- Advanced Configuration
- Advanced Monitoring and Alerting
- App Delivery & Patching
- Application & Service Catalog
- Application Control
- Apps, Browsers, & Java Security
- Attack Path Modeling
- Auditing Devices & Drives
- Autonomous Response
- Change Auditing
- Data Classification
- Data Detection
- Data Filtering
- Data Tagging
- Desktop Automation & Connectivity
- Device Control
- Encryption of Full Disks
- Encryption of Removable Media
- GPO Compliance
- GPO Reductions & Transitions
- Hardware and Software Inventory for Windows
- Integration Services
- Intelligence Augmentation
- Layer 2 Visualization
- Least Privilege Management
- Monitoring Logs, Servers, Virtualization and Applications
- Monitoring Platform
- Network Profiles
- Password Policy Enforcer
- Port Control
- Privileged Account Management
- Self-Learning AI
- Shadowing
- SNMP & Core Monitoring
- Traffic Flow Analyzer
- Windows 10 & 11 Management
If you do not control your computer ports, you give the possibility of unauthorized peripheral devices being connected to your computer ports with all associated risks. As well as data transfer from the network to a peripheral device with risk of information theft or leakage, as well as in opposite direction with virus contamination or unwanted private photos in your network. DriveLock Standard gives you complete control over who is authorized to connect which device to your available USB or wireless computer ports.
This product covers also the following themes: Data FilteringDevice ControlAuditing Devices & DrivesEncryption of Full DisksApplication ControlEncryption of Removable MediaNetwork ProfilesShadowing Description:-
Blocks most port types (USB controllers, PCMCIA controllers controllers 1394/Firewire infrared controllers, serial (COM) and parallel (LPT) ports)
-
Configurable whitelists to authorize access to peripherals (type or model)
-
Separate access lists can be defined for each peripheral device or a group of peripherals
-
Access can be given to users and user groups
-
Full integration with Active Directory and Group Policy
-
Supports other network operating systems (Novell NetWare, Linux)
-
Dynamic policy is enforced when another user logs into the network