Space banner

   

This version of the product has reached end of support. The documentation is available for your convenience. However, you must be logged in to access it. You will not be able to leave comments.

Managing peripheral devices

Data leakage or privacy breaches can cripple your organization. Yet many companies focus on external threats while forgetting to protect against internal risks, such as those that arise from the proliferation of removable devices.

Peripheral Device Management protects your business through effective device management and lockdown of unauthorized devices, such as USB drives, cell phones, portable hard drives, and music players:

  • Block use of prohibited external devices
  • Understand and manage all removable devices on your network
  • Manage inbound and outbound communication from all endpoints

Related topics

Was this page helpful? Yes No Submitting... Thank you

Comments