Register for Zero Trust World 25!

Storage Control

Storage Control allows you to protect your data from unauthorized access or theft by setting granular policies over your storage devices.

ThreatLocker Storage Control Solution Icon

What Is Storage Control?

Storage Control provides policy-driven control over storage devices, whether the storage device is a local folder, a network share, or external storage such as a USB drive. ThreatLocker Storage Control allows granular policies to be set, which could be as simple as blocking USB drives, or as detailed as blocking access to your backup share, except when accessed by your backup application.

Graphic Illustration of ThreatLocker Portal utilizing Elevation Control policies

Digital Trail with Unified Audit

The Unified Audit provides a central log of all storage access by users on the network and those working remotely, down to the exact files that were copied and the device's serial number.

How Does Storage Control Work?

When a storage device is blocked, the user is presented with a pop-up where they can request access to the storage device. The administrator can then choose to permit the storage device in as little as 60 seconds.

Illustration of ThreatLocker Storage Control Request Access Notification

Storage Control Features

Vector graphic of ThreatLocker Storage Control Audit Access to Files Feature Icon

Audit Access to Files

A full detailed audit of all file access on USB, network, and local hard drives is centrally accessible within minutes of a file being opened.

Granular Application Policies Feature Icon

Granular Storage Policies

These policies allow or deny access to storage based on user, time, applications, and more.

Vector graphic of ThreatLocker Storage Control Simple Request for Access feature icon

Simple Requests for Access

A pop-up with the option to request access to the storage device.

Vector graphic of ThreatLocker Storage Control Simple USB Blocking Feature Icon

Simple USB blocking

USB policies allow access based on device serial number, vendor, and/ or file type.

Related Blogs

More ThreatLocker® Solutions