“Government grade protection from unknown threats” There are a number of options to define when using the Shield Protection. Please read/select the options below that best suit your requirements. For something not listed here, please contact us to discuss. InformationDevice Control Protects you from USB based attacksOptions: Disabled: We need access to USB at all times Semi-Restricted: Only some people need to use USB to take files off the system Semi-Restricted: Only some people need to use USB to put customer files onto the system Restricted: We dont need to use USB in our business The available options for Device Control. Please contact us if you prefer something customised.Application ControlProtects you from unknown executable attacks (WhiteListed) - Safest method of protection.Options: Disabled: We want to allow all programs at all times Semi-Restricted- Self Managed: We want the system locked down, however we also want the option of self service mode that allows us to temporarily remove protection Enabled: We want the system locked down and any unknown applications to be reviewed & approved as needed The available options for Application Control. Please contact us if you prefer something customised.EncryptionThis prevents data theft when files leave the network/computer. Also prevents databreach from system theft.Options: Disabled: We dont want USB or our Systems Encrpyted. Semi-Restricted: We want USB drive files to be encrypted Semi-Restricted: We want our roaming computers (laptops) encrypted to prevent databreach from a lost device. Semi-Restricted: We want all outgoing files encrypted, We want restrictions in the type of files that can come into the network. (EG: PDF files/Documents/Pictures are allowed) Restricted: We want all files that leave the network to be encrypted and only people with the password can access The available options for Encryption Control. Please contact us if you prefer something customised.Name First Last Contact NumberCompany