Protecting data on
more than 30 million devices

+1-888-271 9349
Live HelpLive Help Online

Videos & Tutorials



 
 
     
 

How My Endpoint Protector Works


Device Control & Endpoint Security as a Service (SaaS)
Related Videos
 
General Videos
 
Mobile Device Management (MDM) for iOS and Android with Endpoint Protector
Secure your mobile iOS and Android devices with Endpoint Protector Mobile Device Management (MDM) and keep a close eye on where devices are going with your sensitive enterprise data

01:20
 
iOS Device Enrollment via SMS Tutorial
This Tutorial shows how to enroll an iOS device (iPhone) via SMS for Mobile Device Management via Endpoint Protector. iOS devices can also be enrolled using E-Mail invitations, a web portal or a QR code send to the device user.

04:35
 
Content Aware Protection to prevent sensitive data leakage through all possible exit points
Content Aware Protection is a module in Endpoint Protector that offers detailed control over sensitive data leaving the company's network

04:17
 
Endpoint Protector Virtual Appliance for Device Control and DLP
Our virtual appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices

00:43
 
Endpoint Protector Hardware Appliance for Device Control and Endpoint Security
Our appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices

01:13
 
Endpoint Protector for Device Control explained in plain English
With Endpoint Protector you have full control, manageability and transparency of what is happening at your PCs and Macs ports

01:39
 
Device Control, USB Lockdown and Control for Mac OS X
Controlling the use of USB, FireWire, SD Card Reader, Bluetooth, etc on your Mac is vital to protect your data

01:29
 
Endpoint Protector Basic - Data Protection for Small Offices or Home Use
Manage and control the use of portable devices with Endpoint Protector Basic, the perfect companion for your application firewall

01:05
 
EasyLock - Cross platform encryption for Windows, Mac OS X and Linux
Strong military grade encryption algorithms and an intuitive drag and drop interface, helping anyone turn any mobile storage device into a portable data safe

01:03
 
My Endpoint Protector explained in plain English - DLP | MDM
Manage portable storage devices, control what data is leaving your network through emails, messengers and other cloud applications and even manage the mobile device fleet. With My Endpoint Protector, a cloud-based, cross-platform Data Loss Prevention and Mobile Device Management you can stay clear of today’s data security threats.
Create a Free account at http://my.EndpointProtector.com

02:00
 
How My Endpoint Protector Works
Device Control & Endpoint Security as a Service (SaaS)

09:15
 
Endpoint Protector
and your data is safe from inside data theft

01:14
 
What is Endpoint Security?
Find out what Endpoint Security is about

04:31
 
What is Podslurping?
Data can be stolen/slurped using iPods or other portable devices. Protect your data!

03:12
 
 
Installation / Upgrade Videos
 
Upgrade Instructions for Endpoint Protector 2009
Endpoint Protector Server Running on Windows 2003 Server. Upgrade from Version 3.0.1.2 to 3.0.3.7

09:41
 
Testimonials

Endpoint Protector has exceeded my expectations as it has proven so easy to deploy across our network. We had an excellent experience working with CoSoSys as all our requests for support have been responded to very quickly.
Dan Highton, Network Manager
IT Business Edge - Endpoint Protector Review
Touted as an all-in-one device offering that works straight out of the box without the need for complicated server setup, the device secures endpoints with just a few clicks of the mouse.

Newsletter

Feel free to subscribe yourself to our newsletter.

Mr.   Ms.
 
First Name

Last Name

E-mail *
Company