The extended use of portable devices has not only increased the efficiency and mobility of our daily work tasks, but at the same time has posed another significant threat to companies’ data security. USB devices and other portable devices, although small and at a first glance harmless, are one of the top causes for security incidents with millions of dollars in losses for business. The need of controlling the use of devices in corporate environments has become nowadays a must in order to keep up with latest security challenges.
The Device Control module allows monitoring, controlling or blocking USB storage devices and peripheral ports. It prevents data loss and data leaks, ensures compliance while also preventing the spread of USB malware and viruses. Being a cross-platform solution, it can be deployed into any type o network as hardware appliance, virtual appliance or cloud-based solution, protecting Windows, Mac and Linux endpoints.
While Device Control provides the first layer of security, the Content Aware Protection module is also available.
What we prevent?
- Intentional Data Theft
- Accidental Data Loss or Data Leakage
- Spreading of USB bound malware and viruses
such as Conficker, Stuxnet, Duqu etc.
How it works?
Define and enforce device control policy
Monitor all ports and device activity on endpoints
Action is taken. Either to block device use or monitor or enforce encryption use
All actions are logged, reported or even alerted
Protect the entire network
USB monitor and lockdown for Windows, Mac and Linux
End the headaches of configuration and deployment
Easy to use
With a small learning curve, manage policies and activities from a single dashboard
Full reporting for monitoring and audits
View activity history in great graphics or create reports for executives
Protection outside the corporate network
Grant USB access remotely and have access to complete log reports when computer reconnects to the network
Enterprise-grade scalability starting with just a few or up to thousands of endpoints without sacrificing performance
Based on your specific requirements, choose the best way to deploy our solutions in your network
Precise and extremely granular control
Specify which devices can and cannot be used, create device white lists, define rights per user or computer, group and more
Support business needs
Proven solution with constant improvements and features that adapt to an ever-changing market
Ensures business continuity
Eliminate operational down time and stay compliant with EU and other regulatory institutions