Lockdown, Control and Monitor USB and peripheral ports to stop data theft and data loss.
The extended use of portable devices has not only increased the efficiency and mobility of our daily work tasks but, at the same time has posed another significant threat to companies' data security. USB devices and other portable devices, although small and at a first glance harmless, are one of the top causes for security incidents with millions of dollars in losses for the business. The need for controlling the use of devices in corporate environments has become nowadays a must in order to keep up with latest security challenges.
The Device Control module allows monitoring, controlling or blocking USB storage devices and peripheral ports. It prevents data loss and data leaks, ensuring compliance, while also preventing the spread of USB malware and viruses. Being a cross-platform solution, it can be deployed into any type o network as a hardware appliance, virtual appliance or cloud-based solution, protecting Windows, Mac, and Linux endpoints.
While Device Control provides the first layer of security, the Content Aware Protection module is also available.
How Device Control Works
USB and peripheral port monitoring and lockdown for Windows, Mac, and Linux from a simple web-based interface.
Specify which devices can or cannot be used, create device whitelists, define rights per user or computer, group and more.
End the headaches of configuration and deployment. The solution can be up and running in minutes.
Grant USB access remotely, even if computers are offline while having a complete list of log reports once back in the network.