More
    VeltarEndpoint DLPIntroducing Veltar I/O Device Access Control for Windows

    Introducing Veltar I/O Device Access Control for Windows

    Data loss through USB drives, printers, and other peripheral devices continues to be one of the most overlooked yet effective attack vectors inside enterprises. Despite advances in network and cloud security, sensitive information often leaves organizations through unmanaged endpoints, whether via intentional insider actions or accidental misuse. Regulatory compliance frameworks such as GDPR, HIPAA, and PCI-DSS also mandate strict control over removable media and device access, making this challenge both a security and compliance priority for IT teams. That’s why we built Veltar to ensure I/O device access control across platforms.

    I/O Device Access Control for Windows

    Today, we are extending the same Veltar I/O Device Access Control for Windows, enabling IT administrators to enforce data protection policies at the most critical layer: the endpoint. By providing granular, scalable controls over storage and peripheral devices, this helps organizations prevent unauthorized data transfers before they happen.

    Why this matters

    The purpose behind building this feature is to strike the right balance between operational flexibility and uncompromising security. We understand that storage and peripheral devices are a proven weak link in enterprise security. A single unencrypted USB stick or unsanctioned Bluetooth connection can bypass sophisticated defenses and lead to costly data loss. With Veltar’s I/O Device Access Control, IT admins gain direct control over which devices can interact with corporate data — from USB drives to printers — ensuring that sensitive information remains protected. 

    The supported OS includes Windows 10, 11 Pro and Home, and Server 2022, 2025.

    What does this mean for IT teams managing Windows devices: 

    • Default access levels by device category: Enforce consistent policies across storage devices, Human Interface Devices (keyboard, mouse), wireless devices (Bluetooth), media/image devices, printers, network adapters, USB headphones, and WPD (Windows Portable Devices).
    • Granular access with device instance IDs: Every device has a unique identifier. With Veltar, IT admins can use it to allow only approved hardware (like company-issued USB drives) while blocking everything else. 
    • Encrypted storage enforcement: Permit access only to encrypted storage devices, preventing unsecured data transfers.
    • Custom user notifications: Configure messages that inform users when device access is blocked, reducing friction and confusion.
    • Flexible policy targeting: Apply controls to all users on a device or selected accounts.
    • Context-aware restrictions: Set access rules based on day, time, or IP address for flexible enforcement.

    Getting started

    This update enriches Veltar’s capabilities as a true endpoint DLP solution on Windows. For detailed instructions, check the I/O Device Access Control documentation.

    What’s next

    Veltar continues evolving with features designed for enterprise security challenges. Reach out if you want a demo or support implementing this feature. 

    Get in touch with our experts and schedule a demo today.

    Sriram Kakarala
    Sriram Kakarala
    Sriram has been developing mobile applications for 10+ years. His experiences include working on a BYOD solution, a custom Android OS for the enterprises and multi-headed Chat clients for consumers. He has had experience working for early stage start-ups to mid-size stuck-ups and near-stagnant MNC’s. On a personal level he thinks a nice sandwich is all that the world needs!!.

    More from the blog

    Introducing Extended Access Policies and new updates to OneIdP

    With OneIdP, our vision has always been simple: to make identity the backbone of unified management. Over the last...

    Day zero support for Apple: Scalefusion is ready for...

    With iOS 26, iPadOS 26, and macOS 26, Apple delivers updates that redefine how organizations manage devices, protect data,...

    What is Microsoft Entra, and how does it work?

    Remember the movie Inception? Where layers within layers controlled reality? Modern digital access management is quite similar. With users...