Endpoint Protector Basic v.1.0.3.2

Advertisement
Advertisement

To protect your PC, we recommend to use Endpoint Protector Basic to monitor and control ports and interfaces such as USB, FireWire, card reader, CD / DVD, etc on your PC. This will protect them against unwanted use of portable storage devices like USB sticks, SD cards or portable hard drives to prevent data theft or data leaks. The best companion for your application firewall, Endpoint Protector Basic is designed to protect your computer's endpoints acting as a USB firewall. Endpoint Protector Basic installs on your PC and helps you manage your USB device fleet and also to control what devices are authorized to connect to your computer. With its ability to uniquely identify devices you can be sure that you are in control, no 3rd party can use your USB ports to copy data from your computer or to place potential malicious files on it. Gain full control over your laptop's endpoint devices, everywhere you are: at the office, on the road or in an airport. All portable storage devices such as USB Flash Drives, iPods, MP3 Players, digital cameras, portable HDDs, mobile phones and other devices pose a threat when connected to your PC because any of them can be used to leak your data in just seconds. Controlled Device Types are: USB Flash Drives (Normal USB Drives, U3, etc.)
Wireless USB, Memory Cards (SD, MMC, CF, etc.), Card Readers (internal and external), ZIP Drives, Floppy Drives, CD/DVD-Player/Burner (internal and external), Digital Cameras, Smartphones / Handhelds / PDAs, Blackberry, iPhones / iPads / iPods, external HDDs, FireWire Devices, MP3 Player / Media Player Devices, Biometric Drives, Bluetooth, ExpressCard SSD, Printers, PCMCIA

To protect your PC, we recommend to use ...

lockdown usb ports, device control, usb control, data loss, data theft, data loss prevention, dlp, extrusion prevention, data protection, port control, firewire port, monitor cd dvd, file tracing

 
  • Endpoint Protector Basic
  • 1.0.3.2
  • 18 Aug 12
  • CoSoSys
  • Win7 x32, Win7 x64, WinVista, WinVista x64, WinXP
  • Shareware
  • 13.26 Mb
  • 403
  • $19.99
 
 

Review Endpoint Protector Basic

  • captcha
 

Other software of CoSoSys
  • Easy SlideShow  v.1.0.4.2Easy SlideShow has an intuitive user interface that enables anyone to make their own slideshows and share them with family and friends. With Easy SlideShow, simply select your pictures, organize them and select transition effects. Choose your ...

New Antivirus software
  • Dr.Web Katana  v.1.0.5.04050Dr.Web KATANA - Kills Active Threats And New Attacks. A non-signature anti-virus. Combats threats that are brand-new and unknown to your anti-virus: encryption ransomware, blockers, and web injectors. Does not conflict with third-party anti-viruses.
  • Emsisoft Emergency Kit  v.2018.3.0Free, fully portable dual-engine cleaning toolkit that scans for and removes Malware and Potentially Unwanted Programs (PUPs) from your PC. Great for a second opinion scan, works well alongside any antivirus or anti-malware program.
  • ITL Total Security  v.1.0.0.1ITL Total Security is one of the leading Antivirus software for your Windows systems. It is an all-in-one security tool which blocks all types of infections and offers real-time protection at all times.
  • IObit Malware Fighter  v.5.6.0.4462With the newest Bitdefender antivirus engine, anti-ransomware engine and the much improved IObit anti-malware engine, IObit Malware Fighter 5 supports removing the latest spyware, adware, Trojans, keyloggers, bots, worms, hijackers, and viruses.
  • Webroot SecureAnywhere Premiere for Android  v.2.2.1.1004The Webroot Secure Anywhere Mobile Premier Android app automatically: * Protects your identity and personal information * Blocks mobile threats before they infect your phone * Locates your Android smart phone if it's lost or stolen * Safeguards ...
  • TrustPort Antivirus for Small Business Server 2012  v.12.0.0.4845Maximum security for individual workstations and servers, as well as at the entry point of your network. Protects your computer data against cyber crime, whilst freeing you from spam. Allows you to remotely deploy security software on workstations ...