Detailed Device Lists
The USB and Port Security component categorizes devices into more than 20 different types to ensure secure and accurate control over those allowed and those prohibited. Device types include a broad range of USBs, plus Bluetooth and external hard drives, while port types include USB, infrared and serial.
Granular Device Control
The USB and Port Security component lets you choose which individual devices you allow or prohibit. An exceptions list allows you to enter information for any given device¿such as vendor and product IDs¿to override rules and permit a connection to specific flash drive or scanner, for example. You can even allow only a single USB flash drive for a specific user.
Real-time Targeting Criteria
The USB and Port Security component uses Validation Logic to help you target settings precisely to your users¿ needs via a simple interface. You can leverage more than 40 rule criteria and 150 variables that are updated automatically in real time.
No Learning Curve
The USB and Port Security component simplifies device tracking with an intuitive user interface. You can set device permissions for a certain desktop just how you set Windows file permissions: simply select Read, Write, Full Access or Full Deny. You¿ll quickly identify exactly which devices belong on your network.
Intelligent USB Whitelisting/Blacklisting
The USB and Port Security component allows you to either set policy through whitelists (blocking everything and then explicitly allowing certain devices) or through blacklists (where the disallowed devices are explicitly entered).