ScalefusionProduct UpdatesIntroducing Veltar I/O Device Access Control for Windows

Introducing Veltar I/O Device Access Control for Windows

Data loss through USB drives, printers, and other peripheral devices continues to be one of the most overlooked yet effective attack vectors inside enterprises. Despite advances in network and cloud security, sensitive information often leaves organizations through unmanaged endpoints, whether via intentional insider actions or accidental misuse. Regulatory compliance frameworks such as GDPR, HIPAA, and PCI-DSS also mandate strict control over removable media and device access, making this challenge both a security and compliance priority for IT teams. That’s why we built Veltar to ensure I/O device access control across platforms.

I/O Device Access Control for Windows

Today, we are extending the same Veltar I/O Device Access Control for Windows, enabling IT administrators to enforce data protection policies at the most critical layer: the endpoint. By providing granular, scalable controls over storage and peripheral devices, this helps organizations prevent unauthorized data transfers before they happen.

Why this matters

The purpose behind building this feature is to strike the right balance between operational flexibility and uncompromising security. We understand that storage and peripheral devices are a proven weak link in enterprise security. A single unencrypted USB stick or unsanctioned Bluetooth connection can bypass sophisticated defenses and lead to costly data loss. With Veltar’s I/O Device Access Control, IT admins gain direct control over which devices can interact with corporate data — from USB drives to printers — ensuring that sensitive information remains protected. 

The supported OS includes Windows 10, 11 Pro and Home, and Server 2022, 2025.

What does this mean for IT teams managing Windows devices: 

  • Default access levels by device category: Enforce consistent policies across storage devices, Human Interface Devices (keyboard, mouse), wireless devices (Bluetooth), media/image devices, printers, network adapters, USB headphones, and WPD (Windows Portable Devices).
  • Granular access with device instance IDs: Every device has a unique identifier. With Veltar, IT admins can use it to allow only approved hardware (like company-issued USB drives) while blocking everything else. 
  • Encrypted storage enforcement: Permit access only to encrypted storage devices, preventing unsecured data transfers.
  • Custom user notifications: Configure messages that inform users when device access is blocked, reducing friction and confusion.
  • Flexible policy targeting: Apply controls to all users on a device or selected accounts.
  • Context-aware restrictions: Set access rules based on day, time, or IP address for flexible enforcement.

Getting started

This update enriches Veltar’s capabilities as a true endpoint DLP solution on Windows. For detailed instructions, check the I/O Device Access Control documentation.

What’s next

Veltar continues evolving with features designed for enterprise security challenges. Reach out if you want a demo or support implementing this feature. 

Get in touch with our experts and schedule a demo today.

Sriram Kakarala
Sriram Kakarala
Sriram has been developing mobile applications for 10+ years. His experiences include working on a BYOD solution, a custom Android OS for the enterprises and multi-headed Chat clients for consumers. He has had experience working for early stage start-ups to mid-size stuck-ups and near-stagnant MNC’s. On a personal level he thinks a nice sandwich is all that the world needs!!.

More from the blog

Introducing Remote Terminal for Windows: Secure remote access simplified

Managing Windows devices remotely is rarely straightforward. IT professionals often juggle multiple tools, spend too much time diagnosing issues,...

Cisco Umbrella vs Fortinet: An enterprise security solution comparison

Cisco Umbrella vs Fortinet is often evaluated by organizations looking for a data security solution. As in today’s world,...

Network DLP vs Endpoint DLP: Which one should you...

Data is one of the most valuable assets for organizations, and to protect it, IT teams evaluate security solutions....