TOP 10 Endpoint Protector Features According to Our Clients
We always enjoy hearing from our customers and partners and their experience with the Endpoint Protector product family. It’s not only a matter of professional satisfaction: we build our products with our clients’ needs always before us, often adding new features from feedback sessions or developing them together with customers.
This year, we decided to dedicate an entry on our blog to the top ten features that are most often mentioned by our customers and that rank the highest on their list of things they love about Endpoint Protector. Without further ado, here they are:
1. Easy to install and manage
With one of the biggest concerns about the adoption of Data Loss Prevention (DLP) solutions being how long a potential implementation will take and how difficult the product will be to manage once it’s in place, it is no surprise that our customers are relieved and often enthusiastic about how easy Endpoint Protector is to install and manage.
We pride ourselves in getting Endpoint Protector up and running in 30 minutes. Sometimes, in fact, it can take even less. Our products are always human-centric, which means user friendliness is at the top of our priorities and Endpoint Protector can be easily run by both technical and non-technical personnel.
From the very beginning when Endpoint Protector was first developed, we endeavored to think of all users, not only those belonging to the most frequently used OS in the work environment, namely Windows. Fast-forward 14 years later, and Endpoint Protector is one of the few DLP solutions on the market offering cross-platform support.
Not only that, it also provides feature parity, which means customers can get the same features and level of protection for a computer running on Linux or a Mac as they do on a Windows endpoint. Many of our customers that run multiple-OS networks are often relieved when they finally find Endpoint Protector, a solution that meets their exact needs.
3. Extensive Number of Device Types
Device control policies are only as effective as the range of devices they cover. Our customers are often excited by the multitude of options offered by Endpoint Protector. From iOS, Android and USB storage devices to printers, webcams and bluetooths, Endpoint Protector allows admins to enforce device control policies on them all and effectively control the flow of data out of the network.
4. Granular Policies
One of Endpoint Protector’s most attractive features is the dynamic and granular way its policies can be deployed. Admins can set access rights not only on a global level, but also based on groups, users, endpoints or even device type. Settings can also be customized depending on needs, with some computers having different or more rigorous policies enabled.
This high level of flexibility is ideal for networks that require stricter enforcement of DLP policies on certain endpoints such as computers used for data processing or editing of copyrighted material.
5. File Shadowing
A very useful tool for auditing purposes and the assessment of the impact of data loss on a network, File Shadowing saves a copy of all files that were flagged as violating security policies on the server for additional review.
6. Offline Temporary Password
Offline Temporary Passwords are a way for admins to manage temporary access rights. Through them, administrators can grant unrestricted access to users or for particular endpoints for a limited time frame, even if the computers are off the network or don’t have internet connection, making it easier for them to deal with unexpected situations on short notice.
7. Control Multiple Data Flows, from USBs to Online Apps
Endpoint Protector covers a wide range of data flows for a smooth and effective blocking and managing of outbound data on company networks. This includes the possibility to limit or block the use of USB storage devices based on different levels of trust, but also data transfers over the internet through not only traditional communication tools such as emails and share drives, but also messaging applications, web browsers and social media.
With over 150+ transfer channels that can be included in policies and more being added every day, it’s no surprise this is a feature that is often praised by our customers.
8. An Easy Way to Locate Sensitive Data
Because of this, our latest Endpoint Protector module, eDiscovery, was a most welcome addition to our DLP tools. It allows admins to scan data at rest on all network endpoints and discover where sensitive data is stored and encrypt or delete it when it is found on unauthorized users’ computers.
9. Enforced USB encryption
USB devices, through their sheer size and portability, have long been the bane of sensitive data security the world over. They are easy to lose or forget and considerably easier to steal than larger devices, but their ease of use and convenience make them a staple of offices everywhere.
Endpoint Protector’s Enforced Encryption addresses this specific vulnerability in data protection by enabling companies to automatically encrypt any data copied from a company network onto a USB device.
10. Detailed Reports of User Activity
Finally, in the era of the data protection legislation, companies have started to be held accountable for the way they process their data. By keeping detailed records of user activity within company networks, organizations can identify patterns in policy violation or problematic users that require additional training, but they can also support their claims to compliance with different legislations.
As we work to add even more exciting new features to Endpoint Protector’s next release, we look forward to revisiting this top 10 in a year’s time and seeing how our customers’ preferences have evolved once with our products.
Download our free ebook on
Data Loss Prevention Best Practices
Helping IT Managers, IT Administrators and data security staff understand the concept and purpose of DLP and how to easily implement it.