Endpoint Protector Device Control

Categories: , , Tag:


Lockdown, control, and monitor USB and peripheral ports to stop data theft and data loss.

USB flash drives and other portable USB devices, although harmless at a first glance, are one of the top causes for security incidents which can cause major damages to any business. Damages range from confidential data being stolen to huge fines due to violations of compliance rules and regulations.

  • Cross-platform, lightweight agent
    Remotely monitor USBs and peripheral ports from a simple web-based interface with no performance impact on the protected computers. Set policies with ease for Windows, macOS and Linux.
  • Remote and temporary access
    Grant USB access remotely, even when computers are offline, while having a complete list of log reports once back in the network.
  • Precise and granular control
    Depending on departments’ requirements, specify which devices can or cannot be used, create device whitelists and blacklists, and define policies per user, computer, or group for uninterrupted workflow throughout the company.


Find all CoSoSys solutions at the following link: https://www.qbssoftware.fr/en/category/cososys-en/