Protecting data on
more than 30 million devices
404 File not found
File not found!

Guess you missed the right way

Sorry, but the page could not be found.
Go Back or go to the Home page.
We're sorry, but the URL you entered did not match any of existing pages.
It might be possible you typed the URL incorrectly, or the page does no longer exist on our website.
Still, you may choose from the links below, which hopefully will guide you to the correct page.
Thank you.


Data Loss Prevention Overview
Device Control
Content Aware Protection
Data Loss Prevention (DLP) for Mac OS X
USB Lockdown for Mac OS X
Data Loss Prevention for Cloud Services
Data Loss Prevention for Printers
Mobile Device Management (MDM)
Android Security
iOS Security
Mobile Application Management (MAM)
MDM Security with iBeacon™
Bring Your Own Device (BYOD)
Android Kiosk
Enforced Encryption
BadUSB Protection
Appetizer License
More about Solutions
Solutions for Education
Solutions for Healthcare
Solutions for Manufacturing
Solutions for Finance
Solutions for Media
Solutions by Role
Solutions by Industry
Solutions by Challenge
Solutions by Regulation
Conficker USB Worm

Products Overview
Endpoint Protector 4
My Endpoint Protector
Mobile Device Management
Endpoint Protector Basic
EasyLock - USB Encryption
Carry it Easy +Plus
Free Data Security Tools
Discontinued Products

Download / Trial
Endpoint Protector Demo

Knowledge Base
Professional Services
Endpoint Protector Release History
My Endpoint Protector Release History

DLP Infographics
DLP and BYOD Comics
Articles & White Papers
Videos & Tutorials
Data Sheets
Case Studies
Product Screenshots
Press Kit


Locate a Partner
Become a Partner
OEM Solutions
Technology Partners

About CoSoSys
Management Team
Press Room
Press Kit
In the News
Press Releases
Product Screenshots
Product Descriptions
Press Contacts
Press Mailing List
Awards and Certifications

What's new?

Need Help?
Our knowledge base is available here.

Endpoint Protector 2008 gives us the ability to manage the controlled use of USB devices, external hard drives, FireWire devices, CD/ DVD-Readers/ Writers and many other potentially harmful endpoint devices, while also stopping malware, viruses and other unwanted data intrusions.
Carl Bigby, Network Security Manager, SearchAmerica