Gain full control of USB devices and peripheral ports
The centrally-managed Device Control module allows full control of the USB ports and connected storage devices.
This way, it prevents accidental or intentional data loss and data leaks,
while also protecting the endpoints against the spread of USB malware, BadUSB attacks or viruses.
How it works
Device Control module is the first layer of security provided by Endpoint Protector.
By defining granular access rights for USB and peripheral ports, device security is enforced while productivity is maintained.
As a cross-platform solution, it protects the entire network, regardless of if the computers are running on Windows, Mac OS X, or Linux.
Benefits & capabilities
Cross-platform, lightweight agent
Remotely monitor USBs and peripheral ports from a simple web-based interface with no performance impact on the protected computers. Set policies with ease for Windows, macOS and Linux.
Remote and temporary access
Grant USB access remotely, even when computers are offline, while having a complete list of log reports once back in the network.
Precise and granular control
Depending on departments’ requirements, specify which devices can or cannot be used, create device whitelists and blacklists, and define policies per user, computer, or group for uninterrupted workflow throughout the company.