fbpixel

Device Control Plus

Prevent data theft before it happens. Device Control Plus combines peripheral device lockdown, file-level access control, and activity tracking to stop unauthorized data transfers while maintaining legitimate business functionality.

ManageEngine logo

100% Removable Device Control

Port & Peripheral Lockdown

Block USB drives, external hard drives, and removable media at the hardware level. Grant temporary access on-demand with approval workflows. Control reading and writing independently. Audit all device access attempts and data transfers.

Granular File-Level Access Control

Role-Based Data Protection

Define which users can transfer which files to external media. Create policies based on file classification, department, or user role. Prevent unauthorized data transfers while enabling legitimate business workflows.

Real-Time Activity Monitoring & Forensics

Complete Audit Trail & File Shadowing

Log every device connection, file access, and transfer attempt. Maintain shadow copies of transferred files for forensic investigation. Track which users accessed sensitive data and when. Generate detailed compliance evidence.

Comprehensive Data Loss Prevention Through Device Control

Device Control Plus provides granular control over every port, device, and file transfer on managed endpoints. ITR Technology implements this layered approach to data protection, enabling organizations to prevent data theft while maintaining user productivity and audit compliance.

Control Over All Ports & Removable Devices

Manage USB ports, parallel ports, serial ports, and FireWire connections. Control CD/DVD drives, floppy drives, and tape drives independently. Set policies for read-only access or full blocking. Monitor all device connections and access attempts.

File Shadowing & Activity Reports

Maintain automatic copies of files transferred to external media. Forensic investigation becomes easier with preserved evidence. Generate activity reports showing what data was accessed and by whom. Track suspicious transfer patterns.

Removable Device Access Management

Maintain an approved device list using hardware serial numbers and identifiers. Allow only registered devices to connect. Prevent data transfer even from trusted endpoints. Control device access based on location and network.

Frequently asked questions

Can we allow USB drives only for specific employees?

Yes. Create policies targeting specific users or departments. Grant device access to selected employees while blocking others. Require approval requests before connecting devices. Audit all access attempts and transfers.

How does file shadowing work?

When files transfer to external media, the system automatically maintains a copy on centralized servers. Enables forensic investigation if data was compromised. Preserve evidence of what data was accessed and transferred.

Can we grant temporary device access?

Yes. Users request temporary device access with business justification. Administrators approve with specified duration and access level. System automatically revokes access after approval period expires. Audit all temporary access grants.

What about mobile devices and cloud storage?

Control cloud storage uploads and mobile device synchronization. Prevent data transfer to personal cloud accounts. Block syncing of sensitive data to mobile devices. Monitor all cloud and mobile access patterns.

How granular can file-level policies be?

Create policies based on file extensions, folder paths, file classifications, or encryption status. Combine conditions to create precise rules. Prevent transfer of unencrypted sensitive files while allowing encrypted versions. Customize policies per department.

Global Enterprises Trust Device Control Plus for Data Loss Prevention

Samsung 1
Go Daddy 3
NTT data 5
Etihad airways 7
TCS 9
Cambridge 11
Celtic manor 13
Air Asia 15
Airbus 17
Toyota 19
HCL 21
Four Seasons 23

Request quote or demo

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
This field is hidden when viewing the form
By completing and submitting the above information, you provide your consent that the personal information provided may be processed for the intended purpose and that your personal information may be processed in accordance with our privacy policy.
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form