Unsupported content

 

This version of the product is in limited support. However, the documentation is available for your convenience. You will not be able to leave comments.

Managing peripheral devices

Data leakage or privacy breaches can cripple your organization. Yet many companies focus on external threats while forgetting to protect against internal risks, such as those that arise from the proliferation of removable devices.

Peripheral Device Management protects your business through effective device management and lockdown of unauthorized devices, such as USB drives, cell phones, portable hard drives, and music players:

  • Block use of prohibited external devices
  • Understand and manage all removable devices on your network
  • Manage inbound and outbound communication from all endpoints

Related topics

This version of the documentation is no longer supported. However, the documentation is available for your convenience. You will not be able to leave comments.

Comments