Gain full control of USB devices, Bluetooth, and peripheral ports
The centrally-managed Device Control solution allows for granular control over USB device permissions, enabling full control of the USB ports and connected storage devices. This way, it prevents accidental or intentional data loss and data transfers, while also enabling endpoint protection against the spread of USB malware, BadUSB attacks, or viruses. With Device Control, businesses can centralize user access management and customize access permissions for removable media connections.
How it works
Device Control is the first layer of security provided by Endpoint Protector by CoSoSys. By defining granular access rights for USB and peripheral ports, endpoint security is enforced while productivity is maintained. As a cross-platform solution, it protects the entire network, including removable storage devices, regardless if the computers are running on Windows, macOS, or Linux environments.
Controlled device types
Device Control allows easy management for the majority of known USB drive types, for enhanced data protection in various work environments.
Endpoint Protector Features
USB & Peripheral port control
Lockdown, monitor and manage devices. Granular control based on vendor ID, product ID, serial number and more.
Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.
Automatic USB encryption
Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.