Gilisoft USB Lock
Control USB ports, removable devices, and trusted-device access to reduce data leakage on Windows


Windows 2000/2003/XP/7/8/10/11 (32 bits &64 bits)

Download TrialVersion: 10.0 BUY NOW$49.95 $59.95

What Does Gilisoft USB Lock Do?

Data leakage often starts with unmanaged USB ports and removable-device access. GiliSoft USB Lock helps organizations and individual users control which devices can connect, copy data, or open storage channels on Windows PCs.
It can block USB drives, external disks, CD/DVD media, and unauthorized mobile-device data connections, while allowing approved devices through policy and trusted-device whitelist controls. USB Lock also supports endpoint hardening options such as website restrictions, program lock rules, device lock controls, and operation logs for incident review.
Use USB Lock when the main goal is device control and policy enforcement. If you need file encryption on the removable drive itself, use USB Encryption instead.

Core USB Device Control Features

Block USB/SD Drives

Disable reading from USB/SD disks, disable writing to USB/SD disks, and block non-system partitions. It does not allow USB/SD drives unless they are authorized or included in the trusted-device whitelist.

CD Lock, Block Media and Blu-ray Discs

Disable reading from DVD/CD discs or making DVD/CD burner read-only. This application also blocks any disc that uses the disk hub, bay, combo or CD/DVD drive and allots a drive letter.

Restrict USB data access on Android / iPhone

By disabling USB data access, you can prevent unauthorized users from accessing your device's data when connecting it via USB. This can help protect your privacy and prevent data breaches.

Restrict Android and iPhone Hotspot via USB

Block mobile-device tethering through USB to prevent PCs from using phone hotspot internet access through unmanaged channels.

Trusted Devices White List

You can create a whitelist to allow 'certain approved' USB pen drives. Then it will block all USB drives except the ones in the white-list.

Reports & Logs

USB Lock provides full reports and logs: (1) USB activity monitoring for file operations, (2) deny and allow access history, (3) trusted-device whitelist activity records.

Website Lock

Block selected websites to reduce unauthorized web access paths. Blocked pages can be redirected to a blank or custom blocked page.

Devices Lock

The program can be used to restrict read or write access to removable media devices such as CD, DVD, floppy, SD Card Readers, flash and USB drives. It also can be used to disable iPhone, Android phone, printer,modem, com lpt ports,infrared, blue-tooth, 1394 ports.

Programs Lock

Block running any programs, including IE, Outlook, AOL, AIM, Dropbox, and more. You can even lock your control panel with one button click.

Powerful Self-protection Mode

Nobody can uninstall this software without password and you can hide this program in Invisible Mode. When someone enters wrong password more than 5 times, it will send alarm notifications to your pre-defined e-mail and the unknown login will be temporarily banned.

Copy Protection

Copy restriction is part of the broader policy workflow, but the core value of USB Lock remains device control, USB port restrictions, and removable-media access enforcement.

Data Leak Prevention

It prevents your data from getting leaked out to USB drives and other such storage devices by letting you control which device can access your computer while blocking all other unauthorized devices that do not belong to you.

Customer Testimonials

USB Lock helped us enforce removable-media policy on shared office computers without interrupting approved workflows.

- Olivia M., IT Security Lead

Block USB/SD Drives gave us cleaner control over copy-out risks, especially on front-desk and support machines.

- Kevin T., Systems Administrator

CD and media lock controls made policy enforcement clearer for both administrators and non-technical staff.

- Rachel P., Compliance Manager

Restricting Android and iPhone USB data access closed a gap we had in mobile-to-PC transfer control.

- Daniel K., IT Administrator

USB tethering restrictions helped us prevent unmanaged internet channels on controlled desktop environments.

- Brian C., Support Engineer

Trusted device whitelist rules let approved company USB drives work normally while blocking unknown devices.

- Megan S., Operations Manager

Activity logs are useful for incident review because we can see exactly when deny and allow events occurred.

- Aaron L., Security Analyst

Gilisoft USB Lock's Screenshots

Top How-to Guides

Who Is This For?

Businesses controlling USB copy-out risks

Reduce unauthorized data transfer from office PCs by blocking unknown USB storage devices and allowing only approved media.

IT teams that need trusted-device policy

Keep approved company USB drives working while blocking personal or unknown removable devices through whitelist rules.

Shared computers that need stricter endpoint control

Control removable media, CD/DVD access, mobile-device connections, and other local device channels on shared desktops and laptops.

Organizations reviewing access events and policy violations

Use deny and allow logs to understand when device access was attempted, blocked, or approved across managed Windows endpoints.

Why USB Lock Instead of USB Encryption or File Lock Pro?

USB Lock is for device control, not file encryption

Use USB Lock when you need to block ports, restrict removable-device access, and control endpoint policy. Use USB Encryption when the removable drive itself needs password-protected encryption.

Better fit for whitelist and policy enforcement

Trusted-device controls and removable-media restrictions are the core workflow here, which is different from folder locking or encrypted USB storage.

Use File Lock Pro for file and folder protection

If your real goal is locking folders, hiding files, or protecting shared folders, File Lock Pro is the better product. USB Lock focuses on access channels and connected devices.

Useful for broader endpoint hardening

USB Lock also covers related local control needs such as device restrictions, selected website blocking, and program lock rules around the same policy workflow.

Common USB Control Use Cases

Block unauthorized USB drives on office PCs

Stop unknown flash drives and external disks from becoming an uncontrolled path for copying files out of business computers.

How to block USB storage devices | How to disable USB ports in Windows 11 | How to prevent copying files to a USB drive

Allow approved devices and block everything else

Keep trusted company drives available for work while preventing unapproved removable devices from connecting.

How to allow only approved USB devices | USB whitelist software | USB device control software

Restrict mobile-device data access over USB

Close USB-based phone data channels and tethering workflows that bypass normal network and endpoint policy.

How to block phone and USB transfer on a PC | Control connected devices and ports

Reduce USB data leakage on shared and office PCs

Use policy controls, whitelist rules, and blocked-device handling to cut down removable-media copy-out risk on business desktops and shared workstations.

How to prevent USB data leakage on Windows | How to prevent copying files to a USB drive

Restrict employee USB access in office environments

Block personal USB drives on business PCs while keeping approved company devices available for controlled office workflows.

How to disable USB access for employees | USB device control software

Control removable media on shared desktops and laptops

Apply USB policy on shared workstations, front-desk PCs, and training-room computers where removable drives need tighter control.

How to control removable media access on Windows | How to block USB drives on a shared PC

Choose between USB Lock and USB Encryption

Use USB Lock for device-access policy control, and use USB Encryption when the removable drive itself needs password-protected storage encryption.

View USB Encryption

USB Lock FAQ

Can USB Lock block unauthorized USB drives on Windows?

Yes. USB Lock can block unauthorized USB storage devices and allow only approved drives through whitelist and policy controls.

How to block USB storage devices

Can trusted USB devices stay available?

Yes. You can whitelist approved company devices while leaving unknown removable devices blocked.

How to allow only approved USB devices | USB whitelist software

Can USB Lock help reduce USB data leakage in an office?

Yes. USB Lock can block unapproved removable devices, keep approved devices available, and reduce copy-out risk on office and shared PCs.

How to prevent USB data leakage on Windows

Can USB Lock restrict employee USB access while allowing approved devices?

Yes. USB Lock can block general USB access for employees while still allowing approved company devices through whitelist rules.

How to disable USB access for employees | How to allow only approved USB devices

Can USB Lock help control removable media on shared PCs?

Yes. USB Lock can restrict removable drives on shared desktops and laptops while allowing approved devices through whitelist rules when needed.

How to control removable media access on Windows | How to block USB drives on a shared PC

Does USB Lock encrypt data stored on the drive?

No. USB Lock controls ports and device access. Use USB Encryption if you need password-protected encryption on the removable drive itself.

USB Lock vs USB Encryption | View USB Encryption

Should I use USB Lock or File Lock Pro?

Use USB Lock for USB port restrictions and device policy. Use File Lock Pro for file and folder locking, hide mode, and shared-folder protection.

USB Lock vs USB Encryption | Best USB port lock software

Choose the Right GiliSoft Tool

Need USB port control, trusted-device policy, and removable-media restrictions?

Use USB Lock when the main need is endpoint USB control, device blocking, whitelist policy, and data-leak prevention rather than locking local folders or shared directories.

Use USB Lock

Need to lock files, local folders, or shared folders on Windows?

Use File Lock Pro when your goal is folder privacy, password-based access control, hide mode, and LAN shared-folder protection instead of USB endpoint policy enforcement.

View File Lock Pro

Need a lighter file and folder locker without the Pro workflow?

Use File Lock when you want a simpler desktop file and folder locking tool rather than full USB device management or endpoint control features.

View File Lock

Need to encrypt the USB drive itself instead of only controlling access to USB ports?

Use USB Encryption when the removable drive itself should contain a secure encrypted area protected by password on any Windows PC.

View USB Encryption

Media Review

  Editors emphasized strict USB channel control for ports, drives, and removable media.
    Coverage noted clear policy toggles that simplify endpoint hardening at scale.

With GiliSoft USB Lock, you can keep your computer safe from harmful, virus infested
files by restricting all USB access using this comprehensive and powerful tool...

  Reviewers praised dependable blocking behavior against unauthorized copy-out attempts.
    Lab tests highlighted stable enforcement on mixed desktop and laptop fleets.

 

GiliSoft USB Lock prevents leakage and copy of your data to USB Drives, External Drives,
CDs/DVDs or other such portable devices....

  Independent write-ups described the tool as effective for insider-risk mitigation.
    Commentary cited strong day-to-day operability with minimal user disruption.

 

USB Lock allows users to operate their computers and laptops with complete
peace of mind. No more fear of data leaks...

SPECIAL OFFER | MEGA SALE
#1 Data Loss Prevention Suite
5 Copy Protection Software in DLP Bundle