Device Control

Lockdown, Control and Monitor USB and peripheral ports to stop data theft and data loss.
By far the most advanced Device Control software on the market. No discussion!

Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Thank you for your interest in our solution.
To receive a live demo please provide the information requested below.

Please use a valid email address!
Award-winning Device Control
Up and running in 30 minutes
Common Criteria EAL2 Certified

The extended use of portable devices has not only increased the efficiency and mobility of our daily work tasks but, at the same time has posed another significant threat to companies' data security. USB devices and other portable devices, although small and at a first glance harmless, are one of the top causes for security incidents with millions of dollars in losses for the business. The need for controlling the use of devices in corporate environments has become nowadays a must in order to keep up with latest security challenges.

The Device Control module allows monitoring, controlling or blocking USB storage devices and peripheral ports. It prevents data loss and data leaks, ensuring compliance, while also preventing the spread of USB malware and viruses. Being a cross-platform solution, it can be deployed into any type o network as a hardware appliance, virtual appliance or cloud-based solution, protecting Windows, Mac, and Linux endpoints.

While Device Control provides the first layer of security, the Content Aware Protection module is also available.

How Device Control Works

Define and enforce device control policy
Monitor all ports and devices on endpoints
Monitor and block device use or enforce encryption
Actions are reported or included in e-mail alerts

Main Benefits

Protect the entire network

USB and peripheral port monitoring and lockdown for Windows, Mac, and Linux from a simple web-based interface.

Precise and extremely granular control

Specify which devices can or cannot be used, create device whitelists, define rights per user or computer, group and more.


End the headaches of configuration and deployment. The solution can be up and running in minutes.

Protection outside the corporate network

Grant USB access remotely, even if computers are offline while having a complete list of log reports once back in the network.