Available for Both Standard and Professional Editions
Secure user environments aren't only about the software and permissions configured for a user. They're also about the devices each user can introduce into that configuration. The Desktop Authority USB and Port Security component controls both device usage (like flash drives, printers, cameras and mobile devices) as well as port access (such as serial, infrared, USB and more) - all according to each user's unique levels of authentication and access.
Experience the benefits of this component when you try the Standard or Professional editions of Desktop Authority!
Detailed Device Lists: The USB and Port Security component categorizes devices into more than 20 different types to ensure secure and accurate control over those allowed and those prohibited. Device types include a broad range of USBs, plus Bluetooth and external hard drives, while port types include USB, infrared and serial.
Granular Device Control: The USB and Port Security component lets you choose which individual devices you allow or prohibit. An exceptions list allows you to enter information for any given device—such as vendor and product IDs—to override rules and permit a connection to specific flash drive or scanner, for example. You can even allow only a single USB flash drive for a specific user.
Real-time Targeting Criteria: The USB and Port Security component uses Validation Logic to help you target settings precisely to your users’ needs via a simple interface. You can leverage more than 40 rule criteria and 150 variables that are updated automatically in real time.
No Learning Curve: The USB and Port Security component simplifies device tracking with an intuitive user interface. You can set device permissions for a certain desktop just how you set Windows file permissions: simply select Read, Write, Full Access or Full Deny. You’ll quickly identify exactly which devices belong on your network.
Intelligent USB Whitelisting/Blacklisting: The USB and Port Security component allows you to either set policy through whitelists (blocking everything and then explicitly allowing certain devices) or through blacklists (where the disallowed devices are explicitly entered).