Control, block, and monitor USB and peripheral devices to prevent unauthorized access to your sensitive data.
Features and benefits
File access control: Set file transfer restrictions to prevent unauthorized data movement to or from your computer with role-based access control (RBAC).
File transfer control: Eliminate unprecedented data transfers and limit file transfers by setting the maximum file size and file type that can be transferred from your computer.
Device and port control: Control all ports and connected removable devices, block unauthorized access to data, and monitor all device and file actions.
Temporary access: Grant temporary access to removable devices to prevent excessive access privileges.
Trusted device list: Create a trusted device list and authorize only those devices to have access to your computer.
Reports and audits: View detailed audits and reports to know who is using what peripheral device, such as a USB memory stick, and on which endpoint.