Port protocol & app control
Workstation communications with external media storage and peripheral devices control software environment.
Threats penetration into secure perimeter prevention is achieved by:
external devices appropriate system
access protocols settings access level regulation to both groups and standalone applications resources.
Functional solutions for ports control are complemented by DLP-solutions capabilities which possess a set of objectives for ports control, allowing identification of prohibited content transfer to external media, connected to port.
Check Point Software Technologies
all elements: 7