Portable devices such as USB flash drives and smartphones may cause severe issues when it comes to controlling data use within and outside the company.
As a full DLP product, Endpoint Protector from CoSoSys prevents users from using unapproved devices in any of your PC's, Mac's or Linux computers, and also prevents them from taking unauthorised data outside the company.
Additionally, Endpoint Protector blocks potential harmful files on removable devices coming IN to the network - files which can have a significant impact on your network’s health - for example viruses, malware, pornographic images, games etc.
Also controls iOS and Android devices, PLUS get a FREE licence for 5 PC's.
Easy, Centralised Device Control
The user friendly Endpoint Protector Web administration, reporting & auditing console offers a complete overview of all device activity - on all your Windows, Mac AND Linux computers in one solution.
You can define access and use policies per user/computer/device and authorise certain devices for certain users or user groups. Thus, your company will stay productive while maintaining control over the device fleet use.
.Controlled Device Types
- USB Flash Drives (Normal USB Drives, U3, SafeXs, SafeStick, Ironkey etc.)
- iPhones / iPad's / iPod's
- Android & Windows tablets
- All Smartphones / Blackberry / PDA's
- Digital Cameras
- MP3 Player / Media Player Devices
- CD/DVD-Player/Burner (internal and external)
- Memory Cards (SD, MMC, CF, Smartcard, etc.)
- external HDD's (incl. SATA HDD's)
- Floppy Drives
- Card Readers (internal and external)
- WiFi Network Cards
- FireWire Devices
- Biometric Devices
- Bluetooth Devices
- ZIP Drives
- ExpressCard SSD
- Wireless USB
- Serial Port
- Teensy Board
- PCMCIA Storage Devices
You can allow or block access on computers for any device based just on its serial number.
The device Whitelisting feature enables you to assign permissions for devices to users or user groups and workstations. By default, the not allowed devices are automatically blocked by the Endpoint Protector Security Agent.
This feature eliminates unknown or unwanted devices in your network, reducing the risk for data leakage and data theft as well as the risk for infecting with unwanted malware.
Device Type-Based Policies
The device type based policies reflect Endpoint Protector’s ability to apply different security policies based on the type of device being used.
Whenever the user connects a device, Endpoint Protector knows automatically if it’s a USB device, iPhone, iPad or other type of device. This will allow you to apply more or less rigorous policies on PCs, users or groups depending on what devices are allowed to connect to the protected PC.
Certain user groups like a specific company department can use, for example, USB devices that are required for everyday work, while other user groups are not able to connect them to their protected work computers.
Protection Against U3 and Other Autorun Devices
Endpoint Protector is able to protect against and block U3 and other autorun devices that could potentially host malware and other malicious self-executing code.
This is an important feature because it can prevent automatic system infections through malware or Trojans.