encryption secure pcs endpoints usb devices security user-proof protection authentication cryptography single console endpoint security security usb firewall strong file-based encryption podslurping information sensitive data security threat portable device control