Thanks!
We'll let you know once the beta is good to go.

  • 1
     
    Single pane reporting and blocking

    View detailed reports of blocked USB devices and unblock them easily from the same window.

    Single pane reporting and blocking
  • 1
     
    Custom-made profiles

    Create device control profiles that can restrict USB file actions and personalize them to your requirements.

    Custom-made profiles
  • 1
     
    Block suspicious USB devices

    Use the device instance path to configure a blocklist and stop the use of threatening USB devices.

    Block suspicious USB devices
  • Track removable device use

    Gain insights into USB device use in your organization with details such as what action was attempted, when it was performed, by whom, and more.

  • Control USB file activities

    Restrict exclusive file actions such as read, write, and execute action on USBs—either individually or all together—to hinder malware infiltration and prevent data leaks.

  • Blocklist USB devices

    Create a list of all removable storage devices that need to be banned using their device instance paths, and block them using suitable policies.

  • Block and unblock USB ports

    Block USB ports as a response to unauthorized devices using them for data transfer attempts, and unblock them easily from the reports.

Stop unauthorized USB transfers by monitoring USB device use and blocking USB ports using our USB monitoring tool