Device Control.

The Device Control module allows management of the most commonly used device types and simplifies IT Administrators’ lives in several ways.

The Device Control module is the first layer of security provided by Endpoint Protector. By defining granular access rights for USB and peripheral ports, device security is enforced while productivity is maintained. As a cross-platform solution, it protects the entire network, regardless if the computers are running on Windows, Mac OS X or Linux.

* Your data is secure and will not be shared with any 3rd party. 

Controlled Device Types

  • USB Storage Devices (USB Flash Drives, Sticks, Pen drives, etc.)

  • External HDDs (incl. sATA HDDs)

  • CD/DVD-Players and Burners (internal and external)

  • iPhones, iPads and iPods

  • Smartphones and Tablets (incl. Android devices, Blackberry and PDAs)

  • Digital Cameras

  • MP3 Player and other Media Player Devices

  • Card Readers (internal and external)

  • Memory Cards (SD, MMC, CF, Smartcard, etc.)

  • Printers

  • Floppy Drives

  • Webcams

  • WiFi Network Cards

  • FireWire Devices

  • Biometric Devices

  • Bluetooth Devices

  • ZIP Drives

  • ExpressCard SSD

  • Wireless USB

  • Serial Port

  • Teensy Board

  • PCMCIA Storage Devices

  • Thunderbolt

  • Network Share

  • Thin Client Storage (RDP Storage)

  • Additional Keyboards

  • USB Modems

  • Infrared Dongle

Extremely Versatile

Providing all employees with the same device access rights may not work in every situation. Depending on the department and day to day tasks, different permissions could be required. The Marketing Department may need to use Digital Cameras while the Accounts Payable should not.

Increased productivity

Not just a result of the simple web-based interface and the granularity of Endpoint Protector, productivity can also be increased through the use of whitelisted devices. The company issued devices can be allowed throughout the entire company.

Enforced Encryption

Taking advantage of everything Device Control has to offer, enhance security one step further by implementing Enforced Encryption. With USB and peripheral ports already under control, ensure that all USB mass storage devices used throughout the organization are encrypted.

ASD
Servicing Resellers and End Users Across Africa and Indian Ocean Islands