Protecting data on
more than 30 million devices

Videos & Tutorials



 
 
     
 

How My Endpoint Protector Works


Device Control & Endpoint Security as a Service (SaaS)

Related Videos
 
General Videos
 
Setup a Content Aware Protection (CAP) Policy in Endpoint Protector
Learn how to setup a Content Aware Protection Policy in Endpoint Protector 4. Prevent confidential information from leaving the endpoint through USB and peripheral ports, printers, e-mails, instant messengers, cloud storage and other online applications. Through the Content Aware Protection module in Endpoint Protector 4, file transfer policies can be setup for Windows and Mac OS X computers. Filters can be created based on file extensions, predefined content (Social Security Numbers, Credit Card Numbers, etc.), custom content (create dictionaries based on keywords) or regular expressions.

02:21
 
How to configure/setup rights in Endpoint Protector 4
In this tutorial we walk you through and show you how to setup rights in Endpoint Protector 4. Get a quick insight into: Device Rights, User Rights, Computer Rights, Group Rights and Global Rights. Device Control is an essential solution to prevent Data Losses and Data Leaks. Along with Content Aware Protection and Mobile Device Management (MDM) it is a key feature in every IT Security strategy.

03:00
 
How to use the Offline Temporary Password (OTP) feature in Endpoint Protector 4
Learn how to authorize the use of blocked devices (USB Flash Drives, CD/DVD, external HDDs, etc.) by using the Offline Temporary Password (OTP) feature when computers are off the network. It works for Windows, Mac and Linux computers in the same way.

01:25
 
Mobile Device Management (MDM) for iOS and Android with Endpoint Protector
Secure your mobile iOS and Android devices with Endpoint Protector Mobile Device Management (MDM) and keep a close eye on where devices are going with your sensitive enterprise data

01:20
 
Content Aware Protection to prevent sensitive data leakage through all possible exit points
Content Aware Protection is a module in Endpoint Protector that offers detailed control over sensitive data leaving the company's network

04:17
 
Endpoint Protector Virtual Appliance for Device Control and DLP
Our virtual appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices

00:43
 
Endpoint Protector Hardware Appliance for Device Control and Endpoint Security
Our appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices

01:13
 
Endpoint Protector for Device Control explained in plain English
With Endpoint Protector you have full control, manageability and transparency of what is happening at your PCs and Macs ports

01:39
 
Device Control, USB Lockdown and Control for Mac OS X
Controlling the use of USB, FireWire, SD Card Reader, Bluetooth, etc on your Mac is vital to protect your data

01:29
 
Endpoint Protector Basic - Data Protection for Small Offices or Home Use
Manage and control the use of portable devices with Endpoint Protector Basic, the perfect companion for your application firewall

01:05
 
EasyLock - Cross platform encryption for Windows, Mac OS X and Linux
Strong military grade encryption algorithms and an intuitive drag and drop interface, helping anyone turn any mobile storage device into a portable data safe

01:03
 
My Endpoint Protector explained in plain English - DLP | MDM
Manage portable storage devices, control what data is leaving your network through emails, messengers and other cloud applications and even manage the mobile device fleet. With My Endpoint Protector, a cloud-based, cross-platform Data Loss Prevention and Mobile Device Management you can stay clear of today’s data security threats.
Create a Free account at http://my.EndpointProtector.com

02:00
 
How My Endpoint Protector Works
Device Control & Endpoint Security as a Service (SaaS)

09:15
 
Endpoint Protector
and your data is safe from inside data theft

01:14
 
What is Endpoint Security?
Find out what Endpoint Security is about

04:31
 
What is Podslurping?
Data can be stolen/slurped using iPods or other portable devices. Protect your data!

03:12
 
Testimonials

Endpoint Protector has exceeded my expectations as it has proven so easy to deploy across our network. We had an excellent experience working with CoSoSys as all our requests for support have been responded to very quickly.
Dan Highton, Network Manager
IT Business Edge - Endpoint Protector Review
Touted as an all-in-one device offering that works straight out of the box without the need for complicated server setup, the device secures endpoints with just a few clicks of the mouse.

Newsletter

Feel free to subscribe yourself to our newsletter.

Mr.   Ms.
 
First Name

Last Name

E-mail *
Company