Endpoint Protector
Device Control

Lockdown, control, and monitor USB and peripheral ports to stop data theft and data loss.
Device Control - USB Lockdown Software | Endpoint Protector

Trusted by

Is your sensitive data at risk due to a lack of device management?

External devices such as flash drives, Bluetooth, and other portable USB devices, although harmless at a first glance, are one of the top causes for security incidents that can cause major damages to any business. Damages range from confidential data being stolen to huge fines due to violations of compliance rules and regulations. End users must be aware of the risks, and for businesses, to have measures in place to prevent data breaches and leakage from external devices.

Cross-platform, lightweight agent

Cross-platform, lightweight agent

Remotely monitor USBs and peripheral ports across different operating systems from a simple web-based interface with no performance impact on the protected computers. Set device control policies with ease for Windows, macOS, and Linux, and enable USB Device Control functionality to have precise and granular control over USB devices and other portable devices on each operating system.

Remote and temporary access

Remote and temporary access

Grant USB access remotely, even when computers are offline, while having a complete list of log reports once back on the network.

Precise and granular control

Precise and granular control

Depending on departments’ requirements, specify which devices can or cannot be used, create device whitelists and blacklists, and define policies per user, computer, or group for uninterrupted workflow throughout the company.

Gain full control of USB devices, Bluetooth, and peripheral ports

The centrally-managed Device Control solution allows for granular control over USB device permissions, enabling full control of the USB ports and connected storage devices. This way, it prevents accidental or intentional data loss and data transfers, while also enabling endpoint protection against the spread of USB malware, BadUSB attacks, or viruses. With Device Control, businesses can centralize user access management and customize access permissions for removable media connections.

Device Control Device Control

How it works

Device Control is the first layer of security provided by Endpoint Protector by CoSoSys. By defining granular access rights for USB and peripheral ports, endpoint security is enforced while productivity is maintained. As a cross-platform solution, it protects the entire network, including removable storage devices, regardless if the computers are running on Windows, macOS, or Linux environments.

Set granular device control policies and monitor all USB ports and devices on all endpoints
Uniquely identify all USB connected devices and removable media
Block unauthorized device use or enforce data encryption remotely
Get reports and notifications regarding USB activity on all endpoints

Controlled device types

Device Control allows easy management for the majority of known USB drive types, for enhanced data protection in various work environments.

See all devices
  • USB Storage Devices (USB Flash Drives, Sticks, Pen drives, etc.)
  • External HDDs (incl. sATA HDDs)
  • CD/DVD-Players and Burners (internal and external)
  • iPhones, iPads and iPods
  • Smartphones and Tablets (incl. Android devices, Blackberry and PDAs) 
  • Digital Cameras
  • MP3 Player and other Media Player Devices
  • Card Readers (internal and external)
  • Memory Cards (SD, MMC, CF, Smartcard, etc.)
  • Printers
  • Floppy Drives
  • Webcams
  • WiFi Network Cards
  • FireWire Devices
  • Biometric Devices
  • Bluetooth Devices
  • ZIP Drives
  • ExpressCard SSD
  • Wireless USB
  • Serial Port
  • Teensy Board
  • PCMCIA Storage Devices
  • Thunderbolt
  • Network Share
  • Thin Client Storage (RDP Storage)
  • Additional Keyboards
  • USB Modems
  • Infrared Dongle

Protect company IP, PII, financial data, or other regulated data types without compromising productivity

Intellectual Property (IP) Protection

Endpoint Protector uses advanced technologies such as N-gram-based text categorization to accurately discover IP, including source code, within hundreds of file formats, and then monitor and control any transfers to prevent data theft.

Personally Identifiable Information (PII) Protection

Discover and protect Personally Identifiable Information (PII) and sensitive information stored on employee endpoints with our data discovery module. Monitor data and prevent data exfiltration and data leaks with an all-in-one Data Loss Prevention tool.

Insider Threat Protection

Stop data leakage and data theft and by applying appropriate cybersecurity controls at the endpoint - from logging potential insider threats, to real-time blocking. Discover end-users that fail to follow data security policies and situations that can lead to a policy violation or data leakage.

Compliance and Regulations

Endpoint Protector’s DLP software can help organizations ensure data privacy and achieve regulatory compliance with HIPAA, PCI-DSS, NIST, GDPR, SOX, and others, avoiding fines and other damages imposed by regulatory entities.

Endpoint Protector Features

Device Control

USB & Peripheral port control

Lockdown, monitor and manage devices. Granular control based on vendor ID, product ID, serial number and more.

Content-Aware Protection

Scanning data in motion

Monitor, control and block file transfers. Detailed control through both content and context inspection.

Enforced Encryption

Automatic USB encryption

Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.

eDiscovery

Scanning data at rest

Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans.

What our customers have to say about Endpoint Protector

"
“Endpoint Protector has proven to be a very powerful DLP solution.”
Sr. Director of Technology & Information Security
"
“Effective, reliable and easy to integrate.”
Customer Experience Leader
Firm Size:30B+ USD
Endpoint Protector Leader 2024 Award
Endpoint Protector High Performance 2024 Award
Endpoint Protector Globee 2023 Award
Endpoint Protector Infosec 2022 Award
Award-winning DLP for keeping confidential data and businesses more secure.
See all awards & certifications

Multiple deployment options

virtual-appliance

Virtual appliance

Available in VMX, PVA, OVF, OVA, XVA and VHD formats, being compatible with the most popular virtualization tools.

Read more

cloud-services-gray

Cloud services

Available for deployment in the following cloud services: Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform (GCP).

Read more

cloud-hosted-gray

SaaS

Reduce deployment complexity & cost. Focus more resources on identifying and mitigating risks to your sensitive data and less on maintaining the infrastructure.

Read more

Citrix
VMware Technology Alliance Partner
Microsoft Partner
The Linux Foundation
Our main focus is to develop and deliver flexible, strong, and time-saving solutions, which is why technology partnerships with leading providers are essential for us.
See all technology partners
Request Demo
* Your privacy is important to us. Check out our Privacy Policy for more information.