Comprehensive Data Loss Protection

Device Control

Features

How it Works

CoSoSys DLP Modules

Industries

APPLY FOR PARTNERSHIP

Thank you for your interest. Kindly fill out the details below and we will contact you back soon.

Contact Us

Please complete this form to be contacted by one of our experts.

  1. Home
  2. /
  3. Vendors
  4. /
  5. CoSoSys
  6. /
  7. Device Control

Device Control

TO PREVENT DATA THEFT AND LOSS, SECURE, REGULATE, AND MONITOR USB AND PERIPHERAL PORTS.

Is your confidential information at risk?

Although USB flash drives and other portable USB devices appear to be innocent, they are one of the leading causes of security incidents, resulting in significant damage to any firm. Damages might range from the theft of personal data to massive fines for violations of compliance standards and regulations.

Cross-platform, Lightweight Agent

Monitor USBs and accessory ports remotely using a simple web-based interface without influencing the protected machines’ performance. Create policies for Windows, macOS, and Linux with ease.

Remote and Temporary Access

Allow remote USB access, even when computers are not connected to the network while maintaining a comprehensive set of log reports once connected.

Precise and Granular Control

Specify which devices are permitted or prohibited for use based on departmental needs, construct device whitelists and blacklists, and configure policies by user, computer, or group to ensure uninterrupted workflow throughout the organisation.

Gain Full Control Of USB Devices & Peripheral Ports

The centrally managed Device Control module allows complete control of the USB ports and connected storage devices. This way, it prevents accidental or intentional data loss and data leaks while protecting the endpoints against the spread of USB malware, BadUSB attacks, or viruses.

 

Click image to view full size

How It Works?

Endpoint Protector’s Device Control module provides the initial layer of security. Device security is enforced while productivity is maintained by specifying granular access privileges for USB and peripheral ports. It protects the entire network as a cross-platform solution, regardless of whether the computers are running Windows, Mac OS X, or Linux.

Set granular policies and monitor all USB ports and
devices on all endpoints

Uniquely identify all USB conected devices

Block unauthorised device use or enforce data
encryption remotely

Get reports and alerts regarding USB activity on all
endpoints

Controlled Device Types

The Device Control module allows easy management for the majority of known USB device types, for enhanced data protection in various work environments.

  • USB Storage Devices (USB Flash Drives, Sticks, Pen drives, etc.)
  • External HDDs (incl. sATA HDDs)
  • CD/DVD-Players and Burners (internal and external)
  • iPhones, iPads and iPods
  • Smartphones and Tablets (incl. Android devices, Blackberry and PDAs) 
  • Digital Cameras
  • MP3 Player and other Media Player Devices
  • Card Readers (internal and external)
  • Memory Cards (SD, MMC, CF, Smartcard, etc.)
  • Printers
  • Floppy Drives
  • Webcams
  • WiFi Network Cards
  • FireWire Devices
  • Biometric Devices
  • Bluetooth Devices
  • ZIP Drives
  • ExpressCard SSD
  • Wireless USB
  • Serial Port
  • Teensy Board
  • PCMCIA Storage Devices
  • Thunderbolt
  • Network Share
  • Thin Client Storage (RDP Storage)
  • Additional Keyboards
  • USB Modems
  • Infrared Dongle

Industries

Learn how CoSoSys is helping organizations across the world.

It’s Time to Get Started with Halodata

Request Demo

Contact Us

Please complete this form to be contacted by one of our experts.

Talk to one of our experts and discover the benefits of Halodata for your company.