Centralized Device Management
Content Aware Protection
Content-Aware Data Loss Prevention (DLP) offers detailed control over sensitive data leaving the company's network through all possible exit points, from clipboard, screen captures, USB devices to applications including Microsoft Outlook, Skype, Yahoo Messenger or Dropbox.
Mobile Device Management
Offers better management over the use of Android and iOS devices through detailed monitoring, logging and reporting of all mobile device activity and remote enforcement of strong security policies. Companies will gain enhanced protection against both inside and outside threats as well as increase productivity by pushing applications or Wi-Fi and e-mail settings.
Support for Mac OS X and Windows (XP, Vista, 7, 8)
With cross-platform support, confidential data is kept safe inside the network regardless if Macs or Windows PCs are used. This widens your security and aids users that require a specific operating system.
Reporting and Analysis
The reporting and analysis tool allows you to closely analyze all portable device activity and content leaving your network. Ideal for internal and external audits as well as reports for executives, providing the information needed for a quick reaction in case of policy violations.
100% Cloud Managed
Controlling ports and USB devices, confidential data and mobile devices through a server in the cloud is the best solution to centrally manage your network without having to become an IT expert.
Our cloud runs on green energy from 100% carbon dioxide-free and environmentally-friendly hydropower. Choose My Endpoint Protector with a clear conscience.
Safety of our Cloud Data Centers
Further extending the security, reliability and confidentiality of our solutions, our Cloud Data Centers are located in Germany and are trusted by some of the biggest companies in the world.
Mobile Application Management (MAM) for iOS
Discover and manage what applications are brought into the company network. Instantly push free and paid apps to enrolled mobile devices from your own Apps Catalog.
Offline Temporary Password
While on the road and without a connection to the office network, USB flash drives or other devices can be allowed by the Administrator for a specific period from 30 minutes up to 30 days.
Puts an end to Data Leakage threats of sensitive data through Copy & Paste / Cut & Paste for even further enhanced data security.
Disable Print Screen
Revokes Screen Capture capabilities and makes sure no valuable data displayed on the screen is leaked out of the protected network.
Device use Policy Enforcement
With My Endpoint Protector you will comply with government regulations, industry standards and IT governance in regard to data leakage prevention. Easily enforce internal policies without compromising productivity.
Using Enforced Encryption with TrustedDevices ensures that all endpoint devices are not only authorized and controlled but also protecting sensitive and confidential data in transit. If you or one of your colleagues loses a USB device, the data on it cannot be read as it is encrypted.
Appetizer License offers totally FREE enhanced data and endpoint security for small networks with up to 5 computers to protect against data theft, data leaks and data loss. SMBs have no excuse now to leave their sensitive information unprotected.
Allows access to all My Endpoint Protector’s features for a period of 10 days. Protect and manage up to 50 computers (Windows & Mac) and 5 mobile devices (Android & iOS).