Threatlocker Storage Control
ThreatLocker Storage Control is an advanced storage control solution that protects information. We give you the tools to control the flow and access of data. You can choose what data can be accessed, or copied, and the applications, users, and computers that can access said data. By using ThreatLocker®, you are in control of your file servers, USB drives, and your data. Most data protection programs on the market are butcher knife solutions to a problem that requires a scalpel. Blocking USB drives and encrypting data-storage servers can help secure your organization’s private data, but these tools don’t take into account that this data still needs to be quickly accessible. Waiting for approval or trying to find a device that’s allowed to access the needed files can drain hours of productivity.When a storage device is blocked, the user is presented with a pop-up where they can request access to the storage device. The administrator can then choose to permit the storage device in as little as 60 seconds.
Features
Audit Access to Files
A full detailed audit of all file access on USB, network, and local hard drives is centrally accessible within minutes of a file being opened.
Granular Storage Policies
These policies allow or deny access to storage based on user, time, applications, and more.
Simple Requests for Access
A pop-up with the option to request access to the storage device.
Simple USB blocking
USB policies allow access based on device serial number, vendor, and/ or file type.