Protecting data on
more than 30 million devices

Videos & Tutorials


How My Endpoint Protector Works

Device Control & Endpoint Security as a Service (SaaS)

Related Videos
General Videos
Setup a Content Aware Protection (CAP) Policy in Endpoint Protector
Learn how to setup a Content Aware Protection Policy in Endpoint Protector 4. Prevent confidential information from leaving the endpoint through USB and peripheral ports, printers, e-mails, instant messengers, cloud storage and other online applications. Through the Content Aware Protection module in Endpoint Protector 4, file transfer policies can be setup for Windows and Mac OS X computers. Filters can be created based on file extensions, predefined content (Social Security Numbers, Credit Card Numbers, etc.), custom content (create dictionaries based on keywords) or regular expressions.

How to configure/setup rights in Endpoint Protector 4
In this tutorial we walk you through and show you how to setup rights in Endpoint Protector 4. Get a quick insight into: Device Rights, User Rights, Computer Rights, Group Rights and Global Rights. Device Control is an essential solution to prevent Data Losses and Data Leaks. Along with Content Aware Protection and Mobile Device Management (MDM) it is a key feature in every IT Security strategy.

How to use the Offline Temporary Password (OTP) feature in Endpoint Protector 4
Learn how to authorize the use of blocked devices (USB Flash Drives, CD/DVD, external HDDs, etc.) by using the Offline Temporary Password (OTP) feature when computers are off the network. It works for Windows, Mac and Linux computers in the same way.

Mobile Device Management (MDM) for iOS and Android with Endpoint Protector
Secure your mobile iOS and Android devices with Endpoint Protector Mobile Device Management (MDM) and keep a close eye on where devices are going with your sensitive enterprise data

Content Aware Protection to prevent sensitive data leakage through all possible exit points
Content Aware Protection is a module in Endpoint Protector that offers detailed control over sensitive data leaving the company's network

Endpoint Protector Virtual Appliance for Device Control and DLP
Our virtual appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices

Endpoint Protector Hardware Appliance for Device Control and Endpoint Security
Our appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices

Endpoint Protector for Device Control explained in plain English
With Endpoint Protector you have full control, manageability and transparency of what is happening at your PCs and Macs ports

Device Control, USB Lockdown and Control for Mac OS X
Controlling the use of USB, FireWire, SD Card Reader, Bluetooth, etc on your Mac is vital to protect your data

Endpoint Protector Basic - Data Protection for Small Offices or Home Use
Manage and control the use of portable devices with Endpoint Protector Basic, the perfect companion for your application firewall

EasyLock - Cross platform encryption for Windows, Mac OS X and Linux
Strong military grade encryption algorithms and an intuitive drag and drop interface, helping anyone turn any mobile storage device into a portable data safe

My Endpoint Protector explained in plain English - DLP | MDM
Manage portable storage devices, control what data is leaving your network through emails, messengers and other cloud applications and even manage the mobile device fleet. With My Endpoint Protector, a cloud-based, cross-platform Data Loss Prevention and Mobile Device Management you can stay clear of today’s data security threats.
Create a Free account at

How My Endpoint Protector Works
Device Control & Endpoint Security as a Service (SaaS)

Endpoint Protector
and your data is safe from inside data theft

What is Endpoint Security?
Find out what Endpoint Security is about

What is Podslurping?
Data can be stolen/slurped using iPods or other portable devices. Protect your data!


Secure it Easy gives us the ability to manage the controlled use of portable USB devices, external hard drives, FireWire devices, CD/ DVD-Readers/ Writers and many other potentially harmful endpoint devices, while also stopping malware, viruses and other unwanted data intrusions.
Dan Fontaine, VP of Technology, VIPdesk
IT Business Edge - Endpoint Protector Review
Touted as an all-in-one device offering that works straight out of the box without the need for complicated server setup, the device secures endpoints with just a few clicks of the mouse.


Feel free to subscribe yourself to our newsletter.

Mr.   Ms.
First Name

Last Name

E-mail *