Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.



* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
My Endpoint Protector Knowledge Base

Below you can explore issues related to My Endpoint Protector and find the advice you need. For any other additional questions, suggestions, improvements requests or if you simply want to report a problem, please contact the support team.

Is it possible for hackers to access our company network protected through My Endpoint Protector?

No. All communication between the My Endpoint Protector Client and Server is initiated from the Client's side. This is done over a secure channel, HTTPS. Moreover, external access to My Endpoint Protector client and to its container (PC/OS) is impossible. Access to your company network through My Endpoint Protector is impossible.
Was this article helpful?
YES NO
Can you please tell us how we can improve this article.
Thank you for your feedback!