|Setup a Content Aware Protection (CAP) Policy in Endpoint Protector
Learn how to setup a Content Aware Protection Policy in Endpoint Protector 4. Prevent confidential information from leaving the endpoint through USB and peripheral ports, printers, e-mails, instant messengers, cloud storage and other online applications. Through the Content Aware Protection module in Endpoint Protector 4, file transfer policies can be setup for Windows and Mac OS X computers. Filters can be created based on file extensions, predefined content (Social Security Numbers, Credit Card Numbers, etc.), custom content (create dictionaries based on keywords) or regular expressions.
|How to configure/setup rights in Endpoint Protector 4
In this tutorial we walk you through and show you how to setup rights in Endpoint Protector 4. Get a quick insight into: Device Rights, User Rights, Computer Rights, Group Rights and Global Rights. Device Control is an essential solution to prevent Data Losses and Data Leaks. Along with Content Aware Protection and Mobile Device Management (MDM) it is a key feature in every IT Security strategy.
|How to use the Offline Temporary Password (OTP) feature in Endpoint Protector 4
Learn how to authorize the use of blocked devices (USB Flash Drives, CD/DVD, external HDDs, etc.) by using the Offline Temporary Password (OTP) feature when computers are off the network. It works for Windows, Mac and Linux computers in the same way.
|Mobile Device Management (MDM) for iOS and Android with Endpoint Protector
Secure your mobile iOS and Android devices with Endpoint Protector Mobile Device Management (MDM) and keep a close eye on where devices are going with your sensitive enterprise data
|Content Aware Protection to prevent sensitive data leakage through all possible exit points
Content Aware Protection is a module in Endpoint Protector that offers detailed control over sensitive data leaving the company's network
|Endpoint Protector Virtual Appliance for Device Control and DLP
Our virtual appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices
|Endpoint Protector Hardware Appliance for Device Control and Endpoint Security
Our appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices
|Endpoint Protector for Device Control explained in plain English
With Endpoint Protector you have full control, manageability and transparency of what is happening at your PCs and Macs ports
|Device Control, USB Lockdown and Control for Mac OS X
Controlling the use of USB, FireWire, SD Card Reader, Bluetooth, etc on your Mac is vital to protect your data
|Endpoint Protector Basic - Data Protection for Small Offices or Home Use
Manage and control the use of portable devices with Endpoint Protector Basic, the perfect companion for your application firewall
|EasyLock - Cross platform encryption for Windows, Mac OS X and Linux
Strong military grade encryption algorithms and an intuitive drag and drop interface, helping anyone turn any mobile storage device into a portable data safe
|My Endpoint Protector explained in plain English - DLP | MDM
Manage portable storage devices, control what data is leaving your network through emails, messengers and other cloud applications and even manage the mobile device fleet. With My Endpoint Protector, a cloud-based, cross-platform Data Loss Prevention and Mobile Device Management you can stay clear of today’s data security threats.
Create a Free account at http://my.EndpointProtector.com
|How My Endpoint Protector Works
Device Control & Endpoint Security as a Service (SaaS)
and your data is safe from inside data theft
|What is Endpoint Security?
Find out what Endpoint Security is about
|What is Podslurping?
Data can be stolen/slurped using iPods or other portable devices. Protect your data!