Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.



* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them
My Endpoint Protector Knowledge Base

Below you can explore issues related to My Endpoint Protector and find the advice you need. For any other additional questions, suggestions, improvements requests or if you simply want to report a problem, please contact the support team.

How does My Endpoint Protector work? (Discontinued)

After creating a My Endpoint Protector account you can proactively manage the use of portable devices and file transfers on all protected computers. To do this, simply download and install a small client application on all computers you want to protect and manage. This will help against threats like data theft, data loss or data leakage caused by unauthorized devices use or file transfers to emails, cloud storage, social media, cloud storage or other online applications.

See How it Works Video
Was this article helpful?
YES NO
Can you please tell us how we can improve this article.
Thank you for your feedback!