This features gives IT pros a centralized way to control and block the use of these devices with the machine.
This has been a great concern of these folks in terms of data leakage, in files being copied on to these devices and then taken home or potentially lost.
This has been a great concern in terms of data leakage, in files being copied on to these devices and then taken home or potentially lost.