USB port configurators are above and below on a device, typically a desktop
Reduces the risk of data leakage, data theft and unauthorised uploads
Software-free solution physically blocks USB ports from unauthorised access
Block multiple adjacent ports, one with an active USB device such as a keyboard or mouse with one lock, allowing continued secure use of authorised USB devices