Control, block, and monitor USB and peripheral devices to prevent unauthorized access to your sensitive data.
Features and benefits:
Set file transfer restrictions to prevent unauthorized data movement to or from your computer with role-based access control (RBAC).
Eliminate unprecedented data transfers and limit file transfers by setting the maximum file size and file type that can be transferred from your computer.
Control all ports and connected removable devices, block unauthorized access to data, and monitor all device and file actions.
Grant temporary access to removable devices to prevent excessive access privileges.
Create a trusted device list and authorize only those devices to have access to your computer.
View detailed audits and reports to know who is using what peripheral device, such as a USB memory stick, and on which endpoint.