Endpoint Protector Basic is designed to protect your standalone computer from data theft. If you leave your PC/Mac unlocked, someone else might access it and take away important data on their USB flash drives or other portable storage devices. With its ability to uniquely identify devices, you can be sure that you are in control and no 3rd party can use your USB ports to copy data from your computer or to place potential malicious files on it.
With the administrative console, you will have a complete overview of all device activity, allowing for a close monitoring and control of USB flash drives and other portable storage devices.
Allows you to record what files are written or read from portable storage devices for later analysis.
CDs & DVDs Encryption
Device Logging All devices that are connected even if they are authorized or not are recorded in a log file for later reference.
Support for Mac OS X
With Endpoint Protector Basic you can protect your computer whether it’s MAC or PC.
The administrative console of Endpoint Protector Basic will give you an overview of all device fleet activity and will help you block anyone from connecting USB devices or other portable storage media to your protected computer.
Allows the administrator to record the file properties of the files that are written or read from the portable storage devices for later analysis.
Support for Mac OS X and Windows (XP, Vista, 7, 8)
With our solutions you can make portable device use secure in networks where Macs and PCs are used. This widens your security and offers an even more secure working environment.
All devices that are connected even if they are authorized or not are recorded in a log file for later reference.
If somebody tries to connect a USB flash drive or other portable storage device on your computer without your permission, the device will be blocked and you will be instantly notified by e-mail.
Network "Offline" Capability
When a Notebook is disconnected from the local area network, the USB endpoint protection will remain, working as configured.
Only the PC’s administrator is allowed to authorize devices or to configure Endpoint Protector Basic.
Only the PC’s administrator is allowed to authorize USB flash drives or other devices for use. An optional password gives additional protection in an environment where many users have administrative rights.
Endpoint Protector Basic is simple and easy to use, being available in a wide set of languages.
No internet or network connection required.
A simple installer makes Endpoint Protector Basic a great choice for Home Users, Small Offices or Remote Facilities.