Securing Endpoint Access such as USB Ports

Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

I am looking at 3 or 4 systems which claim to secure Endpoint Access.

They control and monitor input from or output to extraneous hardware
such as "thumb drives" which can be connected to USB ports.

Some of the products are essentially shareware, others are quite

Has anyone tried to evaluate or implement such products?

 - CarlD

(best email is trimagna at yahoo dot com)

Site Timeline