By using this site you agree to the use of cookies. Learn more OK

Features Device Control

Secure control via media, devices and port access

Use baramundi Device Control to control the flow of data between devices and access to disks. The white-list concept ensures that only authorized devices can access networks, laptops, thin clients or desktops. Administrators use baramundi Device Control to identify devices clearly and assign them individual access rights. These could be assigned for a category of devices, a certain device or a specific medium and affect individual users, whole user groups or certain computers. Access rights are managed centrally via a transparent interface with a tree structure that is easy to use.

Encrypt Mobile Devices Securely

Central and local encryption schemas provide administrators with the necessary flexibility to encrypt mobile media from a central location or also to enable users to encrypt their own mobile media. Stolen disks are thereby protected from unauthorized access. This means – and this is of utmost importance– you can check the use of encrypted media comprehensively and reliably.

Protect Data Flexibly and Securely

Use baramundi Device Control to

  • Regulate and control access to data and devices within the company
  • Protect and encrypt mobile devices
  • Ensure the company regulations for data protection are complied with

baramundi Device Control provides you with a wide range of sophisticated features, for example:

White list: Only authorized devices receive access permissions. Unknown or unauthorized devices are automatically excluded.

User rights: Detailed user rights can be assigned based on the user’s login data and therefore regardless of device.

Media identification: Media such as DVDs can be clearly identified and assigned rights. This can, for example, restrict access to media that meet a defined company standard. Unauthorized content is not displayed.

Block for key loggers: PS/2 and USB ports can check USB keyboards. Attacks from all common USB key loggers are securely blocked.

File type filter: Define precisely which file types can be read and written. The control is carried out very reliably via the file header and not just via the extension. This means you reduce the risk of unwanted files intruding and also the risk of data being copied without permission.

Scalable architecture: The extremely scalable architecture on a multi-tier basis enables easy implementation, even in complex network structures.

Comprehensive reports: All actions can be logged extensively and evaluated in detail. Many filter, sorting and display options ensure you have an optimum overview. This means you can always check compliance with guidelines or inspect suspicious behavior in order to be able to adopt technical and legal steps in good time.

Quantity limit: Restrict the data volume that a user may copy and thereby prevent the loss of large volumes of confidential data.

Flexible encryption: Administrators can encrypt data centrally or enforce data encryption by users. This ensures that sensitive data is protected even in the event of unauthorized physical access to the disks.

Protects remote PCs: User rights can be defined on remote PCs or offline devices through a local copy of the rights. This means that devices that are not online in the network at that moment are securely protected.

To top