|Mobile Device Management (MDM) for iOS and Android with Endpoint Protector
Secure your mobile iOS and Android devices with Endpoint Protector Mobile Device Management (MDM) and keep a close eye on where devices are going with your sensitive enterprise data
|iOS Device Enrollment via SMS Tutorial
This Tutorial shows how to enroll an iOS device (iPhone) via SMS for Mobile Device Management via Endpoint Protector. iOS devices can also be enrolled using E-Mail invitations, a web portal or a QR code send to the device user.
|Content Aware Protection to prevent sensitive data leakage through all possible exit points
Content Aware Protection is a module in Endpoint Protector that offers detailed control over sensitive data leaving the company's network
|Endpoint Protector Virtual Appliance for Device Control and DLP
Our virtual appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices
|Endpoint Protector Hardware Appliance for Device Control and Endpoint Security
Our appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices
|Endpoint Protector for Device Control explained in plain English
With Endpoint Protector you have full control, manageability and transparency of what is happening at your PCs and Macs ports
|Device Control, USB Lockdown and Control for Mac OS X
Controlling the use of USB, FireWire, SD Card Reader, Bluetooth, etc on your Mac is vital to protect your data
|Endpoint Protector Basic - Data Protection for Small Offices or Home Use
Manage and control the use of portable devices with Endpoint Protector Basic, the perfect companion for your application firewall
|EasyLock - Cross platform encryption for Windows, Mac OS X and Linux
Strong military grade encryption algorithms and an intuitive drag and drop interface, helping anyone turn any mobile storage device into a portable data safe
|My Endpoint Protector explained in plain English
Device Control can be so easy
|How My Endpoint Protector Works
Device Control & Endpoint Security as a Service (SaaS)
and your data is safe from inside data theft
|What is Endpoint Security?
Find out what Endpoint Security is about
|What is Podslurping?
Data can be stolen/slurped using iPods or other portable devices. Protect your data!
|Installation / Upgrade Videos|
|Upgrade Instructions for Endpoint Protector 2009
Endpoint Protector Server Running on Windows 2003 Server. Upgrade from Version 220.127.116.11 to 18.104.22.168