Controlled Device Types are: USB Flash Drives (Normal USB Drives, U3, etc.) All portable storage devices such as USB Flash Drives, iPods, MP3 Players, digital cameras, portable HDDs, mobile phones and other devices pose a threat when connected to your PC because any of them can be used to leak your data in just seconds. Gain full control over your laptop’s endpoint devices, everywhere you are: at the office, on the road or in an airport. With its ability to uniquely identify devices you can be sure that you are in control, no 3rd party can use your USB ports to copy data from your computer or to place potential malicious files on it. Endpoint Protector Basic installs on your PC and helps you manage your USB device fleet and also to control what devices are authorized to connect to your computer. The best companion for your application firewall, Endpoint Protector Basic is designed to protect your computer’s endpoints acting as a USB firewall. This will protect them against unwanted use of portable storage devices like USB sticks, SD cards or portable hard drives to prevent data theft or data leaks. To protect your PC, we recommend to use Endpoint Protector Basic to monitor and control ports and interfaces such as USB, FireWire, card reader, CD / DVD, etc on your PC.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |