Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.



* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them

Secure your data and stay compliant while employees work from home. Remote deployment in 30 minutes.

Device Control

Lockdown, Control and Monitor USB and peripheral ports to stop data theft and data loss.

Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.



* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them
Thank you for your request.
Please check your e-mail for the download link.

Before installing any package, please take a look at our resources section.
Free Trial. No credit-card, no commitment.
An e-mail will be sent to the contact details below. It contains download links and helpful information.



Please use a valid email address!
Data privacy is very important to us. Details provided, will only be used for the purpose they were intended for. Read more about our commitment and Privacy Policy.
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Convenience is everything
Up and running in 30min
OVF, OVA, VMX, XHDX, PVM and XVA packages available. Simple setup, straightforward policy builder, intuitive and responsive UI.
1
The most advanced Device Control solution on the market
2
Ideal for both small businesses and enterprises
3
Cross-platform, easy to use and cost effective

The necessity of Device Control software

USB flash drives and other portable USB devices, although harmless at a first glance, are one of the top causes for security incidents which can cause major damages to any business. Damages range from confidential data being stolen to huge fines due to violations of compliance rules and regulations.

The Solution

The centrally managed Device Control module allows full control of the USB ports and connected storage devices. This way, it prevents accidental or intentional data loss and data leaks, while also protecting the endpoints against the spread of USB malware, BadUSB attacks or viruses.

1
Uniquely identify USB storage devices
2
Monitor all USB ports and devices on all endpoints
3
Block unauthorized device use or enforce data encryption
4
Get email reports and alerts regarding your endpoints

Main features and benefits

Easy to deploy and user-friendly

End the headaches of configuration and deployment. Save time with a solution that is up and running in a few minutes.

Cross-platform and lightweight client

Monitor USBs and peripheral ports from a simple web-based interface with no performance impact on the client. Set policies with ease for Windows, macOS and Linux.

Precise and granular control

Specify which devices can or cannot be used, create device whitelists and blacklists, define policies per user or computer, group and more. Flexible solution for every need.

Remote and temporary access

Grant USB access remotely, even if computers are offline while having a complete list of log reports once back in the network.