top of page
technology-network-background.jpg

Endpoint Protector

Cross-Platform
Data Loss Prevention

Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices.

 

Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, HIPAA etc.

 

Our DLP solution is available as hardware and virtual appliance, and as cloud infrastructure (Amazon Web Services, Microsoft Azure and Google Could).

Partners & Offices

Awards

Analyst Reports

Concerns we address

We are committed to helping our customers’ concerns, such as:

  • Data loss / Data leakage / Data theft

  • Uncontrolled use of devices in the workplace

  • Regulatory compliance

  • Protection of intellectual property

Key strengths

  • Easy and fast deployment

  • True cross-platform DLP solution

  • Lightweight agent

  • Granular policies and settings

  • A modular approach to DLP

  • An intuitive, user-friendly interface

Multiple deployment options

  • Formats: .ovf, .ova, .vmx, .vhd, .pvm, .xva

  • Up & running in less than 30 minutes

  • Compatible with VMware, VirtualBox, Parallels Desktop for Mac, Microsoft Hyper-V and Citrix XenServer

  • Eco-friendly – use the hardware you already have

Picture2.png

Available for deployment in th following cloud services:

  • Amazon Web Services (AWS)

  • Microsoft Azure

  • Google Cloud Platform (GCP)

Picture3.png
  • Available as a SaaS flavor, hosted in a cloud service

  • Deployment region and various other security configuration options available

Main Modules

How it works

Picture1q.png

Content
Aware
Protection

Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.

Device
Control

USB & peripheral port control
Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.

Screen Shot 2022-01-30 at 3.22.33 PM.png

Enforced
Encryption

Automatic USB encryption
Encrypt, manage and secure USB storage devices by using 256-bit AES encryption. Password-based, easy to use and very efficient.

Screen Shot 2022-01-30 at 3.23.57 PM.png

eDiscovery

Scanning data at rest
Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans.

Screen Shot 2022-01-30 at 3.27.11 PM.png
bottom of page