About us

Optrics is an authorized ManageEngine Partner with expertise in customized network solutions.

read more

Optrics Call Answer Guarantee
Toll Free: 1-877-386-3763
Direct: 1-780-430-6240

If you have any questions, call us during regular business hours, and you will always speak with a person.
Monday to Friday, 8am - 5pm MST

Device Control Plus
Prevent Data Leaks with Device Control Plus

Prevent Data Leaks

ManageEngine is excited to announce the launch of their new product to the ManageEngine family, Device Control Plus - the Data loss prevention (DLP) solution you need to control removable devices at any stage.

Data loss prevention (DLP) Solution

What is Device Control Plus?

Safeguard data from intruders

Crack down on devices with excessive access privileges.

Set read-only access, block copying of files from removable devices, and do more with simple policies designed to get you started right away.

Role-based access control (RBAC) is the technique of assigning access rights to the users in your organization based on their roles and the tasks they perform. This ensures that users and computers can have only access levels that they pertain to.

Uninterrupted device control

Automatically keep tabs on unprecedented data transfers.

Ensure on-time data protection and allow limited data transfer by setting restrictions to file size and file type based on the data your business handles.

Data loss prevention (DLP) is the practice of protecting your data from falling into the wrong hands. The major problem with data transfer these days is leaving a large amount of data open to excessively unauthorized transfers. By setting up proper security boundaries, you can control the movement of data in your business. Because your data is highly valuable, you need to focus on allowing only relevant and limited transfers with the help of a device control solution.

Device Control Plus is a comprehensive DLP solution that curbs unnecessary data transfers, thus eliminating data loss and data theft.

Eliminate data loss forever

Control devices with Zero trust approach.

Identifying and blocking malicious devices is tedious. Instead, create a trusted device list which ensures no device, unless authorized, can ever gain access to your endpoints.

What is Zero Trust? Traditional security models work on the assumption that everything inside an organization can be trusted, thereby providing more opportunities for insider attacks. A Zero Trust approach continuously assesses trust every time a device requests access to your endpoint.

Right acesss, right time

Get your work done with third-party devices instantly.

Whether the device is inside your network perimeter or not, instantly grant temporary access for a specific amount of time to avoid hurting employee’ productivity.

An employee or a subcontractor or a vendor may want to use a peripheral device to complete their day to day tasks. However, that should not stop you and your business from staying secure. Since it is hard to identify the intent of these devices, allowing them to have temporary access when required strikes the right balance between simple IT management and safe USB operations.

Control with no expertise

True data protection starts with device control.

Discover the four pillars of successful device control model with expertly curated dashboards and device policies with absolutely no training.

Your employees may have to use a plethora of portable devices in combination with your endpoints. Imagine, plugging a peripheral device into your endpoint creates a backdoor to exfiltrate all your sensitive information such as financial information, passwords, etc. Let alone data loss, your endpoint could be at the verge of hardware destruction too!

Monitor hack attempts

Spot and remediate malicious insider activity.

Know who is using what on which device using clear-cut audits and reports, and receive instant alerts in case of unauthorised access.

Get a Quote  or  Download Free Trial

More Features

Device & port control

Control all ports and connected removable devices, block unauthorized access to your data and monitor all device & file actions effectively.

Device control is the practice of preventing various USB and peripheral devices from gaining unauthorized access to your data. By assigning strict device policies using a device control solution, you can instantly identify the devices connected to your endpoints, who is using what on which computer, what data is going out or coming in, and more.

File access control

Prevent data loss with strict role based access control policies - set read only permission, block copying of data from devices and do more.

Role-based access control (RBAC) is the technique of assigning access rights to the users in your organization based on their roles and the tasks they perform. This ensures that users and computers can have only access levels that they pertain to.

File Transfer Control

Curb unprecedented data transfers - limit file transfers by setting the maximum file size and type of file that can be transferred from your computer.

Data loss prevention (DLP) is the practice of protecting your data from falling into the wrong hands. The major problem with data transfer these days is leaving a large amount of data open to excessively unauthorized transfers. By setting up proper security boundaries, you can control the movement of data in your business. Because your data is highly valuable, you need to focus on allowing only relevant and limited transfers with the help of a device control solution. Device Control Plus is a comprehensive DLP solution that curbs unnecessary data transfers, thus eliminating data loss and data theft.

Trusted Device List

Create exclusive access for devices to access your computer by adding them to the trusted device list.

Traditional security models work on the assumption that everything inside an organization can be trusted, thereby providing more opportunities for insider attacks. A Zero Trust approach continuously assesses trust every time a device requests access to your endpoint.

Temporary access

Create secure and temporary access for devices to access your computers when they want to access what they want to access

An employee or a subcontractor or a vendor may want to use a peripheral device to complete their day to day tasks. However, that should not stop you and your business from staying secure. Since it is hard to identify the intent of these devices, allowing them to have temporary access when required strikes the right balance between simple IT management and safe USB operations.

Reports and Audits

Maintain records of devices, users and computers that are managed. View all device actions and data usage activities.

Which device attempted to connect to your endpoints? Who tried to connect it? When did they connect? With Device Control Plus' clear-cut audit reports, you can track all device, user, and file activities from a single console. Basically, audits provide you the complete information on all device and file activities.

You don't need to hunt through the entire audit report to determine the latest device activities. Use the device summary section to analyze recent device activities quickly. Gain acute awareness of the last connected device, user, computer, action performed, and more with simplified reports.

Get a Quote  or  Download Free Trial

Hardware Requirements

This section gives you information about the hardware requirements for distribution servers, Device control Plus servers and agents.

Hardware Requirements for Device control Plus Servers

The hardware requirements for Device control Plus servers include the following:

No. of Computers Processor Information RAM Size Hard Disk Space
1 to 250 Intel Core i3 (2 core/4 thread) 2.0 Ghz  3 MB cache 2 GB 5 GB*
251 to 500 Intel Core i3 (2 core/4 thread) 2.4 Ghz  3 MB cache 4 GB 10 GB*
501 to 1000 Intel Core i3 (2 core/4 thread) 2.9 Ghz  3 MB cache 4 GB 20 GB*
1001 to 3000 Intel Core i5 (4 core/4 thread) 2.3 GHz. 6 MB cache 8 GB 30 GB*
3001 to 5000 Intel Core i7 (6 core/12 thread) 3.2 GHz. 12 MB cache 8 GB 40 GB*
5001 to 10000 Intel Xeon E5 (8 core/16 thread) 2.6 GHz. 20 MB cache 16 GB 60 GB*
10001 to 20000 Intel Xeon E5 (8 core/16 thread) 2.6 GHz. 40 MB cache 32 GB 120 GB*

Hardware Requirements for Distribution Servers*

The hardware requirements for distribution servers include the following:

No. of Computers Managed Using the Distribution Server Processor Information RAM Size Hard Disk Space
1 to 250 Intel Core i3 (2 core/4 thread) 2.0 Ghz  3 MB cache 2 GB 10 GB*
251 to 500 Intel Core i3 (2 core/4 thread) 2.0 Ghz  3 MB cache 4 GB 20 GB*
501 to 1000 Intel Core i5 (4 core/4 thread) 2.3 GHz. 6 MB cache 4 GB 30 GB*

Distribution Server for remote offices will be available for purchase shortly

Hardware Requirements for Device control Plus Agents

The hardware requirements for Device control Plus agents include the following:

Hardware Recommendations
Processors Intel Pentium
Processor Speed 1.0 GHz
RAM Size 512 MB
Hard Disk Space 100 MB*

* May increase dynamically depending on the operations performed on the client computer

Software Requirements

This section gives you information about the software requirements for distribution servers, Device control Plus servers and agents.

Supported OS for Device control Plus Server & Distribution Servers

  • Windows 7
  • Windows 8
  • Windows 8.1
  • Windows 10
  • Windows Server 2003
  • Windows Server 2003 R2
  • Windows Server 2008*
  • Windows Server 2008 R2*
  • Windows Server 2012
  • Windows Server 2012 R2*
  • Windows Server 2016*
  • Windows Server 2019*

    * - recommended for managing 5000 or more endpoints.

Supported OS for Device control Plus agents

Windows OS Windows Server OS
Windows 10 Windows server 2016
Windows 8.1 Windows server 2012 R2
Windows 8 Windows server 2012
Windows 7 Windows server 2008 R2
Conditional Support Windows server 2003
*Supports Kernal versions above 2.6.33

Supported Browsers

You are required to install any of the following browsers on your computer to access the Device control Plus console:

  • Microsoft Internet Explorer 10 and later versions
  • Mozilla Firefox 44 and later versions
  • Google Chrome 47 and later versions

Note: The screen resolution should be 1280 x 1024 pixels or higher.

Supported Database

Device control Plus supports the following databases:

  • PGSQL
  • MSSQL

    The following versions of MSSQL are supported:

    1. SQL Server 2005
    2. SQL Server 2008
    3. SQL Server 2012
    4. SQL Server 2014
    5. SQL Server 2016
    6. SQL Server 2017

Supported Web Servers

Device Control Plus uses the following web servers:

  • Apache/Nginx (for static file services)
  • Tomcat (for application related services)

Annual Subscription

Device Control Plus - Professional Edition
Products
License Fee
AMS*
US$595
Included
US$1,195
Included
US$2,095
Included
US$3,645
Included
US$7,345
Included
US$11,795
Included
US$17,975
Included
Device Control Plus - Additional Users
Products
License Fee
AMS*
US$195
Included
US$345
Included
US$695
Included
US$995
Included
US$1,995
Included
US$2,995
Included

Perpetual

Device Control Plus - Professional Edition
Products
License Fee
AMS*
US$1,488
US$298
US$2,988
US$598
US$5,238
US$1,048
US$9,113
US$1,833
US$18,363
US$3,673
US$29,488
US$5,898
US$44,938
US$8,988
Device Control Plus - Additional Users
Products
License Fee
AMS*
US$487
US$98
US$862
US$173
US$1,737
US$348
US$2,487
US$498
US$4,987
US$998
US$7,487
US$1,498

** Manufacturers price subject to change - contact us for a quote.

  or  Download Free Trial
  Download Free Trial   Get A Quote   Contact Us