Centralized Device Control

Centralized
Device Control

The Endpoint Protector 4 Web administration and reporting console offers you a complete overview of the device activity on your computers, whether you work with Windows, Mac or Linux platforms. You will be able to define access policies per user/computer/device and authorize devices for certain user or user groups. Thus, your company will stay productive while maintaining control over the device fleet use.

 

Centralized Device Control

Controlled Device Types


  • USB Devices
  • USB Flash Drives (Normal USB Drives, U3, etc.)
  • iPhones / iPads / iPods
  • Smartphones/ Tablets (incl. Android devices) / Blackberry / PDAs
  • Digital Cameras
  • MP3 Player / Media Player Devices
  • CD/DVD-Player/Burner (internal and external)
  • Memory Cards (SD, MMC, CF, Smartcard, etc.)
  • external HDDs (incl. sATA HDDs)
  • Printers
  • Floppy Drives
  • Card Readers (internal and external)
  • Webcams
  • WiFi Network Cards
  • FireWire Devices
  • Biometric Devices
  • Bluetooth Devices
  • ZIP Drives
  • ExpressCard SSD
  • Wireless USB
  • Serial Port
  • Teensy Board
  • PCMCIA Storage Devices
  • Thunderbolt
  • Network Share

Device Whitelisting

Allow or block access on computers for any device based just on its serial number. The Device White-listing feature enables you to assign permissions for devices to users or user groups and workstations. By default, the not allowed devices are automatically blocked by the Endpoint Protector Security Agent. This feature will help you eliminate unknown or unwanted devices in your network, reducing the risk for data leakage and data theft as well as the risk for infecting with unwanted malware.

Device Type-Based Policies

The device type based policies reflect Endpoint Protector’s ability to apply different security policies based on the type of device being used. Whenever the user connects a device, Endpoint Protector knows automatically if it’s a USB device, iPhone, iPad or other type of device. This will allow you to apply more or less rigorous policies on PCs, users or groups depending on what devices are allowed to connect to the protected PC. Certain user groups like a specific company department can use, for example, USB devices that are required for everyday work, while other user groups are not able to connect them to their protected work computers.

Protection Against U3 and Other Autorun Devices

Endpoint Protector is able to protect against and block U3 and other autorun devices that could potentially host malware and other malicious self-executing code. This is an important feature because it can prevent automatic system infections through malware or Trojans.

Related Articles