Proactively provision and manage Windows systems, secure endpoint devices (including USB ports) and run your applications in a least-privileged environment ensuring your data is protected. Centrally manage firewall settings, power consumption, and easily target and customise user configurations without logon scripts.