It is one of the most effective ways to protect your endpoint. We use DriveLock’s whitelist function to prevent unknown and unwanted programs from running in your system. Only trusted applications and installers included in the whitelist could take actions on the computers. All other applications are blocked.
Cyber Crimes that Application Control can prevent:
- Zero-day Exploits
By Scanning the network and endpoints, vulnerabilities of the system could be detected automatically. Then, further action could be taken to recover the vulnerabilities.
Endpoints could be monitored in real-time.
Research shows that 80% of employees used to copy data from or to USB drives, mobile devices and other devices through USB ports of the organization’s endpoints. In this way, malware could be easily transferred into the organization’s IT systems and spread within the whole system.
External drives and devices could be considered as threats to the IT system as employees with purposes could use it to steal data assets.
We are here to help to manage the external storage and other devices. They will be strictly controlled and logged when they access the organization’s IT system. Data transactions between USB and the organization’s IT system are monitored all the time. Organization’s sensitive data are prevented from being transferred to external media.
Examples of Device Control:
- Only permitted external devices and storages could be connected to the organisation’s IT system
- Sensitive data are not allowed to be transferred to or from external devices
- Data transferred only allowed for authorised roles
- Encrypted data transfers