Lockdown, control, and monitor USB and peripheral ports to stop data theft and data loss.
Is your sensitive data at risk due to a lack of device management?
External devices such as USB flash drives, Bluetooth, and other portable USB devices, although harmless at a first glance, are one of the top causes for security incidents that can cause major damages to any business. Damages range from confidential data being stolen to huge fines due to violations of compliance rules and regulations. End users must be aware of the risks and for businesses to have measures in place to prevent data breaches and leakage from such external devices.
Cross-platform, lightweight agent
Remotely monitor USBs and peripheral ports across different operating systems from a simple web-based interface with no performance impact on the protected computers. Set policies with ease for Windows, macOS, and Linux, and enable USB Device Control functionality to have precise and granular control over USB devices on each operating system.
Remote and temporary access
Grant USB access remotely, even when computers are offline, while having a complete list of log reports once back in the network.
Precise and granular control
Depending on departments’ requirements, specify which devices can or cannot be used, create device whitelists and blacklists, and define policies per user, computer, or group for uninterrupted workflow throughout the company.
Gain full control of USB devices, Bluetooth and peripheral ports
The centrally-managed Device Control module allows for granular control over USB device permissions, enabling full control of the USB ports and connected storage devices. This way, it prevents accidental or intentional data loss and data leaks, while also protecting the endpoints against the spread of USB malware, BadUSB attacks or viruses. With this module, businesses can centralize user access management and customize access permissions for removable device media connections.
How it works
Device Control module is the first layer of security provided by Endpoint Protector. By defining granular access rights for USB and peripheral ports, device security is enforced while productivity is maintained. As a cross-platform solution, it protects the entire network, regardless of if the computers are running on Windows, Mac OS X, or Linux.
Controlled device types
The Device Control module allows easy management for the majority of known USB drive types, for enhanced data protection in various work environments.
- USB Storage Devices (USB Flash Drives, Sticks, Pen drives, etc.)
- External HDDs (incl. sATA HDDs)
- CD/DVD-Players and Burners (internal and external)
- iPhones, iPads and iPods
- Smartphones and Tablets (incl. Android devices, Blackberry and PDAs)
- Digital Cameras
- MP3 Player and other Media Player Devices
- Card Readers (internal and external)
- Memory Cards (SD, MMC, CF, Smartcard, etc.)
- Floppy Drives
- WiFi Network Cards
- FireWire Devices
- Biometric Devices
- Bluetooth Devices
- ZIP Drives
- ExpressCard SSD
- Wireless USB
- Serial Port
- Teensy Board
- PCMCIA Storage Devices
- Network Share
- Thin Client Storage (RDP Storage)
- Additional Keyboards
- USB Modems
- Infrared Dongle
See all technology partners
Frequently Asked Questions
Device control is the technology that ensures protection against data loss by monitoring and controlling data transfers from endpoints to removable storage devices. Companies can set access rights to users to protect sensitive data from insider threats and accidental data leakage through removable devices. With device control, access to different devices including USBs, smartphones and tablets, printers, WiFi network cards, FireWire devices, and more can be opened or blocked.
Device control solutions provide data loss and theft prevention via removable devices. Removable storage devices, such as USB flash drives, and mobile connection technologies, like Wi-Fi or FireWire are convenient and enhance productivity, however, they also present security risks. By deploying a device control solution, organizations can protect sensitive data, such as Personally Identifiable Information (PII) or Intellectual Property (IP) from leaking, which could result in steep fines, legal ramifications, and brand damage.
Find out more about what makes a device control software stand out.
With device control, organizations can control the movement of valuable information to portable storage devices and peripheral ports, as well as gain visibility into what data is being taken out. To prevent accidental or intentional data loss and data leaks, high-quality device control solutions offer granular control over all devices in the organization, and provide features such as offline temporary passwords or transfers limits. Encryption is often part or can be used with a device control solution, thus preventing unauthorized use or dissemination of confidential data.
Learn how you can encrypt, manage and secure USB storage devices by safeguarding data in transit.
A USB lockdown software, also known as USB blocking software, helps organizations prevent data leakage by restricting unauthorized devices from accessing endpoints and sensitive data. With a USB blocker, data is safeguarded from being copied onto untrusted removable devices.
Read more about USB blocking.