Three Simple Steps to Total Endpoint Security
"Not only have we secured USB ports, but since nobody can plug in ANY devices, I don't have to bother supporting them! Sweet! Thanks USB Glue! "
- Marc Farmen, Lazy IT Guy
OK, you caught us. "USB Glue" is not a real product. Although, the idea is funny, gluing USB ports has actually been a technique used by IT administrators to solve endpoint security problems related to removable media devices in the workplace.
The problems with this solution should be obvious. Physically damaging a system should never be part of any security strategy. We know there are serious security issues related to the use of these ports, however they are also neccesary for productivity, as most keyboards, mice and devices with legitmate business usage all require the use of these ports.
For real endpoint security use Centennial DeviceWall, which provides IT administrators granular control over wired and wireless PC connections without wrecking hardware.
Here are just a few reasons Centennial DeviceWall beats USB Glue as an effective safeguard against internal data leakage:
To see how Centennial DeviceWall could help protect your data and systems, download a free 30-day trial today.
Domino's Pizza Makes the Smart Choice
When Domino's Pizza decided to extend the same levels of IT security that protected it against external hacking attacks onto their internal IT systems, they chose DeviceWall from Centennial Software to stop unauthorized portable device usage. Much smarter than USB Glue.
* By a panel of 5 Centennial Software employees