|
Symantec Endpoint Encryption Device Control
Device control software
Symantec Endpoint Encryption Device Control software enables organizations to monitor device usage and file transfer activity, control access to ports, devices, and wireless networks, as well as to restrict user’s ability to copy protected information to removable media.
When implemented with Symantec Endpoint Encryption Removable Storage Edition, the combination provides protection for enterprise data on endpoints from the risks associated with USB security, as well as other portable devices and media.
|
New Features
USB 3.0, eSATA,
and ExpressCard
support
Provides
expanded device
controller
support for
greater control
of endpoint
environment.
Granular control
of iOS devices
-
Allow or
block iPhone
-
Allow or
block iPad
-
Allow or
block iPod
Increased
confidence for
protecting your
data
By restricting
CD/DVD burning
to Symantec
Endpoint
Encryption
Removable
Storage Edition
only, you can
ensure that data
burned to CD/DVD
is encrypted or
completely
blocked.
User- and
computer- based
policies
Enforce policies
specific to
end-users or
computers.
-
Computer
based policy
ensures that
the desired
controls are
in place,
regardless
of what user
has logged
onto the
computer
-
User based
policy allow
for
user-specific
policies to
be applied
regardless
of the
computer
that that
the users
are logged
onto
Easier
management of
user policies
Native
client-server
policy
distribution (in
addition to
Active Directory
GPO and registry
key-based
methods) enable
you to have
policies that
are distributed
directly from
the Device
Control
Management
Server to the
Device Control
clients.
Key Features
-
Use device
control software
to allow,
disable, or
restrict read
and write access
to external
ports, including
USB, FireWire,
PCMCIA, Secure
Digital,
parallel, and
serial
-
Provide USB
security and
restrict data
transfer
activity for a
range of storage
devices,
including
external hard
disks, optical
media, floppy
drives and tape
drives
-
Shadow, monitor,
alert, report
and query for
port/device
connections,
usage, network
connections and
file transfers
-
Enforce wireless
connection
control,
including Wi-Fi,
Bluetooth, and
IrDA connections
Key Benefits
-
Discover and
mitigate
unauthorized
transfer of data
-
Device control
allows
businesses to
decrease risks
associated with
the loss or
leakage of trade
secrets,
intellectual
property and
private
information
-
Ensure removable
device and USB
security by
allowing only
authorized file
transfers to
approved
portable media
-
Specify file
types allowed to
be read/written
to devices
-
Provide logging
and auditing
-
Control
connections to
untrusted or
insecure access
points
-
Prevent
wired-to-wireless
LAN bridging
|
Operating System
Device Control
management server
- Windows Server
2003 (32-bit only; R2 is supported) or 2008 (32-
and 64-bit; R2 is supported)
- Active Directory
domain member highly recommended (eDirectory is
supported)
- VMware ESX/ESXi
3.x and 4.x is supported
Device Control
management console
- Windows 7 32-bit
and 64-bit
- Windows Server
2008 R2 64-bit
- Windows Server
2008 32-bit and 64-bit
- Windows Vista
32-bit only
- Windows Server
2003 R2 32-bit
- Windows Server
2003 32-bit
- Windows XP
32-bit
Database Server
- Microsoft SQL
Server 2005 or 2008 (32- or 64-bit; R2 is
supported)
Device Control Agent
- Windows 7 32-bit
and 64-bit
- Windows Server
2008 R2 64-bit
- Windows Server
2008 32-bit and 64-bit
- Windows Vista
32-bit only
- Windows Server
2003 R2 32-bit
- Windows Server
2003 32-bit
- Windows XP
32-bit
Device Control Auditor
- Windows 7 32-bit
- Windows Server 2008
32-bit
- Windows Vista 32-bit
only
- Windows Server 2003
R2 32-bit
- Windows Server 2003
32-bit
- Windows XP 32-bit
|
Add-ons
Device Control Auditor
Device Control Auditor gives
organizations immediate, actionable facts about the devices and
Wi-Fi networks that PCs are connecting to in an enterprise
network, enabling IT staff to identify real and potential
threats to private, sensitive and protected data.
- Fast, comprehensive
reporting of all external media devices and Wi-FI network
connections
- Agentless operation
- Precise, current and
historical device, network and port connections
- Integrated with Symantec
Endpoint Encryption Device
|
|
|
|
|