Protect your network and sensitive data from threats posed by portable storage devices,cloud services and mobile devices
Portable storage devices such as USB flash drives, smartphones, tablets and cloud services like Dropbox, Google Drive may cause severe issues when it comes to controlling data use within and outside the company. As a full Data Loss Prevention (DLP) and Mobile Device Management (MDM) product available for Windows, Mac OS X and iOS, Android mobile devices, Endpoint Protector 4 prevents users from taking unauthorized data outside the company or bringing potential harmful files on storage devices.
For Windows, Mac, Linux
Having the possibility to control device activity inside a network from a simple Web interface will make things easier for you. Strong device use policies will ensure proactive protection for a safer working environment.
Content Aware Protection
For Windows, Mac
Offers detailed control over sensitive data leaving the company’s network. Through efficient content inspection, transfers of important company documents will be logged, reported and blocked.
Mobile Device Management
For iOS, Android
Offers enhanced control over the use of Android and iOS smartphones and tablets by companies’ employees, enforcing strong security policies and detailed tracking of all mobile devices.
Endpoint Protector 4 as Hardware and Virtual Appliance is the right solution so that you will not need to spend hours just reading the installation guide. You’ve got it all already installed.
The Endpoint Protector 4 Web administration and reporting console offers you a complete overview of the device activity on your computers, whether you work with Windows, Mac or Linux platforms. You will be able to define access policies per user/computer/device and authorize devices for certain user or user groups. Thus, your company will stay productive while maintaining control over the device fleet use.
Content-Aware Data Loss Prevention (DLP) for Windows and Mac OS X offers detailed control over sensitive data leaving the company's network. Through efficient content inspection, transfers of important company documents will be logged, reported and blocked. Content Aware Protection by Endpoint Protector prevents data leakage through all possible exit points, from clipboard, screen captures, USB devices to applications including Microsoft Outlook, Skype, Yahoo Messenger or Dropbox.
Offers better control over the use of Android and iOS devices by companies’ employees. Mobile Device Management by Endpoint Protector is the perfect solution for companies using their own mobile devices or adopting the BYOD (Bring-Your-Own-Device) model to protect sensitive company data. Through detailed monitoring, logging and reporting of all mobile device activity and remote enforcement of strong security policies, companies will gain enhanced protection against both inside and outside threats.
Track all data that was copied to and from USB flash drives or other portable storage devices directly from the Web management interface. With File Shadowing activated, you can even have access to hidden copies of all transferred files. A thorough record of all the flow of information in the network is essential to support audits and controlling data leakage
Simple device management policies will help you define User group permissions, allowing an efficient enforcement and maintenance of the predefined security policies across the network. Being able to block USB flash drives or other portable devices and track data going on them will help you comply with government regulations, industry standards and IT governance in regard to data leakage prevention.
This feature enables you to allow or block USB flash drives or other devices based on their unique characteristics(Ids). For instance you can create a rule where you can allow a USB stick from a certain manufacturer to connect on certain computers and block it for all the others. This feature gives you significant control over what devices are used on protected clients.
Support for Mac OS X, Windows (XP, Vista, 7, 8) and Linux
Endpoint Protector will protect your networks whether they are MAC, Windows or Linux based. This will offer you an even more secure working environment.
Mobile Application Management (MAM) for iOS and Android
IDiscover what applications people use on smartphones and tablets, bringing them into the company network, and manage accordingly to the organization’s security policies. Instantly push free and paid apps to enrolled mobile devices from your own Apps Catalog.
Working with Active Directory
If you already have Active Directory, then you can easily use it to deploy Endpoint Protector, making your life a lot easier.
Also you will have simplified device management policies with customizable templates for defined USR Groups (Active Directory GPOs).
Reporting and Analysis Tools
Endpoint Protector offers a powerful reporting and analysis tool which will come in handy as you will be able to monitor all users activity: who is trying to connect USB devices, what kind of data are they copying on them, how are the users using devices. You will have the ability to drill down from high level to more detailed reports and analyses, making this way data audit processes easy and straightforward.
Endpoint Security for Workstations, Laptops and Servers
Endpoint Protector is designed to protect PCs from threats posed by removable portable storage and endpoint devices such as USB Flash Drives, MP3 Players, iPods and digital cameras. These and other devices could be accidentally or intentionally used to leak, steal, or lose data.
Enforced Encryption with EasyLock
If a USB stick full with company information gets accidentally lost or stolen, this might have severe consequences, especially when reaching into the wrong hands. We thought of that and this is why we give you the possibility to automatically encrypt data copied on USB devices so that no unauthorized person can access and use the stored information.
Offline Temporary Password for USB Devices
While on the road and without a connection to the office network, USB flash drives or other devices can be allowed by the Administrator for a specific period from 30 minutes up to 30 days.
Offline Temporary Password for Computers
Further extending the flexibility needed for computers on the road and without a connection to the office network, the Administrator can specify the period when USB devices as well as any file transfers can be performed. This can also be anywhere from 30 minutes up to 30 days.
Only authorized files (e.g. product brochures PDFs) can be transferred to authorized devices. All other files are blocked and attempted file transfers are recorded and reported.
Threshold for Predefined Content Filter
This option defines a maximum number of violations up to which a file transfer is allowed. The set number can refer either to a specific type of content (eg 3: 3 SSN, 3 PII, etc) or to the sum of all violations (eg 3: 1 SSN + 1 PII, etc).
Data Loss Prevention for Printers
Create policies for local and network printers to block printing of confidential documents and prevent data loss and data theft. Filters from the Content Aware Protection module can be used to set up DLP for printer policies: File Type, Predefined Content (Social Security Numbers, Credit Card Numbers, E-mail addresses, etc.), and Custom Content (based on dictionaries).
HIPAA Content Aware Policies
HIPAA policies allow for an in depth scanning of documents before the transfer is made and blocking the files if they contain sensitive information like FDA approved drugs, ICD-9 codes and diagnosis lexicon. They also extend to Personal Information, like Social Security Numbers (SSNs) and others.
Puts an end to Data Leakage threats of sensitive data through Copy & Paste / Cut & Paste for even further enhanced data security.
Disable Print Screen
Revokes Screen Capture capabilities and makes sure no valuable data displayed on the screen is leaked out of the protected network.
Mac HDD Encryption
Ensure data stored on Macs is safe. Remotely enforce encryption on the Macs in your network and keep confidential data secure. While FileVault 2 is part of Mac OS X (version 10.9+), most users may not enable it so this is a perfect way to ensure compliance in your organization.
Regular Expressions Filters
Create advanced custom filters to find a certain recurrence in data transferred across the protected network (eg. coupon numbers, employee IDs, etc.). Ideal for users with advanced knowledge of the Regex syntax, further complying with rules and regulations, while also simplifying data security.
You can use the Virtual Appliance of Endpoint Protector for all business sizes. It is available in VMX, PVA, OVF, OVA, XVA and VHD formats to be compatible with the most popular virtualization tools.
All you need to do is to install the appliance in a Virtual Environment and deploy the Endpoint Protector clients to your machines and device use is instantly controlled.
|Supported Virtual Environments||Version||.OVF||.VMX||.VHD||.XVA||.PVM|
|VMware vSphere (ESXi)||5.1|
|Parallels Desktop for Mac||9.0.2|
|Microsoft Hyper-V Server||2008/2012|
|Citrix XenServer 64bit||6.2|
Other virtualization environments are supported as well.
The Endpoint Protector Hardware Appliance protects networks with more than 15 PCs. You will get from us the hardware with everything preinstalled so that the only thing you need to do is to connect the appliance into your network, give it an IP and then deploy the clients. A choice of different models is available for the needs of your organization’s side.
After you’ll receive the Hardware Appliance from us, it will be very easy to install it in your network.
For this you will have to take only 3 fast steps:
Endpoint Protector is composed of 3 main security features that can be licensed separately. The features are:
|Feature||License Type||Updates & Support|
|Device Control||Perpetual License||1st year included, 2nd& 3rd year available|
|Content Aware Protection (also requires Device Control)||Perpetual License||1st year included, 2nd& 3rd year available|
|Mobile Device Management (MDM) For iOS & Android||Perpetual License||1st year included, 2nd& 3rd year available|
When you choose your Endpoint Protector License you can choose what you want to license.
Simple example, you want to use Content Aware Protection on 50 PCs and manage 10 iOS devices. For that you will license Content Aware Protection for 50 PCs which includes already Device Control and MDM for 10 mobile devices.
Now you only need to choose if you want this as a hardware or virtual appliance and you are all set.