Device blocking and connection control are key components of endpoint security that let you monitor and restrict access for I/O devices. Control data access to ports and devices such as Bluetooth, modems, drives, network volumes, and wireless connections.
Restricts the use of storage and smart devices by making them read-only, blocking or disabling them entirely, or forcing encryption.
Blocks access from bridging networks and wireless channels such as 802.11x and Bluetooth.
Monitors and reports files copied to peripheral devices to prevent data leakage on CD-ROMs, DVDs, and other portable media.
Free Analyst Reports