
Endpoint Protector
Cross-Platform
Data Loss Prevention
Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices.
Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, HIPAA etc.
Our DLP solution is available as hardware and virtual appliance, and as cloud infrastructure (Amazon Web Services, Microsoft Azure and Google Could).
Partners & Offices

Awards

Analyst Reports

Concerns we address

We are committed to helping our customers’ concerns, such as:
-
Data loss / Data leakage / Data theft
-
Uncontrolled use of devices in the workplace
-
Regulatory compliance
-
Protection of intellectual property
Key strengths

-
Easy and fast deployment
-
True cross-platform DLP solution
-
Lightweight agent
-
Granular policies and settings
-
A modular approach to DLP
-
An intuitive, user-friendly interface
Multiple deployment options

-
Formats: .ovf, .ova, .vmx, .vhd, .pvm, .xva
-
Up & running in less than 30 minutes
-
Compatible with VMware, VirtualBox, Parallels Desktop for Mac, Microsoft Hyper-V and Citrix XenServer
-
Eco-friendly – use the hardware you already have

Available for deployment in th following cloud services:
-
Amazon Web Services (AWS)
-
Microsoft Azure
-
Google Cloud Platform (GCP)

-
Available as a SaaS flavor, hosted in a cloud service
-
Deployment region and various other security configuration options available
Main Modules

How it works

Content
Aware
Protection
Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.


Device
Control
USB & peripheral port control
Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.


Enforced
Encryption
Automatic USB encryption
Encrypt, manage and secure USB storage devices by using 256-bit AES encryption. Password-based, easy to use and very efficient.


eDiscovery
Scanning data at rest
Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans.

