Control, block, and monitor USB and peripheral devices to prevent unauthorized access to your sensitive data.
Features and benefits
- File access control: Set file transfer restrictions to prevent unauthorized data movement to or from your computer with role-based access control (RBAC).
- File transfer control: Eliminate unprecedented data transfers and limit file transfers by setting the maximum file size and file type that can be transferred from your computer.
- Device and port control: Control all ports and connected removable devices, block unauthorized access to data, and monitor all device and file actions.
- Temporary access: Grant temporary access to removable devices to prevent excessive access privileges.
- Trusted device list: Create a trusted device list and authorize only those devices to have access to your computer.
- Reports and audits: View detailed audits and reports to know who is using what peripheral device, such as a USB memory stick, and on which endpoint.