Contáctenos
20200707-FireScope Announcement IMG
Matrix42 ha adquirido el proveedor de software estadounidense FireScope
Aprende más
0336-RS-SAM-SM-VENDOR-SELECTION-MATRIX Teaser Bühne Home IMG
Matrix42 ranked No.1

VENDOR SELECTION MATRIX™ IT and Enterprise Service Management SaaS and Software

Learn more
Keyvisual zum "Titel des Webinars"
Expert Round Table – IBM License Management

Features IBM license management, ILMT, capacity metrics, tips and tricks for license optimization.

Watch now
00 COVID19 IMG
Potenciar el trabajo digital

Trabajar con seguridad en tiempos de la Corona

Learn more
Keyvisual zum "Titel des Webinars"
Advanced Data Protection The Easy Way to Data Encryption

All-round data encryption, simple administration, and automation, without any loss of employee productivity.

Watch now
00 Home Office Starter Set IMG
Home Office Quick Starter Set

Set up quickly and securely

Learn more

Full control over all devices, interfaces and cloud data


Monitor and control the use of devices (e.g. USB sticks, CDs, printers) or interfaces (e.g. Firewire, USB) on endpoints to ensure the security of your data. Audit-proof according to Basel II, Sarbanes-Oxley and PCI compliant.


  • Effective device access control – protects you against attacks and abuse of access rights. Define who can use which devices (e.g. USB sticks, CDs, TV tuners) or interfaces (e.g. WLAN, Firewire, USB) and to what extent. You not only prevent misuse and data loss, but also prevent malware from entering the corporate network via the interfaces (e.g. BadUSB).


  • Access control for cloud services and storage  – in the cloud, data is accessible everywhere. With Cloud Access Control, you control which employees may use which cloud services and to what extent.


  • Keep data transfer channels under control – Data transfer is possible in many ways, the official way through the company network is only one - Bluetooth, WiFi, Smart Phones and USB-Devices are the most common alternatives. Device & Access Control lets you control which employees have access to which data transfer devices, i.e. which routes data leaves your company.