Removable devices such as USB memory flash drives, cameras, phones pose a security threat when it comes to controlling confidential data access.
As a full DLP product, Cososys Endpoint Protector actively prevents users from using unapproved devices in any of your PC's, Mac's or Linux computers AND also prevents them from taking unauthorised data outside the company network.
Additionally, Endpoint Protector blocks potential harmful files on removable devices coming IN to the network - files which can have a significant impact on your network’s health - for example viruses, malware, pornographic images, games etc.
Cososys controls iOS and Android devices, PLUS get a FREE licence for 5 PC's.
Easy, Centralised Device Control
The user friendly management console offers a complete overview of all device activity - on all your Windows, Mac AND Linux computers in one solution.
You can define access and use policies per user/computer/device and authorise certain devices for certain users or user groups, or even make devices read only. Thus, your company stays productive while maintaining control over device use.
.Controlled Device Types
- USB Flash Drives (Encrypted, Unencrypted, U3, USB 3 etc)
- iPhones / iPad's / iPod's
- Android & Windows phones and tablets
- All Smartphones / Blackberry / PDA's
- Digital Cameras
- MP3 Player / Media Player Devices
- CD/DVD-Player/Burner (internal and external)
- Memory Cards (SD, MMC, CF, Smartcard, etc.)
- external HDD's (incl. SATA HDD's)
- Floppy Drives
- Card Readers (internal and external)
- WiFi Network Cards
- FireWire Devices
- Biometric Devices
- Bluetooth Devices
- ZIP Drives
- ExpressCard SSD
- Wireless USB
- Serial Port
- Teensy Board
- PCMCIA Storage Devices
You can allow or block access on computers for any device based just on its unique serial number.
The device Whitelisting feature enables you to assign permissions for devices to users or user groups and workstations. By default, the not allowed devices are automatically blocked.
This feature eliminates unknown or unwanted devices in your network, reducing the risk for data leakage and data theft as well as the risk for infecting with unwanted malware.
Device Type-Based Policies
The device type based policies reflect Endpoint Protector’s ability to apply different security policies based on the type of device being used.
Whenever the user connects a device, Endpoint Protector knows automatically if it’s a USB device, iPhone, iPad or other type of device. This will allow you to apply more or less rigorous policies on PCs, users or groups depending on what devices are allowed to connect to the protected PC.
Certain user groups like a specific company department can use, for example, USB devices that are required for everyday work, while other user groups are not able to connect them to their protected work computers.
Protection Against U3 and Other Autorun Devices
Endpoint Protector is able to protect against and block U3 and other autorun devices that could potentially host malware and other malicious self-executing code.
This is an important feature because it can prevent automatic system infections through malware or Trojans.