Cookie Policy
We use cookies to improve your experience on our website. If you continue without changing your cookie settings on your browser, we'll assume that you are happy to receive all cookies on the Zycko website. To learn more about how we use cookies, please see our cookie policy.
 
 
  • Device Control

Device Control: USB Lockdown for Windows, Mac and Linux

Endpoint Protector 4 The extended use of portable devices has not only increased the efficiency and mobility of our daily work tasks, but at the same time has posed another significant threat to companies’ data security. USB devices and other portable devices, although small and at a first glance harmless, are one of the top causes for security incidents with millions of dollars in losses for business. The need of controlling the use of devices in corporate environments has become nowadays a must in order to keep up with latest security challenges.

The Device Control module allows monitoring, controlling or blocking USB storage devices and peripheral ports. It prevents data loss and data leaks, ensures compliance while also preventing the spread of USB malware and viruses. Being a cross-platform solution, it can be deployed into any type o network as hardware appliance, virtual appliance or cloud-based solution, protecting Windows, Mac and Linux endpoints.

While Device Control provides the first layer of security, the Content Aware Protection module is also available.

What we prevent?

- Intentional Data Theft 
- Accidental Data Loss or Data Leakage
- Spreading of USB bound malware and viruses 
such as Conficker, Stuxnet, Duqu etc

How we prevent?

1. Block ports and devices 
2. Control device use
3. Monitor data transfers
4. Report all device and data transfers
5. Enforce encryption on trusted devices

 

How it works?

Define and enforce device control policy   Monitor all ports and device activity on endpoints   Action is taken. Either to block device use or monitor or enforce encryption use   All actions are logged, reported or even alerte
 

Benefits

Protect the entire network   Hassle free
USB monitor and lockdown for Windows, Mac and Linux   End the headaches of configuration and deployment
     
Easy to use   Full reporting for monitoring and audits
With a small learning curve, manage policies and activities from a single dashboard   View activity history in great graphics or create reports for executives
     
Protection outside the corporate network   Scalable
Grant USB access remotely and have access to complete log reports when computer reconnects to the network   Enterprise-grade scalability starting with just a few or up to thousands of endpoints without sacrificing performance
     
Cost effective   Precise and extremely granular control
Based on your specific requirements, choose the best way to deploy our solutions in your network   Specify which devices can and cannot be used, create device white lists, define rights per user or computer, group and more
     
Support business needs   Ensures business continuity
Proven solution with constant improvements and features that adapt to an ever-changing market   Eliminate operational down time and stay compliant with EU and other regulatory institutions

 

Back to Top
For more information:
Contact our specialist teams
 
 
For a database of user manual, datasheet, or software update, please access the Resource Centre