Identification, Logical access control
Range of products covered by our manufacturing facilities:Cylindrical Broaches: Maximum diameter 250 mm. Maximum length 2.500 mm. Flat Broaches: Maximum dimensions 300x100 mm. Maximum length 2.500 mm....
Many peripheral devices possess dozens of gigabytes of portable storage space; large enough to store all the data found in a typical PC. A malicious user can swipe volumes of sensitive data with a few drag-and-drops. In a coffee shop or airline lounge, a laptop left unattended for even a few moments could be breached – without the user ever knowing it and without any audit trail for administrators to track.
With I/O device control you can:
- Protect against IP theft, fraud and data loss
- Ensure that data remains on PC and cannot be removed without permission
- Create policies to block or restrict various I/O operations
- Password protect all peripheral operations
- Guarantee that removed data is encrypted – if device or media is lost or stolen, data still protected.
- Protect against malware introduced via removable media
- Ensure compliance with HIPAA, SOX, GLBA, and other regulations
INTERNET USERS ALSO CONSULTED ON THE CATEGORY IDENTIFICATION, LOGICAL ACCESS CONTROL
See also