- Advanced Configuration
- Advanced Monitoring and Alerting
- Antivirus
- App Delivery & Patching
- Application & Service Catalog
- Application Control
- Apps, Browsers, & Java Security
- Auditing Devices & Drives
- Change Auditing
- Cloud Detection and Response for M365
- Cloud Detection and Response for Public Cloud
- Data Classification
- Data Detection
- Data Filtering
- Data Tagging
- Desktop Automation & Connectivity
- Device Control
- Encryption of Full Disks
- Encryption of Removable Media
- GPO Compliance
- GPO Reductions & Transitions
- Hardware and Software Inventory for Windows
- Identity Threat Detection and Response (IDR) for Azure AD
- Inbound Email Security
- Integration Services
- Layer 2 Visualization
- Least Privilege Management
- Managed Detection and Response (MDR)
- Monitoring Logs, Servers, Virtualization and Applications
- Monitoring Platform
- Network Detection and Response (NDR)
- Network Profiles
- Outbound Email Security
- Password Manager
- Password Policy Enforcer
- Port Control
- Privileged Account Management
- Shadowing
- SNMP & Core Monitoring
- Traffic Flow Analyzer
- Windows 10 & 11 Management
If you do not control your computer ports, you give the possibility of unauthorized peripheral devices being connected to your computer ports with all associated risks. As well as data transfer from the network to a peripheral device with risk of information theft or leakage, as well as in opposite direction with virus contamination or unwanted private photos in your network. DriveLock Standard gives you complete control over who is authorized to connect which device to your available USB or wireless computer ports.
This product covers also the following themes: Data FilteringDevice ControlAuditing Devices & DrivesEncryption of Full DisksApplication ControlEncryption of Removable MediaNetwork ProfilesShadowing Features:-
Blocks most port types (USB controllers, PCMCIA controllers controllers 1394/Firewire infrared controllers, serial (COM) and parallel (LPT) ports)
-
Configurable whitelists to authorize access to peripherals (type or model)
-
Separate access lists can be defined for each peripheral device or a group of peripherals
-
Access can be given to users and user groups
-
Full integration with Active Directory and Group Policy
-
Supports other network operating systems (Novell NetWare, Linux)
-
Dynamic policy is enforced when another user logs into the network