Bellridge-Kanguru Endpoint Protector - Device Control

Kanguru Endpoint Protector - Device Control

Centrally Manage All USB Devices and Peripherals Within Your Organization


Quick Overview:

Device Control (DC) is the perfect way to control USB storage devices and other peripherals within your organization. An administrator can monitor activities and data transfers, control what is allowed and disallowed on the system and enforce encryption policies on trusted devices



Advanced Features:


    •  Protect the organization from outside risks

    •  Prevent data theft

    •  Enforce encryption policies

    •  Stop the spread of device malware and viruses

    •  Whitelist / blacklist USB devices

    •  Block ports and devices

  • •  Control device use

  • •  Monitor data transfers

  • •  Audit and Report on device and data transfers


Technical Specifications:

Model Number KEP-DC-Series
Device Control (DC) Compatibility Windows XP, Vista, 7, 8, 10, OS X
License Type Subscription
Service Type 100% Cloud Based

Device Control (DC)

Kanguru Endpoint Protector: Device Control (DC) provides a very powerful way for organizations to protect their entire network from potential outside risks, theft, and human error that could lead to a data breach or system-wide failure. USB devices are very convenient for today's data mobility, but along with this convenience comes increased risk from untrusted devices. A USB device from an untrusted source may not have the protections that a Kanguru Defender drive offers, and could be tampered with to introduce malware, spyware, or viruses to bring down a system, or they could become a temptation for a dissatisfied employee to steal data.

Gaining full control of what is being plugged in provides a robust solution for organizations to prevent risks, and get a handle on where the organization's data is traveling.


Easy to Use

Kanguru Endpoint Protector Device Control provides an easy-to-use dashboard for convenient and secure administration. From one convenient console, administrators can define and enforce device control policies, monitor all ports and device activity, take action, block devices, monitor and enforce encryption and even log and report actions.


About Device Control (DC)

Control what can and cannot be used on the network: 

    • •  USB Storage Devices: encrypted and unencrypted Flash Drives, Hard Drives, Solid State Drives
    • • Desktop and Laptop Computers: Windows, Mac, etc.
    • •  Mobile Phones and Devices: iPhone, Android, etc
    • •  Printers, Webcams and Other Peripherals
    • CD, DVD, Blu-ray Devices

  • Central Policy Configuration


      Set organization-wide administrative policies from one central location to whitelist/blacklist devices inside and outside of your organization on several granular levels:

    • •  Company Level
    • •  Group Level
    • •  User Level
    • •  Computer Level

    Highly-Granular Control


      Exercise highly-granular control of your own organization's IP assets:


    • •  Centrally allow/deny specific permissions on any device by creating a custom dictionary
    • •  Lock down specific devices
    • •  Create, manage and enforce organization-wide policies

    Generate Detailed Auditing Reports


      Report on conformance & violations of policies


    • •  Export audits to MS Excel as a .csv file
    • •  Passive and Active Reporting

    Offline Temporary Password (OTP)


      Allow temporary outside policy use with Offline Temporary Password (OTP)


    • •  Set rules for when/where/ how staff can use devices offline

    Create Custom Device Classes

    • Define specific classes of devices allowed to restrict use to only to certain types, manufacturers or even brands

Which Secure Drive is Best for You?
All Kanguru Defender USB devices are:
  • AES 256-Bit Hardware Encrypted
  • Easy to Use
  • Tamper-Proof
  • TAA Compliant
  • Remotely Manageable
  • Protected by BitDefender Anti-Virus
Designed and Developed By Media3