ble devices and drives.Allows you to prevent unauthorized copying of confidential information to an external device.Protection against phishingProtects against malicious attempts to request such information as user names, passwords and credit card data using fake websites that are very similar to the original.Detection of trusted zonesWhen you connect to an unknown network proposes to proceed in a