Contact Us
Login Free Trials
SupportWorld Live Conference
Event SupportWorld Live 2021

November 06, 2021

Meet us
Remote Work: Mobile Working from Home, at the Office, or Anywhere Else
Remote Work: The Future Of Work Is Hybrid

Matrix42 Study on New Work Models

Get the Study
Vendor Selection Matrix-Hybrid-Cloud-Service-Management-Tools
Resources Hybrid Cloud Infrastructure and Service Management

Get more out of your Hybrid Cloud

Find out more
Matrix42 Webinar with Pink Elephant: Automated Discovery, Reconciliation & Synchronization
Automated Discovery, Reconciliation & Synchronization

The Three-Legged Stool of Configuration Management

Watch the Webinar
Forrester: The Total Economic Impact™ Of Matrix42 Enterprise Service Management
Resources ROI 51% – Switching Pays Off

Forrester shows benefits when switching to Matrix42 Enterprise Service Management

Download Forrester Study
First Aid Kit to Protect Patient Data
First Aid Kit to Protect Patient Data

Protect patient data intelligently,
Automate IT Security Management

Protect patient data now
Vendor Selection Matrix™ Secure Unified Endpoint Management: THE TOP VENDORS 2021 IN DACH, BENELUX AND NORDICS
Resources Matrix42 Ranked #1 Worldwide

Vendor Selection Matrix™ Secure Unified Endpoint Management

Read more
Vendor Selection Matrix™ Enterprise Service Management (ESM): Top 10 Global Vendors 2021
Resources 1,500 IT Execs Made Their Choice!

Global IT executives selected Matrix42 as the Market Leader in Enterprise Service Management

Learn more
Automate Endpoint Security
Security & IT Operations

Give your team what they need to cross the finish line

Unleash the Power
Automated Service Processes
Get Into the Power Zone

Drive better performance and user experience across the enterprise

Get there

Full control over all devices, interfaces and cloud data


Monitor and control the use of devices (e.g. USB sticks, CDs, printers) or interfaces (e.g. Firewire, USB) on endpoints to ensure the security of your data. Audit-proof according to Basel II, Sarbanes-Oxley and PCI compliant.


  • Effective device access control – protects you against attacks and abuse of access rights. Define who can use which devices (e.g. USB sticks, CDs, TV tuners) or interfaces (e.g. WLAN, Firewire, USB) and to what extent. You not only prevent misuse and data loss, but also prevent malware from entering the corporate network via the interfaces (e.g. BadUSB).


  • Access control for cloud services and storage  – in the cloud, data is accessible everywhere. With Cloud Access Control, you control which employees may use which cloud services and to what extent.


  • Keep data transfer channels under control – Data transfer is possible in many ways, the official way through the company network is only one - Bluetooth, WiFi, Smart Phones and USB-Devices are the most common alternatives. Device & Access Control lets you control which employees have access to which data transfer devices, i.e. which routes data leaves your company.