Protecting data on
more than 30 million devices
Endpoint Protector 4

Endpoint Protector 4

Protect your network and sensitive data from threats posed by portable storage devices,
cloud services and mobile devices
Portable storage devices such as USB flash drives, smartphones, tablets and cloud services like Dropbox, Google Drive may cause severe issues when it comes to controlling data use within and outside the company. As a full Data Loss Prevention (DLP) and Mobile Device Management (MDM) product available for Windows, Mac OS X and iOS, Android mobile devices, Endpoint Protector 4 prevents users from taking unauthorized data outside the company or bringing potential harmful files on storage devices.

Centralized Device Control

Centralized
Device Control

The Endpoint Protector 4 Web administration and reporting console offers you a complete overview of the device activity on your computers, whether you work with Windows, Mac or Linux platforms. You will be able to define access policies per user/computer/device and authorize devices for certain user or user groups. Thus, your company will stay productive while maintaining control over the device fleet use.

Centralized Device Control
Content Aware Protection

Content Aware Protection

Content-Aware Data Loss Prevention (DLP) for Windows and Mac OS X offers detailed control over sensitive data leaving the company's network. Through efficient content inspection, transfers of important company documents will be logged, reported and blocked. Content Aware Protection by Endpoint Protector prevents data leakage through all possible exit points, from clipboard, screen captures, USB devices to applications including Microsoft Outlook, Skype, Yahoo Messenger or Dropbox.

Content Aware Protection

Mobile Device Management

Mobile Device Management

Offers better control over the use of Android and iOS devices by companies’ employees. Mobile Device Management by Endpoint Protector is the perfect solution for companies using their own mobile devices or adopting the BYOD (Bring-Your-Own-Device) model to protect sensitive company data. Through detailed monitoring, logging and reporting of all mobile device activity and remote enforcement of strong security policies, companies will gain enhanced protection against both inside and outside threats.

Mobile Device Management

File Tracing / File Shadowing

File Tracing /
File Shadowing

Track all data that was copied to and from USB flash drives or other portable storage devices directly from the Web management interface. With File Shadowing activated, you can even have access to hidden copies of all transferred files. A thorough record of all the flow of information in the network is essential to support audits and controlling data leakage.

File Tracing / File Shadowing

Defining Rights

Defining Rights

Simple device management policies will help you define User group permissions, allowing an efficient enforcement and maintenance of the predefined security policies across the network.
Being able to block USB flash drives or other portable devices and track data going on them will help you comply with government regulations, industry standards and IT governance in regard to data leakage prevention.

Defining Rights
Device-based Policies

Device-based Policies

This feature enables you to allow or block USB flash drives or other devices based on their unique characteristics(Ids). For instance you can create a rule where you can allow a USB stick from a certain manufacturer to connect on certain computers and block it for all the others. This feature gives you significant control over what devices are used on protected clients.

Device-based Policies

Support for Mac OS X, Windows (XP, Vista, 7, 8) and Linux

Support for Mac OS X, Windows (XP, Vista, 7, 8) and Linux

Endpoint Protector will protect your networks whether they are MAC, Windows or Linux based. This will offer you an even more secure working environment.
Mobile Application Management (MAM) for iOS and Android

Mobile Application Management (MAM) for iOS and Android

Discover what applications people use on smartphones and tablets, bringing them into the company network, and manage accordingly to the organization’s security policies. Instantly push free and paid apps to enrolled mobile devices from your own Apps Catalog.
Working with Active Directory

Working with Active Directory

If you already have Active Directory, then you can easily use it to deploy Endpoint Protector, making your life a lot easier.

Also you will have simplified device management policies with customizable templates for defined USR Groups (Active Directory GPOs).
Reporting and Analysis Tools

Reporting and Analysis Tools

Endpoint Protector offers a powerful reporting and analysis tool which will come in handy as you will be able to monitor all users activity: who is trying to connect USB devices, what kind of data are they copying on them, how are the users using devices. You will have the ability to drill down from high level to more detailed reports and analyses, making this way data audit processes easy and straightforward.
Endpoint Security for Workstations, Laptops and Servers

Endpoint Security for Workstations, Laptops and Servers

Endpoint Protector is designed to protect PCs from threats posed by removable portable storage and endpoint devices such as USB Flash Drives, MP3 Players, iPods and digital cameras. These and other devices could be accidentally or intentionally used to leak, steal, or lose data.
Enforced Encryption with EasyLock

Enforced Encryption with EasyLock

If a USB stick full with company information gets accidentally lost or stolen, this might have severe consequences, especially when reaching into the wrong hands. We thought of that and this is why we give you the possibility to automatically encrypt data copied on USB devices so that no unauthorized person can access and use the stored information.
Offline Temporary Password for USB Devices

Offline Temporary Password for USB Devices

While on the road and without a connection to the office network, USB flash drives or other devices can be allowed by the Administrator for a specific period from 30 minutes up to 30 days.
Offline Temporary Password for Computers

Offline Temporary Password for Computers

Further extending the flexibility needed for computers on the road and without a connection to the office network, the Administrator can specify the period when USB devices as well as any file transfers can be performed. This can also be anywhere from 30 minutes up to 30 days.
File Whitelisting

File Whitelisting

Only authorized files (e.g. product brochures PDFs) can be transferred to authorized devices. All other files are blocked and attempted file transfers are recorded and reported.
Threshold for Predefined Content Filter

Threshold for Predefined Content Filter

This option defines a maximum number of violations up to which a file transfer is allowed. The set number can refer either to a specific type of content (eg 3: 3 SSN, 3 PII, etc) or to the sum of all violations (eg 3: 1 SSN + 1 PII, etc).
Integration with (SIEM) solutions

Integration with Security Information and Event Management (SIEM) solutions

Only authorized files (e.g. product brochures PDFs) can be transferred to authorized devices. All other files are blocked and attempted file transfers are recorded and reported. The possibility of transmitting all logs to a SIEM server allows for a seamless experience of the reporting and analysis capabilities by delivering high quality data through one location. Your business will benefit from comprehensive analytics and graphics that provide real-time correlations for faster detection of incidents and threats.
DLP for Thin Clients

Device Control and Data Loss Prevention for Thin Clients

Protect data on Terminal Servers and prevent data loss in Thin Client environments. Control the use of portable storage devices and filter data that is being copied / uploaded to cloud storage and other online applications.
Data Loss Prevention for Printers

Data Loss Prevention for Printers

Create policies for local and network printers to block printing of confidential documents and prevent data loss and data theft. Filters from the Content Aware Protection module can be used to set up DLP for printer policies: File Type, Predefined Content (Social Security Numbers, Credit Card Numbers, E-mail addresses, etc.), and Custom Content (based on dictionaries).
HIPAA Content Aware Policies

HIPAA Content Aware Policies

HIPAA policies allow for an in depth scanning of documents before the transfer is made and blocking the files if they contain sensitive information like FDA approved drugs, ICD-9 codes and diagnosis lexicon. They also extend to Personal Information, like Social Security Numbers (SSNs) and others.
Clipboard Monitoring

Clipboard Monitoring

Puts an end to Data Leakage threats of sensitive data through Copy & Paste / Cut & Paste for even further enhanced data security.
Disable Print Screen

Disable Print Screen

Revokes Screen Capture capabilities and makes sure no valuable data displayed on the screen is leaked out of the protected network.
Mac HDD Encryption

Mac HDD Encryption

Ensure data stored on Macs is safe. Remotely enforce encryption on the Macs in your network and keep confidential data secure. While FileVault 2 is part of Mac OS X (version 10.9+), most users may not enable it so this is a perfect way to ensure compliance in your organization.
Regular Expressions Filters

Regular Expressions Filters

Create advanced custom filters to find a certain recurrence in data transferred across the protected network (eg. coupon numbers, employee IDs, etc.). Ideal for users with advanced knowledge of the Regex syntax, further complying with rules and regulations, while also simplifying data security.
Department Management

Department Management

Departments can be organized and separate dedicated policies can be applied to manage the diverse device use needs in large organizations.
Appetizer License
Appetizer License offers totally FREE enhanced data and endpoint security for small networks with up to 5 computers to protect against data theft, data leaks and data loss. SMBs have no excuse now to leave their sensitive information unprotected.