top of page

Device & Application Control


The most granular device control solution in the market allows companies to manage the correct use of devices regardless of the connection type. With Device Control you will comply with corporate policies, PCI-DSS audits and avoid sensitive information from being stolen.


The actual solutions for IT security are not enough to stop the daily threats to which we are exposed, since traditional tools are based on black lists or on behavioral analysis, an antivirus is as good as its last update.

Application Control is based on white lists and can deny the execution of any application not explicitly allowed to run on your corporate environment.

Device Control


1. Discover: Identify all removable devices connected to your                                            endpoints in “audit mode.”

           2. Define: Create rules at both default and machine specific levels for                            groups and individuals with regards to device access by class, group,                          model and/or specific ID.

                       3. Monitor: Continuously observe the effectiveness of device and                            data usage policies in real time and identify potential security                                 threats.

                4. Enforce: Implement “enforcement mode” of file copy limitations, file                  type filtering and forced encryption policies for data moved onto                             removable devices.

           5. Manage: Use dashboard widgets and/or create reports on all device and          data activity showing allowed and blocked events.

Application Control


1. Discover - Snapshot individual endpoints to identify and catalog all                        executables currently running on them and quickly determine potential                        application risk via the Endpoint Integrity Service.

          2. Define - Create policies that automate how new applications are                            introduced and executed on endpoints using flexible, rules-based Trust                  Engine, ensuring that the whitelist is constantly updated to permit                             authorized applications to run.

            3. Enforce - Block unknown and unauthorized applications from                          executing by default and prevent zero-day attacks automatically, before                 the latest anti-virus definitions or vulnerability patches are deployed.                      Reduce IT risk even further by extending whitelist policies to end users                  with Local Admin privileges.

      4. Manage - Update whitelists using the Trust Engine to deploy software            (and software updates). Generate reports to demonstrate compliance with            security policies, and to conduct forensics as necessary

bottom of page