Protecting data on
more than 30 million devices
Device Control for Mac OS X
Control and monitor how data is used with USB, FireWire, CD/DVD, etc. to protect it
Device Control for Mac OS X
See Endpoint Protector 4 in action
Fill in the form below and get a download link
to the Endpoint Protector Virtual Appliance.

Need help to get around the product? Request a demo,
and an expert will help you to get started.

USB Lockdown for Mac OS X (Device Control for Mac OS X)

The increased use of portable devices has not only improved the efficiency and mobility of our daily work, but at the same time also significantly increased the threats to companies’ data security. USB devices and other portable storage devices (such as memory cards, digital cameras, CDs/DVDs, etc.), although small and at a first glance harmless, are one of the top causes for security incidents with millions of dollars in losses for businesses. The need of using a device control solution and controlling the use of devices in corporate environments has become nowadays a must in order to keep up with the latest security challenges.

Macs are becoming an integral part of the business world today as organizations are openly accepting and deploying them on their networks. Therefore, stopping users from taking classified information from Macs minis, iMacs, Mac Pros, MacBooks onto portable devices has become an imperative for the companies' data security.

Locking down and monitoring proactively the use of USB, CD/DVD, card readers, etc. is possible with Device Control by Endpoint Protector for Mac OS X and can be managed centrally from the intuitive web-based interface.

If you wish to add an additional layer of security, Content Aware Protection is also available for Mac OS X.
What we prevent?

- Intentional Data Theft
- Accidental Data Loss or Data Leakage
- Uncontrolled device use for Mac OS X 10.5+
- *On demand for Mac OS X 10.4

How it works?

USB Lockdown for Mac OS X
Define and enforce device control policy
Monitor all ports and device activity on endpoints
Action is taken. Either to block device use or monitor the events involving devices
All actions are logged, reported or even alerted

Our Products:

Endpoint Protector

Endpoint Protector

On-premise Data Loss Prevention available as hardware or virtual appliance
  • Device Control (for Windows, Mac and Linux)
  • Content Aware Protection (for Windows, Mac and Linux)
  • Mobile Device Management (for Android and iOS)

My Endpoint Protector

My Endpoint Protector

Cloud-based Data Loss Prevention available anywhere, anytime
  • Device Control (for Windows and Mac)
  • Content Aware Protection (for Windows and Mac)
  • Mobile Device Management (for Android and iOS)

Endpoint Protector Basic
Endpoint Protector Basic
Stand-alone application
  • No internet or network connection required
  • Module: Device Control (for Windows and Mac)

Our customers include industry leading companies:

CoSoSys Customers



Endpoint Protector 4 wins the DLP Solution of the Year Award for the second year in a row at Computing Security Awards 2015Endpoint Protector 4 receives Common Criteria EAL2 Certification

Need our solutions?

We are ready to help! Please fill in the form below and we will contact you shortly.

I'm interested in:

Please contact me on: