Centralized Device Management

The online administrative console gives you a complete overview of all device activity at endpoints allowing to centrally monitor and control the use of USB flash drives and other portable storage devices.

Content Aware Protection

Content-Aware Data Loss Prevention (DLP) provides detailed control over sensitive data leaving the company's workstations through all possible exit points, from clipboard, screen captures, USB devices to applications including Microsoft Outlook, Skype, Yahoo Messenger or Dropbox.

Mobile Device Management

It offers better management over the use of Android and iOS devices through detailed monitoring, logging, and reporting of all mobile device activity and remote enforcement of strong security policies. Companies will gain enhanced protection against both inside and outside threats as well as increased productivity by pushing applications or Wi-Fi and e-mail settings.

Support for Mac OS X and Windows (XP, Vista, 7, 8, 10)

With cross-platform support, confidential data is kept safe inside the network regardless if Macs or Windows computers are used. This widens your security and aids users that require a specific operating system.

Reporting and Analysis

The reporting and analysis tool allows you to closely analyze all portable device activity and content leaving your network. Ideal for internal and external audits as well as reports for executives, providing the information needed for a quick reaction in case of policy violations.

100% Cloud Managed

Controlling ports and USB devices, confidential data and mobile devices through a server in the cloud is the best solution to centrally manage your network without having to become an IT expert.


Our cloud runs on green energy from 100% carbon dioxide-free and environmentally-friendly hydropower. Choose My Endpoint Protector with a clear conscience.

Safety of our Cloud Data Centers

Further extending security and confidentiality, our Cloud Data Centers are located in multiple locations (Germany, USA, Korea, and more) and are trusted by some of the biggest companies in the world.

Mobile Application Management (MAM) for iOS

Discover and manage what applications are brought into the company network. Instantly push free and paid apps to enrolled mobile devices from your own Apps Catalog.

Offline Temporary Password

While on the road and without a connection to the office network, USB flash drives or other devices can be allowed by the Administrator for a specific period from 30 minutes up to 30 days. The feature can also grant temporary permission to transfer sensitive data through online apps and services and temporarily revokes all restrictions for specific computers.

Clipboard Monitoring

Puts an end to Data Leakage threats of sensitive data through Copy & Paste / Cut & Paste for even further enhanced data security.

Disable Print Screen

Revokes Screen Capture capabilities and makes sure no valuable data displayed on the screen is leaked out of the protected network.

Device use Policy Enforcement

With My Endpoint Protector, you can establish the policy for device use to comply with government regulations, industry standards, and IT governance in regard to data leakage prevention. Easily enforce internal policies without compromising productivity.

Regular Expressions Filters

Create advanced custom filters to find a certain recurrence in data transferred across the protected network (eg. coupon numbers, employee IDs, etc.). Ideal for users with advanced knowledge of the Regex syntax, further complying with rules and regulations, while also simplifying data security.

Appetizer License

Appetizer License offers totally FREE enhanced data security for small networks with up to 5 computers to protect against data theft, data leaks, and data loss. SMBs have no excuse now to leave their sensitive information unprotected.

Trial Version

Allows access to all My Endpoint Protector’s features for a period of 10 days. Protect and manage up to 50 computers (Windows & Mac) and 5 mobile devices (Android & iOS).

File Tracing

Track all data that was copied to and from USB flash drives or other portable storage devices and to online applications and services directly from the cloud-based interface. A thorough record of all the flow of information in the network is essential to support audits and to control data leakage.