DLP Device Control Software



With any removable device such as USB, data theft is a one-step process: plug it in. ManageEngine Device Control Plus is a comprehensive data leakage prevention solution that allows you to control, block and monitor USB and peripheral devices from having unauthorized access to your sensitive data.

Device Control Plus can be leveraged by IT administrators to gain comprehensive control over the numerous peripheral devices within their networks. This robust software solution includes a distinct set of features that enables the creation of flexible file access and transfer control policies. Therefore, by assigning the appropriate level of device permissions, all data transfers conducted via built-in and external devices can be meticulously tracked and regulated.

Device Control Plus is essential for averting data loss through USB and removable media, and is designed so that both preventative and restorative measures can be implemented effectively. This data leakage prevention tool features capabilities such as blacklisting and blocking data access, which are two of its many methods to deter file-based attacks. In the event of any emergency, out-of-box protocols like file tracing and file shadowing can also be adopted to ensure the diligent preservation of network integrity and retention of brand value.

Features

Everything you need to control, block and monitor USB and peripheral devices.



Device & port control
Device & Port Control

Control all ports and connected removable devices, block unauthorized access to your data and monitor all device & file actions effectively.

File access control
File Access Control

Prevent data loss with strict role based access control policies - set read only permission, block copying of data from devices and do more.

File Transfer Control
File Transfer Control

Curb unprecedented data transfers - limit file transfers by setting the maximum file size and type of file that can be transferred from your computer.

Trusted Device List
Trusted Device List

Create exclusive access for devices to access your computer by adding them to the trusted device list.

Temporary access
Temporary Access

Create secure and temporary access for devices to access your computers when they want to access what they want to access

Reports and Audits
Reports and Audits

Maintain records of devices, users and computers that are managed. View all device actions and data usage activities.

File Shadowing
File Shadowing

Effectively secure files involved in data transfer operations by creating and storing mirror copies in password-protected shares.

File Tracing
File Tracing

Monitor file actions in real time, record salient details such as file names and locations along with the computers, devices and users involved.

Get Quote