Endpoint Protector
Device Control+
Trusted by
Extend the capabilities of Endpoint Protector’s award-winning Device Control solution
Offering granular control of USB and peripheral ports across Windows, macOS, and Linux endpoints, Device Control+ is the first layer of defense for organizations looking to protect sensitive data from being lost through USB storage devices, Bluetooth connections, printers, and other removable media. Extending the capabilities of Endpoint Protector’s award-winning Device Control solution, Device Control+ includes the option of enforcing the use of 256bit AES encryption when the use of USB storage devices is approved for data sharing and portability.
*encryption capabilities not available on Linux
+40 Different Device Classes
Control over 40 different device classes from a single administrative interface; including USB storage devices, external HDDs, card readers, printers, Bluetooth devices, webcams, smartphones, and more.
Granular Controls
Apply granular controls to different device types, and set policies across different user groups or device classes.
Multi-OS 256bit AES Encryption
Replaces the need for expensive hardware-based solutions and works across both Windows and macOS, improving employee productivity and overcoming the limitations of OS-specific encryption solutions.
The most advanced Device Control solution for Windows, macOS, and Linux
Data Compliance
Ensure compliance with regulatory frameworks, including PCI DSS, HIPAA, NIST, ISO 9001, and GDPR.
Grows with you
Easily expandable to include complete data loss prevention capabilities at the endpoint with Active Data Defense.
Reliability & Privacy
Resistant to connectivity drops and geographical restrictions, to give you the highest level of performance and privacy possible.
Remote Wipe in the Event of Loss or Theft
Remotely reset the device, effectively deleting the client and all the files that were encrypted with it.
Protect company IP, PII, financial data, or other regulated data types without compromising productivity
Intellectual Property (IP) Protection
Endpoint Protector uses advanced technologies such as N-gram-based text categorization to accurately discover IP, including source code, within hundreds of file formats, and then monitor and control any transfers to prevent data theft.
Personally Identifiable Information (PII) Protection
Discover and protect Personally Identifiable Information (PII) and sensitive information stored on employee endpoints with our data discovery module. Monitor data and prevent data exfiltration and data leaks with an all-in-one Data Loss Prevention tool.
Insider Threat Protection
Stop data leakage and data theft and by applying appropriate cybersecurity controls at the endpoint - from logging potential insider threats, to real-time blocking. Discover end-users that fail to follow data security policies and situations that can lead to a policy violation or data leakage.
Compliance and Regulations
Endpoint Protector’s DLP software can help organizations ensure data privacy and achieve regulatory compliance with HIPAA, PCI-DSS, NIST, GDPR, SOX, and others, avoiding fines and other damages imposed by regulatory entities.
Endpoint Protector Solutions
Device Control
For organizations that need to control devices connected through USB, peripheral, and Bluetooth connections.
Device Control+
All features of Device Control included, plus Enforced Encryption to encrypt data that needs to be moved onto USB storage devices.
Active Data Defense
Contextual scanning of data for organizations that need to prevent data loss through removable devices, applications and cloud/network shares.
Active Data Defense+
All features of Active Data Defense included, plus Enforced Encryption to encrypt data that needs to be moved onto USB storage devices.
What our customers have to say about Endpoint Protector
See all awards & certifications