www.cbi.ie

Endpoint Protector 4

Endpoint Protector is a Device Control / DLP solution for Windows and Mac OS X, focused on proactively protecting company networks of all sizes from data loss, leakage and theft by blocking, controlling and monitoring all ports, offering a complete detailed reporting on the information transferred in and out of the network and enforcing encryption of data copied on portable devices. Available as both Hardware and Virtual Appliance, it can be integrated within just a few minutes in a company network, ensuring enhanced security while maintaining productivity. Endpoint Protector makes work more convenient, secure and enjoyable, offering an excellent ROI.

Content Aware Protection

Offers detailed control over sensitive data leaving the company’s network. Through efficient content inspection, transfers of important company documents will be logged, reported and blocked. Content Aware Protection by Endpoint Protector will prevent data leakage through all possible exit points, from USB devices to applications including Microsoft Outlook, Skype, Yahoo Messenger or Dropbox.

Device Control

The Endpoint Protector 4 Web administration and reporting console offers you a complete overview of the device activity at your computers. You will be able to define access policies per user/computer/device and authorize devices for certain user or user groups. Thus, your company will stay productive while maintaining control over the device fleet use.

File Tracing/Shadowing

Track all data that was copied to and from USB flash drives or other portable storage devices directly from the Web management interface. With File Shadowing activated, you can even have access to hidden copies of all transferred files. A thorough record of all the flow of information in the network is essential to support audits and controlling data leakage.

Defining Rights

Simple device management policies will help you define User group permissions, allowing an efficient enforcement and maintenance of the predefined security policies across the network. Being able to block USB flash drives or other portable devices and track data going on them will help you comply with government regulations, industry standards and IT governance in regard to data leakage prevention.

Virtual/Hardware Appliance

Endpoint Protector 4 as Hardware and Virtual Appliance is the right solution so that you will not need to spend hours just reading the installation guide. You’ve got it all already installed.

Have questions about Endpoint Protector 4?
Call us directly: 0404 48127

Contact Us
 
You are here: Home Endpoint Protector 4