Prevent data leakage to portable devices
Assess the risk and mitigate it by controlling, auditing and securing access to removable devices at endpoint level.
- Control data transfers based on the real file type and contents
- Protects data on the move with removable volume encryption
- Block devices by class, file extensions, physical port or device ID
- Grant temporary device or port access for a stipulated timeframe
- Sends users custom popup messages when they are blocked from using a device
- Scans and detects a list of devices that have been used or are currently still in use
- Computer auto-discovery
- Portable device usage reporting
- Group-based protection configuration
- Status monitoring and alerts
- Log the activity of portable device access to your network
- Deployment of a hidden, small footprint agent on the machine
- Whitelisting and blacklisting
- Supports Windows 2000 (SP4), XP, 2003, Vista, 7 and 2008, Windows 8, Windows 10 and 2012 Server (x86 and x64 versions)
For detailed information please click here.
Brochure | PowerPoint | White Paper | Award