Endpoint Protector

SKU: COSOSYSEP Categories: , Brand:

Description

Protects PCs from threats posed by removable portable storage and endpoint devices such as USB Flash Drives, MP3 Players, iPods and digital cameras that can be used to leak, steal, damage or lose data.

Protect your network and sensitive data from threats posed by portable storage devices, cloud services and mobile devices. Portable storage devices such as USB flash drives, smartphones, tablets and cloud services like Dropbox, Google Drive may cause severe issues when it comes to controlling data use within and outside the company. As a full Data Loss Prevention (DLP) and Mobile Device Management (MDM) product available for Windows, Mac OS X and iOS, Android mobile devices, Endpoint Protector 4 prevents users from taking unauthorised data outside the company or bringing potential harmful files on storage devices.

Editions:

  • Endpoint Protector 4 Virtual Appliance: can be used by all business sizes. The Virtual Appliance is available both in VMX and OVF formats to be compatible with the most popular virtualisation platforms. Our appliances will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices.
  • Endpoint Protector 4: Defense against unauthorised portable device use. Exercising control, manage device permissions, etc all through an intuitive web-based interface. File tracing, file shadowing, file whitelisting and enforced encryption are just some of the features you will use to protect your data.
  • Endpoint Protector Basic: is the best companion for your application firewall, designed to protect your computer’s endpoints by acting as a firewall for your USB and other ports.

Key Features:

  • Centralised Device Control: The Endpoint Protector 4 Web administration and reporting console offers you a complete overview of the device activity on your computers, whether you work with Windows, Mac or Linux platforms.
  • Content Aware Protection: Content-Aware Data Loss Prevention (DLP) for Windows and Mac OS X offers detailed control over sensitive data leaving the company’s network. Through efficient content inspection, transfers of important company documents will be logged, reported and blocked.
  • Mobile Device Management: Offers better control over the use of Android and iOS devices by companies employees. Mobile Device Management by Endpoint Protector is the perfect solution for companies using their own mobile devices or adopting the BYOD (Bring-Your-Own-Device) model to protect sensitive company data.
  • File Tracing/ File Shadowing: Track all data that was copied to and from USB flash drives or other portable storage devices directly from the Web management interface. With File Shadowing activated, you can even have access to hidden copies of all transferred files.
  • Defining Rights: Simple device management policies will help you define User group permissions, allowing an efficient enforcement and maintenance of the predefined security policies across the network.
  • Device-based Policies: This feature enables you to allow or block USB flash drives or other devices based on their unique characteristics(Ids). For instance you can create a rule where you can allow a USB stick from a certain manufacturer to connect on certain computers and block it for all the others.

Endpoint Protector – Features

Endpoint Protector provides a policy based approach to enforce the portable device usage rules on endpoints. In a world where portable and lifestyle devices are transforming the way we work and live, Endpoint Protector is designed to maintain productivity and make work more convenient, secure and enjoyable. The whitelist based approach allows the use of specific devices for certain users/groups so that they stay productive while maintaining control of what devices are used and what data users are allowed to transfer. Endpoint Protector dramatically reduces the risk posed by internal threats that could lead to data being leaked, stolen, damaged or otherwise compromised.

  • Endpoint Security for Workstations, Notebooks and Netbooks
    Protection against threats posed by removable portable devices. Stops intentional or accidental leakage, theft, loss, or malware infection of data.
  • Device Management / Device Control
    Defines the rights for devices / users or computers in your network.
  • Centralized web based Management / Dashboard
    Centrally manages the use of removable portable devices. The web based Administrative & Reporting interface meets the needs of management and IT security staff and offers real-time information about organization wide controlled devices and data transfer activity.
  • File Tracing / File Shadowing
    File Tracing records all data that was copied to and from previously authorized devices. File Shadowing saves a copy of all files, even of deleted ones, that where used in connection with controlled devices.
  • File Whitelisting
    Only authorized files can be transferred to authorized devices. All other files are blocked and attempted transfers are reported.
  • Device Activity Logging Audit Trail
    Device activity logs are savedfor all clients and devices connected giving a history of devices, PCs and users for audits and detailed analysis.
  • Reporting and Analysis
    Powerful reports, graphics and analysis tool to easily review activity.
  • Easy Enforcement of Your Security Policies (Active Directory)
    Simplified device management policies with customizable templates for defined User Groups (Active Directory GPOs) allow easy enforcement and maintenance of security policies across your network.
  • Network “Offline” Mode to Support Your Field Employees
    Secured PCs that are disconnected from the network stay protected based on the last locally saved policy.
  • Endpoint Protector Client Self Defense
    Provides protection even on PCs where users have Administrative rights.
  • TrustedDevice / Enforced Encryption – protecting sensitive data in transit
    The technology behind TrustedDevices is designed to certify that in your private or small office computing environment all the endpoint devices are not only authorized and controlled via Endpoint Protector but also certified and trusted for protecting sensitive and confidential data in transit. This will assure that in the event a device is stolen or lost all the data stored on it is encrypted and therefore not accessible for other parties.

Controlled Device Types

  • USB Flash Drives (Normal USB Drives, U3, etc.)
  • Wireless USB
  • Memory Cards (SD, MMC, CF, etc.)
  • Card Readers (internal and external)
  • ZIP Drives
  • Floppy Drives
  • CD/DVD-Player/Burner (internal and external)
  • Digital Cameras
  • Smartphones / Handhelds / PDAs
  • iPods
  • external HDDs
  • FireWire Devices
  • MP3 Player / Media Player Devices
  • Biometric Drives
  • Bluetooth
  • ExpressCard SSD
  • Printers

Back to top

Endpoint Protector – System Requirements

Client(s)

  • Windows Vista (32/64bit)
  • Windows XP (SP2) (32/64bit)
  • Windows 2003 (32/64bit)
  • .Net 2.0 Framework
  • min. 32 MB of HDD Space

Server
Supported Operating Systems:

  • Windows 2003 Server or
  • Debian, Red Hat (and other Linux Distributions)

Supported Web servers:

  • IIS 6.0 or
  • Apache (Version 5 or newer)

Supported Databases:

  • Microsoft SQL 2005 (Express) or
  • MySQL (Version 5 or newer)

Additional Server Requirements:

  • PHP (Version 5) with SOAP support
  • OpenSSL Version 0.9.8

Directory Service

  • Active Directory

Reviews

There are no reviews yet.

Be the first to review “Endpoint Protector”

Your email address will not be published. Required fields are marked *

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.