Control, block, and monitor USB and peripheral devices to prevent unauthorized access to your sensitive data.

Features and benefits

  • File access control: Set file transfer restrictions to prevent unauthorized data movement to or from your computer with role-based access control (RBAC).
  • File transfer control: Eliminate unprecedented data transfers and limit file transfers by setting the maximum file size and file type that can be transferred from your computer.
  • Device and port control: Control all ports and connected removable devices, block unauthorized access to data, and monitor all device and file actions.
  • Temporary access: Grant temporary access to removable devices to prevent excessive access privileges.
  • Trusted device list: Create a trusted device list and authorize only those devices to have access to your computer.
  • Reports and audits: View detailed audits and reports to know who is using what peripheral device, such as a USB memory stick, and on which endpoint.