ITS PLUS: IT CAN BE EASILY INTEGRATED INTO AN OFFICE ENVIRONMENT
Complete with a 10-inch HD touch screen, it is intended to be positioned on a desk or a console. The TYREX Console perfectly and effortlessly integrates into any environment, any infrastructure, any cybersecurity ecosystems, and any user’s day– to–day activity. It doesn’t require programming or additional software installations – just plug it in, and you’re ready to go.
The TYREX Console makes data security simple for everyone: employees, suppliers, clients, contractors, maintenance providers and visitors. It analyses and decontaminates USB devices in order to protect you, your data, your devices and your network from any and all USB infections, and resulting data breaches.
Simply connect your USB equipment to the TYREX and it will perform an analysis in just a few minutes. Once the scan is complete, you can connect to your network secure in the knowledge that your USB device is safe and healthy.
Fast, Accessible & Effective
It comprises two antivirus engines, but you can easily go up to 5 for next–level cybersecurity.
The TYREX comes pre–programmed so you don’t have to install any software.
Users can choose to analyze all or parts of their device and will each have access to an analysis report.
You can create custom internal communications for your users to view during each scan, keeping them up to date with the latest security advice and measures, and helping them play an active role in protecting your business and data from a costly data breach.
It’s managed simply thanks to a back office in SAAS mode, where the management of your terminals and their analysis history is centralized.
Equipped with WorkStation Protect, the KUB also provides the option of blocking any external USB device that hasn’t been scanned. Compatible with Windows XP SP2, 7,8 and 10, Windows server 2003 R2 and Linux Centos 7.
Hardened software and hardware.
Secured communication to/from the management server through a self-managed VPN.
Supports Windows, Mac, Linux, Unix.
BadUSB, Malware and Adware detection.
2 AV by default and up to 5 running simultaneously.