top of page
EPP DLP.jpg
halodata Device Control cososys4.jpg

Gain full control of USB devices and peripheral ports

The centrally-managed Device Control module allows full control of the USB ports and connected storage devices.

This way, it prevents accidental or intentional data loss and data leaks,

while also protecting the endpoints against the spread of USB malware, BadUSB attacks or viruses.

Endpoint-Protector-Device-Control-1-EN.p
Endpoint-Protector-Device-Control-2-EN (

How it works

Device Control module is the first layer of security provided by Endpoint Protector.

 

By defining granular access rights for USB and peripheral ports, device security is enforced while productivity is maintained.

 

As a cross-platform solution, it protects the entire network, regardless of if the computers are running on Windows, Mac OS X, or Linux.

Features

Key Features

usb-port.png

Set granular policies and monitor all USB ports and devices on all endpoints

encrypt.png

Block unauthorized device use or enforce data encryption remotely

usb.png

Uniquely identify all USB conected devices

survey.png

Get reports and alerts regarding USB activity on all endpoints

Benefits & capabilities

Benefits
ios.png

Cross-platform, lightweight agent

Remotely monitor USBs and peripheral ports from a simple web-based interface with no performance impact on the protected computers. Set policies with ease for Windows, macOS and Linux.

remote-access.png

Remote and temporary access

Grant USB access remotely, even when computers are offline, while having a complete list of log reports once back in the network.

remote-access2.png

Precise and granular control

Depending on departments’ requirements, specify which devices can or cannot be used, create device whitelists and blacklists, and define policies per user, computer, or group for uninterrupted workflow throughout the company.

Even stronger with Enforced Encryption.
Taking advantage of everything Device Control has to offer, enhance security one step further by implementing Enforced Encryption. With USB and peripheral ports already under control, ensure that all USB mass storage devices used throughout the organization are encrypted.

PROUDLY ASSOCIATED WITH

halodata AiTI.jpg
sgtech.png
iapp.png
PIKOM-HugeLogo-01.png
unnamed (1).jpg
Singapore

Halodata International Pte Ltd​

100 Pasir Panjang Road #05-09

Singapore 118518

Contact:

+65-6336-7537

Email:

sgsupport@halodata.biz

  • Facebook
  • LinkedIn
Image by Patrick Langwallner

PT. Halodata Indonesia

HQ Office :
Ruko Marinatama E-23,

Jl. Gunung Sahari Raya No. 2,
Jakarta 14420, Indonesia

 

The Mansion Bougenville Fontana
Unit BF-29D2
Jl. Trembesi Blok D, Pademangan Timur, Jakarta 14410

Contact:

+6221-641-2784

Email:

its@halodata.biz

Image by Afif Kusuma

Halodata Infokom Sdn. Bhd.

Suite 15, A-3-2, Block A, Plaza Arkadia, Jalan Intisari Perdana, Desa Parkcity, 52200 Kuala Lumpur, Malaysia.

Contact:

+60-374-935-093

Email:

mysupport@halodata.biz

© Copyright 2021 Halodata International Pte Ltd. All Rights Reserved.

bottom of page