solutions is using USB key which have encryption built in and don't require software installation. E.g. IronKey.

kr, J.

Author Closing Comment

ID: 31580085
I think the long and short of this is that the answer is no!

I'm finding very quickly that what I want to do needs to be sorted with hardware rather than software.

As you're the only person who replied - and what you have put was true I will let you have the points.


Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Check out the easy way to Export Thunderbird to MS Outlook. It can be done effectively by using manual method and if you are not much into coding then you can definitely try the third party tool for the conversion.
You do not need to be a security expert to make the RIGHT security. You just need some 3D guidance, to help lay out an action plan to secure your business operations. It does not happen overnight. You just need to start now and do the first thin…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question