Storage Control — Enterprise Data Protection

Protect your data from unauthorized access or theft with Storage Control.
Configure granular access control policies for storage media and ensure maximum information security on user devices.

Storage Control

What is Storage Control?

Storage Control is a policy-driven access control solution for storage devices, whether local folders, network directories, or external media (such as USB drives).

The ThreatLocker® Storage Control
solution allows you to create flexible policies ranging from basic USB usage restrictions to complex scenarios — for example, blocking access to backup storage except when accessed by your backup application.

ThreatLocker Allowlisting

Digital Footprint with Unified Audit

Unified Audit creates a centralized log of all user actions involving storage devices both on the network and remotely.
Everything is recorded in fine detail: which files were copied and from which device — including the serial number.

How Does ThreatLocker® Storage Control Work?

When a storage device is blocked, the user sees a popup allowing them to submit an access request.
An administrator can promptly grant permission in as little as 60 seconds.

ThreatLocker Allowlisting

STORAGE CONTROL CAPABILITIES

icon

Comprehensive File Access Auditing

Gain detailed file access history on USB drives, local disks, and network shares. All activity is centrally logged within minutes of file access.

icon

Flexible Storage Access Policies

Grant or deny access to storage devices based on user, time, application type, and more — fully customizable to your business processes.

icon

Simple Access Request

Users see a pop-up prompt to request storage access permission from the administrator without unnecessary processes.

icon

USB Device Blocking by Policy

Control USB access by serial number, manufacturer, or file type.Minimize data leakage risks from physical media.

FAQ

  • This feature blocks only devices that Windows recognizes as USB storage drives.

  • Storage Control does not block access to specific domains but effectively prevents data leakage through known file-sharing services.
    At the same time, it ensures that confidential data is accessible only to authorized applications that do not have file-sharing capabilities.

  • By default, Storage Control monitors data in local folders, DVD/CD drives, USB devices, UNC paths, and external drives on all protected endpoints.
    Some policies apply Ringfencing to block unauthorized applications from accessing specified files.

  • Yes. Storage Control manages file operations on USB devices (read, write, move, delete) without affecting USB port power or other peripherals.

  • Currently, no. However, the solution provides some functionality similar to DLP.
    It is recommended to consult with a solutions engineer or schedule a demo to assess suitability for your company’s needs.

  • Yes. Policies can be configured by user/group, device serial number, applications, and even include an expiration date for the policy.

Fill out the form to receive a personalized consultation on testing within your IT infrastructure:

Дякуємо, ми отримали ваше повідомлення і звʼяжемось в найближчий час! :)


Can't send form.

Please try again later.