In the wake of the increased focus on endpoint security, controlling the use of devices that can be attached to endpoints, especially memory devices like USB memory sticks, has become of paramount importance to companies. While this is good elevation of awareness to a relatively new threat it should be pointed out that this threat does not exist in this format alone. Dozens of new and existing vendors have appeared in this space touting their products as being the next ‘must have’ security product in a network. Many of them offer granular control that allows specific devices to be used by specific individuals at specific times. It is important for companies to understand the difference between hype generated by vendors and the reality of how a threat can enter and affect your network. With so many vendors offering device control and protection against using memory devices, the wave of misinformation is influencing companies to make rash decisions into purchasing point solutions.