How Device Control Works?

Description

See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives.

Transcript

Hi! My name is Natalie, and today I will show you how the Device Control module of Endpoint Protector works. USB Device Control is a cross-platform module that works on Windows, macOS and Linux computers; and it allows you to control the portable devices connected to the computers, and to monitor all transfers of data to authorized devices.

Among controlled device types, there are: USB Storage Devices, Internal CD/DVD, Thunderbolt, Printers, iPhone, iPad, Bluetooth, WiFi, FireWire Bus, Serial Port and others. Each of these device types can be controlled - blocked or allowed - by assigning “Deny Access” or “Allow Access” to them. If you need to allow the use of USB storage devices, but not to have users copy any files from their computers to their devices, you can set the “Read-Only Access” right.

Endpoint Protector offers a very granular control over storage devices. Rights can be assigned for all entities (on Global level), for entities included in a group (on Group level) or for specific Users or Computers. The rights’ priority is the following: Global Rights have the lowest priority, Group Rights have a higher priority than the Global Rights, and User or Computer Rights have the highest priority.

Outside Hours and Outside Network policies can be enabled, as well - if there is a need to block the use of storage devices when outside working hours or outside corporate network. These fallback policies can be set on Global, Group or Computer level.

That was the Device Control module of Endpoint Protector. Thank you for your attention!

Other data security videos

How Device Control Works?

See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives.

How Device Control Works?

See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives.

How Device Control Works?

See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives.

How Device Control Works?

See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives.

How Device Control Works?

See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives.

How Device Control Works?

See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives.

Request Demo
check mark

Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.

* Your privacy is important to us. Check out our Privacy Policy for more information.