Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.



* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them

Endpoint Protector
Device Control

Lockdown, control, and monitor USB and peripheral ports to stop data theft and data loss.

Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.



* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them
Thank you for your request.
Please check your e-mail for the download link.

Before installing any package, please take a look at our resources section.
Free Trial. No credit-card, no commitment.
An e-mail will be sent to the contact details below. It contains download links and helpful information.



Please use a valid email address!
Data privacy is very important to us. Details provided, will only be used for the purpose they were intended for. Read more about our commitment and Privacy Policy.
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Convenience is everything
Up and running in 30min
OVF, OVA, VMX, XHDX, PVM and XVA packages available. Simple setup, straightforward policy builder, intuitive and responsive UI.

Trusted by

Is your sensitive data at risk?

USB flash drives and other portable USB devices, although harmless at a first glance, are one of the top causes for security incidents which can cause major damages to any business. Damages range from confidential data being stolen to huge fines due to violations of compliance rules and regulations.

Cross-platform, lightweight agent

Remotely monitor USBs and peripheral ports from a simple web-based interface with no performance impact on the protected computers. Set policies with ease for Windows, macOS and Linux.

Remote and temporary access

Grant USB access remotely, even when computers are offline, while having a complete list of log reports once back in the network.

Precise and granular control

Depending on departments’ requirements, specify which devices can or cannot be used, create device whitelists and blacklists, and define policies per user, computer, or group for uninterrupted workflow throughout the company.

Gain full control of USB devices and peripheral ports

The centrally-managed Device Control module allows full control of the USB ports and connected storage devices. This way, it prevents accidental or intentional data loss and data leaks, while also protecting the endpoints against the spread of USB malware, BadUSB attacks or viruses.

Device Control Device Control

How it works

Device Control module is the first layer of security provided by Endpoint Protector. By defining granular access rights for USB and peripheral ports, device security is enforced while productivity is maintained. As a cross-platform solution, it protects the entire network, regardless of if the computers are running on Windows, Mac OS X, or Linux.

1
Set granular policies and monitor all USB ports and devices on all endpoints
2
Uniquely identify all USB conected devices
3
Block unauthorized device use or enforce data encryption remotely
4
Get reports and alerts regarding USB activity on all endpoints

Controlled device types

The Device Control module allows easy management for the majority of known USB device types, for enhanced data protection in various work environments.

See all devices
  • USB Storage Devices (USB Flash Drives, Sticks, Pen drives, etc.)
  • External HDDs (incl. sATA HDDs)
  • CD/DVD-Players and Burners (internal and external)
  • iPhones, iPads and iPods
  • Smartphones and Tablets (incl. Android devices, Blackberry and PDAs) 
  • Digital Cameras
  • MP3 Player and other Media Player Devices
  • Card Readers (internal and external)
  • Memory Cards (SD, MMC, CF, Smartcard, etc.)
  • Printers
  • Floppy Drives
  • Webcams
  • WiFi Network Cards
  • FireWire Devices
  • Biometric Devices
  • Bluetooth Devices
  • ZIP Drives
  • ExpressCard SSD
  • Wireless USB
  • Serial Port
  • Teensy Board
  • PCMCIA Storage Devices
  • Thunderbolt
  • Network Share
  • Thin Client Storage (RDP Storage)
  • Additional Keyboards
  • USB Modems
  • Infrared Dongle