More

    Introducing Veltar I/O Device Access Control for Windows

    Share On

    Data loss through USB drives, printers, and other peripheral devices continues to be one of the most overlooked yet effective attack vectors inside enterprises. Despite advances in network and cloud security, sensitive information often leaves organizations through unmanaged endpoints, whether via intentional insider actions or accidental misuse. Regulatory compliance frameworks such as GDPR, HIPAA, and PCI-DSS also mandate strict control over removable media and device access, making this challenge both a security and compliance priority for IT teams. That’s why we built Veltar to ensure I/O device access control across platforms.

    I/O Device Access Control for Windows

    Today, we are extending the same Veltar I/O Device Access Control for Windows, enabling IT administrators to enforce data protection policies at the most critical layer: the endpoint. By providing granular, scalable controls over storage and peripheral devices, this helps organizations prevent unauthorized data transfers before they happen.

    Why this matters

    The purpose behind building this feature is to strike the right balance between operational flexibility and uncompromising security. We understand that storage and peripheral devices are a proven weak link in enterprise security. A single unencrypted USB stick or unsanctioned Bluetooth connection can bypass sophisticated defenses and lead to costly data loss. With Veltar’s I/O Device Access Control, IT admins gain direct control over which devices can interact with corporate data — from USB drives to printers — ensuring that sensitive information remains protected. 

    The supported OS includes Windows 10, 11 Pro and Home, and Server 2022, 2025.

    What does this mean for IT teams managing Windows devices: 

    • Default access levels by device category: Enforce consistent policies across storage devices, Human Interface Devices (keyboard, mouse), wireless devices (Bluetooth), media/image devices, printers, network adapters, USB headphones, and WPD (Windows Portable Devices).
    • Granular access with device instance IDs: Every device has a unique identifier. With Veltar, IT admins can use it to allow only approved hardware (like company-issued USB drives) while blocking everything else. 
    • Encrypted storage enforcement: Permit access only to encrypted storage devices, preventing unsecured data transfers.
    • Custom user notifications: Configure messages that inform users when device access is blocked, reducing friction and confusion.
    • Flexible policy targeting: Apply controls to all users on a device or selected accounts.
    • Context-aware restrictions: Set access rules based on day, time, or IP address for flexible enforcement.

    Getting started

    This update enriches Veltar’s capabilities as a true endpoint DLP solution on Windows. For detailed instructions, check the I/O Device Access Control documentation.

    What’s next

    Veltar continues evolving with features designed for enterprise security challenges. Reach out if you want a demo or support implementing this feature. 

    Get in touch with our experts and schedule a demo today.

    Sriram Kakarala
    Sriram Kakarala
    Sriram has been developing mobile applications for 10+ years. His experiences include working on a BYOD solution, a custom Android OS for the enterprises and multi-headed Chat clients for consumers. He has had experience working for early stage start-ups to mid-size stuck-ups and near-stagnant MNC’s. On a personal level he thinks a nice sandwich is all that the world needs!!.

    Product Updates

    spot_img

    Latest Articles

    3 Best Android EMM solutions in 2025

    Managing Android devices at scale has become one of the biggest challenges for IT teams today. With hybrid work here to stay and industries...

    Best practices of Linux patch management for enterprise security

    Linux patching is more than routine maintenance; it’s a core security practice that protects systems, data, and uptime. After decades of managing Linux servers,...

    How to manage rugged devices in logistics and supply chain industry for maximum efficiency

    Global supply chains today are faster, more complex, and more unpredictable than ever. Customer expectations are high, deadlines are tight, and even a short...

    Latest From Author

    Veltar Secure Web Gateway Now on Windows, macOS, and Linux Desktops

    Desktops remain central to how work gets done, but they also carry the highest exposure to web-based risks. From unsafe browsing to unmanaged cloud...

    Introducing OIDC support in OneIdP: Extending secure SSO compatibility across platforms

    As organizations adopt more SaaS platforms, IT teams face the challenge of maintaining secure, seamless access across a fragmented app ecosystem. Traditional SSO methods...

    Scalefusion announces Day Zero Support for Android 16: Enterprise-ready from day one

    At Scalefusion, we’ve spent over a decade helping IT teams manage Android devices with confidence and clarity. With Android 16 now officially rolling out,...

    More from the blog

    What is Microsoft Entra, and how does it work?

    Remember the movie Inception? Where layers within layers controlled reality? Modern digital access management is quite similar. With users logging in from everywhere and...

    What is data leakage and how can it be prevented

    You don't need a hacker to leak your data. Sometimes, all it takes is a poorly configured device, a careless human, or a misdirected...

    What is a Secure Web Gateway (SWG)? A complete guide

    Modern enterprises now operate through the browser. Business apps, file shares, HR systems, and even admin consoles are all web-based. That convenience also opens...

    How to uninstall Windows updates with Scalefusion?

    You roll out a Windows update across your devices. Everything seems fine at first. Then the devices start facing issues. A key app stops...