Appropriate operational measures for devices! Elimination of personal USB memory and management of company USB memory.
This document provides an overview of the whitelist-based device control. It features "HEAT Device Control," a solution that blocks even unknown threats without any loopholes, and introduces measures to reduce the risk of information leakage and the security measures that can be realized with this solution. It serves as a useful reference when considering implementation. [Contents] ■ Overview of whitelist-based device control - Features of device control ■ Security measures that can be realized with this solution *For more details, please refer to the PDF document or feel free to contact us.
Inquire About This Product
basic information
For more details, please refer to the PDF document or feel free to contact us.
Price range
Delivery Time
Applications/Examples of results
For more details, please refer to the PDF document or feel free to contact us.
catalog(1)
Download All CatalogsCompany information
Our company develops, sells, and maintains security measures solutions and tools for software. We provide solutions for preventing information leaks, blocking external attacks on computer networks, and fuzzing tools for control system software.