Prevent data leakage from connected devices or networks

Device blocking and connection control are key components of endpoint security that let you monitor and restrict access for I/O devices. Control data access to ports and devices such as Bluetooth, modems, drives, network volumes, and wireless connections.

USB device blocking

Restricts the use of storage and smart devices by making them read-only, blocking or disabling them entirely, or forcing encryption.

Wireless access blocking

Blocks access from bridging networks and wireless channels such as 802.11x and Bluetooth.

Shadow Copy

Monitors and reports files copied to peripheral devices to prevent data leakage on CD-ROMs, DVDs, and other portable media.