Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.



* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them

Secure your data and stay compliant while employees work from home. Remote deployment in 30 minutes.

Endpoint Protector Knowledge Base

Below you can explore FAQs related to Endpoint Protector and find the information you need. For any other additional questions, suggestions, and improvements please contact the support team.

How can I control iDevices on Endpoint Protector for Mac?

iDevices can be separately controlled on Mac computers, each of them corresponding to a dedicated device category, respectively iPhone, iPad and iPod Touch.
Was this article helpful?
YES NO
Can you please tell us how we can improve this article.
Thank you for your feedback!