Cookie Policy
We use cookies to improve your experience on our website. If you continue without changing your cookie settings on your browser, we'll assume that you are happy to receive all cookies on the Zycko website. To learn more about how we use cookies, please see our cookie policy.
 
 
  • Overview
  • Features
  • Video
  • Appliance
  • Licensing

Endpoint Protector 4

Protect your network and sensitive data from threats posed by portable storage devices,
cloud services and mobile devices
Portable storage devices such as USB flash drives, smartphones, tablets and cloud services like Dropbox, Google Drive may cause severe issues when it comes to controlling data use within and outside the company. As a full Data Loss Prevention (DLP) and Mobile Device Management (MDM) product available for Windows, Mac OS X and iOS, Android mobile devices, Endpoint Protector 4 prevents users from taking unauthorized data outside the company or bringing potential harmful files on storage devices.
     
Device Control
For Windows, Mac, Linux
Content Aware Protection
For Windows, Mac
Mobile Device Management
For iOS, Android
Having the possibility to control device activity inside a network from a simple Web interface will make things easier for you. Strong device use policies will ensure proactive protection for a safer working environment. Offers detailed control over sensitive data leaving the company’s network. Through efficient content inspection, transfers of important company documents will be logged, reported and blocked Offers enhanced control over the use of Android and iOS smartphones and tablets by companies’ employees, enforcing strong security policies and detailed tracking of all mobile devices.
Read more   Read more   Read more
 

Highlights - Content Aware Protection

Simple Content Aware Policy Creation
Define Policies for Windows or Mac OS X with just a few clicks to protect the most common data from being leaked.
  Monitor Application use of data
Stop data leakage though the most common applications, cloud and web applications such as Dropbox, Web-browser, Webmail and E-Mail Clients.
Protect Predefined Content e.g. Credit Cards
Restrict the possibility to copy Credit Card Numbers (CCN), Social Security Numbers (SSN), and other Personal Identifiable Information (PII).
  File Types / Custom Dictionaries
Prevent data transfers of specific file types or data that contains certain keywords set with your own custom dictionaries
     
 

Highlights - Device Control

Device Control for Windows, Mac OS X and Linux
Protect your endpoints by proactively settings policies and record and log all file transfers (File Tracing / File Shadowing).
  Stop Data Loss / Theft through portable devices
Lockdown / control or monitor all data transfers through USB and other ports to portable devices.
Device Specific Rights
Set rights for specific devices that have previously been connected to a PC or Mac.
  Granular Rights for Device Classes
Set different rights for Device Classes, Computers, Users, etc.
     
 

Centralized Device Control

The Endpoint Protector 4 Web administration and reporting console offers you a complete overview of the device activity on your computers, whether you work with Windows, Mac or Linux platforms. You will be able to define access policies per user/computer/device and authorize devices for certain user or user groups. Thus, your company will stay productive while maintaining control over the device fleet use.

 

Content Aware Protection

Content-Aware Data Loss Prevention (DLP) for Windows and Mac OS X offers detailed control over sensitive data leaving the company's network. Through efficient content inspection, transfers of important company documents will be logged, reported and blocked. Content Aware Protection by Endpoint Protector prevents data leakage through all possible exit points, from clipboard, screen captures, USB devices to applications including Microsoft Outlook, Skype, Yahoo Messenger or Dropbox.


 

Mobile Device Management

Offers better control over the use of Android and iOS devices by companies’ employees. Mobile Device Management by Endpoint Protector is the perfect solution for companies using their own mobile devices or adopting the BYOD (Bring-Your-Own-Device) model to protect sensitive company data. Through detailed monitoring, logging and reporting of all mobile device activity and remote enforcement of strong security policies, companies will gain enhanced protection against both inside and outside threats.

 

File Tracing /
File Shadowing

Track all data that was copied to and from USB flash drives or other portable storage devices directly from the Web management interface. With File Shadowing activated, you can even have access to hidden copies of all transferred files. A thorough record of all the flow of information in the network is essential to support audits and controlling data leakage.

 

Defining Rights

Simple device management policies will help you define User group permissions, allowing an efficient enforcement and maintenance of the predefined security policies across the network.
Being able to block USB flash drives or other portable devices and track data going on them will help you comply with government regulations, industry standards and IT governance in regard to data leakage prevention.

 

Device-based Policies

This feature enables you to allow or block USB flash drives or other devices based on their unique characteristics(Ids). For instance you can create a rule where you can allow a USB stick from a certain manufacturer to connect on certain computers and block it for all the others. This feature gives you significant control over what devices are used on protected clients.

 
Other Features
Support for Mac OS X, Windows (XP, Vista, 7, 8) and Linux   Mobile Application Management (MAM) for iOS and Android
Endpoint Protector will protect your networks whether they are MAC, Windows or Linux based. This will offer you an even more secure working environment. Discover what applications people use on smartphones and tablets, bringing them into the company network, and manage accordingly to the organization’s security policies. Instantly push free and paid apps to enrolled mobile devices from your own Apps Catalog.
         
Working with Active Directory   Reporting and Analysis Tools

If you already have Active Directory, then you can easily use it to deploy Endpoint Protector, making your life a lot easier.

Also you will have simplified device management policies with customizable templates for defined USR Groups (Active Directory GPOs).

Endpoint Protector offers a powerful reporting and analysis tool which will come in handy as you will be able to monitor all users activity: who is trying to connect USB devices, what kind of data are they copying on them, how are the users using devices. You will have the ability to drill down from high level to more detailed reports and analyses, making this way data audit processes easy and straightforward.
         
Endpoint Security for Workstations, Laptops and Servers   Enforced Encryption with EasyLock
Endpoint Protector is designed to protect PCs from threats posed by removable portable storage and endpoint devices such as USB Flash Drives, MP3 Players, iPods and digital cameras. These and other devices could be accidentally or intentionally used to leak, steal, or lose data.   If a USB stick full with company information gets accidentally lost or stolen, this might have severe consequences, especially when reaching into the wrong hands. We thought of that and this is why we give you the possibility to automatically encrypt data copied on USB devices so that no unauthorized person can access and use the stored information.
         
File Whitelisting   Offline Temporary Password for Computers
Only authorized files (e.g. product brochures PDFs) can be transferred to authorized devices. All other files are blocked and attempted file transfers are recorded and reported.   Further extending the flexibility needed for computers on the road and without a connection to the office network, the Administrator can specify the period when USB devices as well as any file transfers can be performed. This can also be anywhere from 30 minutes up to 30 days.

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Setup a Content Aware Protection (CAP) Policy in Endpoint Protector

Learn how to setup a Content Aware Protection Policy in Endpoint Protector 4. Prevent confidential information from leaving the endpoint through USB and peripheral ports, printers, e-mails, instant messengers, cloud storage and other online applications. Through the Content Aware Protection module in Endpoint Protector 4, file transfer policies can be setup for Windows and Mac OS X computers. Filters can be created based on file extensions, predefined content (Social Security Numbers, Credit Card Numbers, etc.), custom content (create dictionaries based on keywords) or regular expressions.

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Content Aware Data Loss Prevention (DLP) for Mac OS X

Make sure your sensitive data doesn’t leave Macs through Outlook, Skype, Dropbox, USB devices, by Copy & Paste, Screen Captures, etc. Discover Content Aware Protection for Mac OS X and your company data such as Credit Card Numbers (CCNs) and Social Security Numbers (SSNs) will remain within the company network! 

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Mobile Device Management (MDM) for iOS and Android with Endpoint Protector

Secure your mobile iOS and Android devices with Endpoint Protector Mobile Device Management (MDM) and keep a close eye on where devices are going with your sensitive enterprise data.

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Endpoint Protector for Device Control explained in plain English

With Endpoint Protector you have full control, manageability and transparency of what is happening at your PCs and Macs ports

Endpoint Protector as Virtual Appliance

Endpoint Protector as Hardware Appliance

You can use the Virtual Appliance of Endpoint Protector for all business sizes. It is available in VMX, PVA, OVF, OVA, XVA and VHD formats to be compatible with the most popular virtualization tools.

All you need to do is to install the appliance in a Virtual Environment and deploy the Endpoint Protector clients to your machines and device use is instantly controlled.

Key Benefits

  • VMware ready
  • Almost like Plug and Play
  • Network security within 30 minutes
  • Eco friendly - use the hardware you already have
  • License for exactly the number of PCs you have to protect
  • Includes all features of Endpoint Protector (Device Control, Content Aware Protection, Mobile Device Management, File Tracing, File Shadowing, Enforced Encryption)

The Endpoint Protector Hardware Appliance protects networks with more than 15 PCs. You will get from us the hardware with everything preinstalled so that the only thing you need to do is to connect the appliance into your network, give it an IP and then deploy the clients. A choice of different models is available for the needs of your organization’s side.

After you’ll receive the Hardware Appliance from us, it will be very easy to install it in your network.

For this you will have to take only 3 fast steps:
1. Push the power button
2. Give it an IP in your local network
3. Deploy Endpoint Protector on the endpoints (laptops, desktops, servers) you want to protect

Key Benefits

A. Time saving due to

  • Dedicated hardware appliance with Endpoint Protector already installed, which will give you a very fast implementation time
  • Minimal workload to deploy and manage it
  • Easy learning curve because of the friendly web management interface

B. Security at your network endpoints: the Endpoint Protector Hardware Appliance controls all devices fleet connected to your network and will help you minimize the risks of data theft, data leakage or data loss.


C. Low cost: it has the highest Return on Investment and Lowest Total Cost of Ownership of any data loss prevention product.

Virtual Appliance Formats Available

Supported Virtual Environments Version OVF .VMX .VHD .XVA .PVM
VMware Workstation 7.1.4        
VMware Workstation* 9.0.2      
VMware Player* 6.0.0      
VMware Fusion* 5.0        
VMware vSphere (ESXi) 5.1        
Oracle VirtualBox 4.2.18        
Parallels Desktop for Mac 9.0.2        
Microsoft Hyper-V Server 2008/2012        
Citrix XenServer 64bit 6.2        

Endpoint Protector Licensing

ndpoint Protector is composed of 3 main security features that can be licensed separately.
The features are:

Feature License Type Updates and Support
Device Control Perpetual License 1st year included,
2nd and 3rd year available
Content Aware Protection
(requires also Device Control)
Perpetual License 1st year included,
2nd and 3rd year available
Mobile Device Management (MDM) 
for iOS and Android
Perpetual License 1st year included,
2nd and 3rd year available

When you choose your Endpoint Protector License you can choose what you want to license.

Simple example, you want to use Content Aware Protection on 50 PCs and manage 10 iOS devices.
For that you will license Content Aware Protection for 50 PCs which includes already Device Control and MDM for 10 mobile devices.
Now you only need to choose if you want this as a hardware or virtual appliance and you are all set.

 

.
Back to Top
For more information:
Contact our specialist teams
 
 
For a database of user manual, datasheet, or software update, please access the Resource Centre