Software

ENDPOINT PROTECTOR

Out-of-the-Box Solution to secure sensitive data from threats posed by portable storage device, cloud services and mobile devices

In a world where portable, lifestyle devices, and the cloud are transforming the way we work and live, Endpoint Protector is designed to protect confidential data against insider threats, while maintaining productivity and making work more convenient, secure and enjoyable.

The blacklist and whitelist-based approach grants flexibility in policy building. Organizations have the option to prohibit the use of specific removable devices and data transfers to file cloud sharing applications and other online services, to scan for certain PIIs, but to allow transfers to specific URLs and domain names for certain computers/users/groups, avoiding task interruption.

With Endpoint Protector being offered as hardware or virtual appliance, it can be setup in minutes. Moreover, the responsive management interface allows managing policies and checking reports from any device, from desktop to tablet.

 

Content Aware Protection for Windows, macOS and Linux

Email Clients: Outlook / Thunderbird / Lotus Notes • Web Browsers: Internet Explorer / Firefox / Chrome / Safari • Instant Messaging: Skype / Microsoft Communicator / Yahoo Messenger • Cloud Services & File Sharing: Dropbox / iCloud / SkyDrive / BitTorrent / Kazaa • Other Applications: iTunes / Samsung Kies / Windows DVD Maker / Total Commander / Team Viewer • OTHERS

eDiscovery

File type: Graphic Files / Office Files / Archive Files / Programming Files / Media Files, etc. • Predefined content: Credit Cards / Personally Identifiable Information / Address / SSN / ID / Passport / Phone Number / Tax ID / Health Insurance Number / etc. • Custom Content / File Name / Regular Expression / HIPAA.

Custom Content Blacklist Create a blacklist based on custom content such as keywords and expressions. Various Blacklist Dictionaries can be created through Copy/Paste, Type or Import.

Device Control for Windows, macOS and Linux

USB Drives / Printers / Bluetooth Devices / MP3 Players / External HDDs / Teensy Board / Digital Cameras / Webcams / Thunderbolt / PDAs / Network Share / FireWire / iPhones / iPads / iPods ZIP Drives / Serial Port / PCMCIA Storage Devices / Biometric Devices / OTHERS

Enforced Encryption for Windows, macOS and Linux

Strong Security Mechanisms, Government approved 256bit AES encryption, password protection and anti-tampering techniques to ensure application integrity.

100% Deployment Flexibility

Suitable for any type of network, our products can be used by enterprise customers, small and medium business and even home users. With a client-server architecture, they are easy to deploy and centrally manage from the web-based interface. Besides the Hardware and Virtual Appliance, Amazon Web Services Instance and Cloud version, a Stand-alone version is also available for those looking for basic features.

ENTERPRISE MOBILITY MANAGEMENT

Taking Mobilityto Endless Possibilities

Mobility is changing the world, enabling immediate access to everything. Give your workers the tools they need to do anything, anywhere and anytime - and then watch your company succeed beyond your wildest expectations. Application manages your whole mobile enterprise - devices, apps, content and security. We take care of mobility, so you can take your business to endless possibilities.

Extend Mobility Across your Entire Business

More mobile workers, new types, makes and models of devices, more capable devices, and lots of mobile applications and content drove the evolution of mobility management. The Internet of Things will further increase the management challenge as experts predict as many as 25 billion 'things’ will be in use by 2020.

From yesterday’s Mobile Device Management (MDM) through today’s Enterprise Mobility Management (EMM) to tomorrow’s Unified Endpoint Management (UEM), makes it easy to manage endpoints, 'things’ and devices, and their applications, content and security.

Mobility across your Entire Business

Every business is different and each business should have its own business mobility strategy that is updated regularly. It doesn’t matter who is using what type, make or model of device, how it is being used and what applications and content are allowed or required. It delivers a flexible and scalable mobility management solution that can accommodate all of your business mobility needs today, and into the future.

Advanced Mobility Management

Express Enrollment

Automatically deliver over-the-air device settings for email, WiFi, VPN, content and enterprise applications based on user, role, location, device properties and custom attributes/data.

Remote Control

Provides live, real-time remote support with the fastest, most reliable remote view, remote control and file explorer for Android and Windows devices. Remote view and advanced device management is available for iOS devices.

Rapid Staging and Provisioning

Rapid provisioning gets mobile devices into the hands of your employees sooner, with less IT time and effort.

Management of Smart Peripherals and IoT Endpoints

offers the industry's tightest integration with connected printers and other IoT endpoints, minimizing downtime with the ability to provision, manage and support new devices remotely.

Mobile Content Management

provides two options to deliver secure content anywhere and anytime;  App-based and Agent-based options include simplified configuration, flexible policy management and robust security.

Advanced Security Management

Configurable lockdown policies with Kiosk Mode allow administrators to block use of the operating system by replacing the device home screen with a customizable screen that limits users to select applications only. And if a device is lost or stolen, IT Admins, or even the user can locate, lock, or wipe the device.

Makes it Easy

We manage mobile devices and their applications, content and security. It doesn’t matter what make, model or operating system, Application takes the complexity out of mobility management.

 

Data Leakage Prevention

(DLP Solution for Windows, Mac and Linux)

In a world where portable, lifestyle devices, and the cloud are transforming the way we work and live, Endpoint Protector is designed to protect confidential data against insider threats, while maintaining productivity and making work more convenient, secure and enjoyable.
Out-of-the-Box Solution to secure sensitive data from threats posed by portable storage device, cloud services and mobile devices

The blacklist and whitelist-based approach grants flexibility in policy building. Organizations have the option to prohibit the use of specific removable devices and data transfers to file cloud sharing applications and other online services, to scan for certain PIIs, but to allow transfers to specific URLs and domain names for certain computers/users/groups, avoiding task interruption.

With Endpoint Protector being offered as hardware or virtual appliance, it can be setup in minutes. Moreover, the responsive management interface allows managing policies and checking reports from any device, from desktop to tablet.

Content Aware Protection   Monitor and Control data in motion, deciding what confidential files can or cannot leave thecompany via various exit points. Filters can be set per Filefor Windows,macOS and Linux   Type, Application, Predefined andCustom Content, Regex and more.

 

eDiscovery

for Windows, macOS and Linux

Scan data at rest on network’s endpoints and apply remediation actions such as encrypt or delete in case confidential data is identified on unauthorized computers.

Device Control

for Windows, macOS and Linux

Monitor and Control USB and peripheral ports. Set Rights per Device, User, Computer, Group or Globally.

Mobile Device Management

for Android, iOS and macOS

Manage, Control and Adjust the security level on smartphones and tablets. Push security settings, network settings, applications, etc.

Enforced Encryption

for Windows and macOS

Automatically secure data copied on USB storage devices with an AES 256bit encryption. Cross-platform, password-based, easy to use and very efficient.