Data loss prevention (DLP) Solution
What is Device Control Plus?
Safeguard data from intruders
Crack down on devices with excessive access privileges.
Set read-only access, block copying of files from removable devices, and do more with simple policies designed to get you started right away.
Role-based access control (RBAC) is the technique of assigning access rights to the users in your organization based on their roles and the tasks they perform. This ensures that users and computers can have only access levels that they pertain to.
Uninterrupted device control
Automatically keep tabs on unprecedented data transfers.
Ensure on-time data protection and allow limited data transfer by setting restrictions to file size and file type based on the data your business handles.
Data loss prevention (DLP) is the practice of protecting your data from falling into the wrong hands. The major problem with data transfer these days is leaving a large amount of data open to excessively unauthorized transfers. By setting up proper security boundaries, you can control the movement of data in your business. Because your data is highly valuable, you need to focus on allowing only relevant and limited transfers with the help of a device control solution.
Device Control Plus is a comprehensive DLP solution that curbs unnecessary data transfers, thus eliminating data loss and data theft.
Eliminate data loss forever
Control devices with Zero trust approach.
Identifying and blocking malicious devices is tedious. Instead, create a trusted device list which ensures no device, unless authorized, can ever gain access to your endpoints.
What is Zero Trust? Traditional security models work on the assumption that everything inside an organization can be trusted, thereby providing more opportunities for insider attacks. A Zero Trust approach continuously assesses trust every time a device requests access to your endpoint.
Right acesss, right time
Get your work done with third-party devices instantly.
Whether the device is inside your network perimeter or not, instantly grant temporary access for a specific amount of time to avoid hurting employee’ productivity.
An employee or a subcontractor or a vendor may want to use a peripheral device to complete their day to day tasks. However, that should not stop you and your business from staying secure. Since it is hard to identify the intent of these devices, allowing them to have temporary access when required strikes the right balance between simple IT management and safe USB operations.
Control with no expertise
True data protection starts with device control.
Discover the four pillars of successful device control model with expertly curated dashboards and device policies with absolutely no training.
Your employees may have to use a plethora of portable devices in combination with your endpoints. Imagine, plugging a peripheral device into your endpoint creates a backdoor to exfiltrate all your sensitive information such as financial information, passwords, etc. Let alone data loss, your endpoint could be at the verge of hardware destruction too!
Monitor hack attempts
Spot and remediate malicious insider activity.
Know who is using what on which device using clear-cut audits and reports, and receive instant alerts in case of unauthorised access.
Get a Quote or Download Free Trial
More Features
Device & port control
Control all ports and connected removable devices, block unauthorized access to your data and monitor all device & file actions effectively.
Device control is the practice of preventing various USB and peripheral devices from gaining unauthorized access to your data. By assigning strict device policies using a device control solution, you can instantly identify the devices connected to your endpoints, who is using what on which computer, what data is going out or coming in, and more.
File access control
Prevent data loss with strict role based access control policies - set read only permission, block copying of data from devices and do more.
Role-based access control (RBAC) is the technique of assigning access rights to the users in your organization based on their roles and the tasks they perform. This ensures that users and computers can have only access levels that they pertain to.
File Transfer Control
Curb unprecedented data transfers - limit file transfers by setting the maximum file size and type of file that can be transferred from your computer.
Data loss prevention (DLP) is the practice of protecting your data from falling into the wrong hands. The major problem with data transfer these days is leaving a large amount of data open to excessively unauthorized transfers. By setting up proper security boundaries, you can control the movement of data in your business. Because your data is highly valuable, you need to focus on allowing only relevant and limited transfers with the help of a device control solution. Device Control Plus is a comprehensive DLP solution that curbs unnecessary data transfers, thus eliminating data loss and data theft.
Trusted Device List
Create exclusive access for devices to access your computer by adding them to the trusted device list.
Traditional security models work on the assumption that everything inside an organization can be trusted, thereby providing more opportunities for insider attacks. A Zero Trust approach continuously assesses trust every time a device requests access to your endpoint.
Temporary access
Create secure and temporary access for devices to access your computers when they want to access what they want to access
An employee or a subcontractor or a vendor may want to use a peripheral device to complete their day to day tasks. However, that should not stop you and your business from staying secure. Since it is hard to identify the intent of these devices, allowing them to have temporary access when required strikes the right balance between simple IT management and safe USB operations.
Reports and Audits
Maintain records of devices, users and computers that are managed. View all device actions and data usage activities.
Which device attempted to connect to your endpoints? Who tried to connect it? When did they connect? With Device Control Plus' clear-cut audit reports, you can track all device, user, and file activities from a single console. Basically, audits provide you the complete information on all device and file activities.
You don't need to hunt through the entire audit report to determine the latest device activities. Use the device summary section to analyze recent device activities quickly. Gain acute awareness of the last connected device, user, computer, action performed, and more with simplified reports.
Get a Quote or Download Free Trial
Hardware Requirements
This section gives you information about the hardware requirements for distribution servers, Device control Plus servers and agents.
Hardware Requirements for Device control Plus Servers
The hardware requirements for Device control Plus servers include the following:
No. of Computers |
Processor Information |
RAM Size |
Hard Disk Space |
1 to 250 |
Intel Core i3 (2 core/4 thread) 2.0 Ghz 3 MB cache |
2 GB |
5 GB* |
251 to 500 |
Intel Core i3 (2 core/4 thread) 2.4 Ghz 3 MB cache |
4 GB |
10 GB* |
501 to 1000 |
Intel Core i3 (2 core/4 thread) 2.9 Ghz 3 MB cache |
4 GB |
20 GB* |
1001 to 3000 |
Intel Core i5 (4 core/4 thread) 2.3 GHz. 6 MB cache |
8 GB |
30 GB* |
3001 to 5000 |
Intel Core i7 (6 core/12 thread) 3.2 GHz. 12 MB cache |
8 GB |
40 GB* |
5001 to 10000 |
Intel Xeon E5 (8 core/16 thread) 2.6 GHz. 20 MB cache |
16 GB |
60 GB* |
10001 to 20000 |
Intel Xeon E5 (8 core/16 thread) 2.6 GHz. 40 MB cache |
32 GB |
120 GB* |
Hardware Requirements for Distribution Servers*
The hardware requirements for distribution servers include the following:
No. of Computers Managed Using the Distribution Server |
Processor Information |
RAM Size |
Hard Disk Space |
1 to 250 |
Intel Core i3 (2 core/4 thread) 2.0 Ghz 3 MB cache |
2 GB |
10 GB* |
251 to 500 |
Intel Core i3 (2 core/4 thread) 2.0 Ghz 3 MB cache |
4 GB |
20 GB* |
501 to 1000 |
Intel Core i5 (4 core/4 thread) 2.3 GHz. 6 MB cache |
4 GB |
30 GB* |
Distribution Server for remote offices will be available for purchase shortly
Hardware Requirements for Device control Plus Agents
The hardware requirements for Device control Plus agents include the following:
Hardware |
Recommendations |
Processors |
Intel Pentium |
Processor Speed |
1.0 GHz |
RAM Size |
512 MB |
Hard Disk Space |
100 MB* |
* May increase dynamically depending on the operations performed on the client computer
Software Requirements
This section gives you information about the software requirements for distribution servers, Device control Plus servers and agents.
Supported OS for Device control Plus Server & Distribution Servers
Supported OS for Device control Plus agents
Windows OS |
Windows Server OS |
Windows 10 |
Windows server 2016 |
Windows 8.1 |
Windows server 2012 R2 |
Windows 8 |
Windows server 2012 |
Windows 7 |
Windows server 2008 R2 |
Conditional Support |
Windows server 2003 |
*Supports Kernal versions above 2.6.33
Supported Browsers
You are required to install any of the following browsers on your computer to access the Device control Plus console:
- Microsoft Internet Explorer 10 and later versions
- Mozilla Firefox 44 and later versions
- Google Chrome 47 and later versions
Note: The screen resolution should be 1280 x 1024 pixels or higher.
Supported Database
Device control Plus supports the following databases:
Supported Web Servers
Device Control Plus uses the following web servers:
- Apache/Nginx (for static file services)
- Tomcat (for application related services)
Annual Subscription
Products
License Fee
AMS*
US$595
Included
US$1,195
Included
US$2,095
Included
US$3,645
Included
US$7,345
Included
US$11,795
Included
US$17,975
Included
Products
License Fee
AMS*
US$195
Included
US$345
Included
US$695
Included
US$995
Included
US$1,995
Included
US$3,495
Included
Products
License Fee
AMS*
US$1,195
Included
US$2,395
Included
US$3,595
Included
Products
License Fee
AMS*
US$345
Included
Products
License Fee
AMS*
Perpetual
Products
License Fee
AMS*
Products
License Fee
AMS*
Products
License Fee
AMS*
Products
License Fee
AMS*
Products
License Fee
AMS*
** Manufacturers price subject to change - contact us for a quote.
or Download Free Trial