(818) 531-0390 info@d2cdist.com

My Endpoint Protector - 100% cloud managed

Protect your network’s sensitive data and eliminate the threats posed by portable storage devices, cloud services and mobile devices

My_Endpoint_Protector_general_logoMy Endpoint Protector is a full Device Control, Data Loss Prevention (DLP) and Mobile Device Management (MDM) cloud-based solution available for Windows, Mac OS X and iOS and Android mobile devices. Portable storage devices such as USB flash drives, gadgets / tablets, e-mail applications like Outlook and Gmail and cloud services like Dropbox, iCloud, Google Drive, etc. may cause severe issues when it comes to controlling use of confidential data. With My Endpoint Protector you can minimize the risks of data loss, data theft and data leakage and also manage the mobile device fleet from a single centralized online console from anywhere, at anytime.

HOW IT WORKS

Easy to implement, easy to manage Device Control, Content-Aware DLP and Mobile Device Management in the Cloud

endpoint_protector_how_it_works

my_endpoint_protector_en

FEATURES

device control

Centralized Device Management

For Windows, Mac

The online administrative console offers a complete overview of all device activity at endpoints allowing to centrally monitor and control the use of USB flash drives and other portable storage devices. Input the main text content for your module here.

Content Aware Protection

Content Aware Protection

For Windows, Mac

Content-Aware Data Loss Prevention (DLP) offers detailed control over sensitive data leaving the company’s network through all possible exit points, from clipboard, screen captures, USB devices to applications including Microsoft Outlook, Skype, Yahoo Messenger or Dropbox.

Mobile Device Management

Mobile Device Management

For iOS, Android

Offers better management over the use of Android and iOS devices through detailed monitoring, logging and reporting of all mobile device activity and remote enforcement of strong security policies. Companies will gain enhanced protection against both inside and outside threats as well as increase productivity by pushing applications or Wi-Fi and e-mail settings.

win mac

Support for Mac OS X and Windows (XP, Vista, 7, 8)

With cross-platform support, confidential data is kept safe inside the network regardless if Macs or Windows PCs are used. This widens your security and aids users that require a specific operating system.
Reporting and Analysis

Reporting and Analysis

The reporting and analysis tool allows you to closely analyze all portable device activity and content leaving your network. Ideal for internal and external audits as well as reports for executives, providing the information needed for a quick reaction in case of policy violations.
100% Cloud Managed

100% Cloud Managed

Controlling ports and USB devices, confidential data and mobile devices through a server in the cloud is the best solution to centrally manage your network without having to become an IT expert.
Environmentally Friendly

Environmentally Friendly

Our cloud runs on green energy from 100% carbon dioxide-free and environmentally-friendly hydropower. Choose My Endpoint Protector with a clear conscience.
Safety of our Cloud Data Centers

Safety of our Cloud Data Centers

Further extending the security, reliability and confidentiality of our solutions, our Cloud Data Centers are located in Germany and are trusted by some of the biggest companies in the world.
Mobile Application Management (MAM) for iOS

Mobile Application Management (MAM) for iOS

Discover and manage what applications are brought into the company network. Instantly push free and paid apps to enrolled mobile devices from your own Apps Catalog.
Offline Temporary Password

Offline Temporary Password

While on the road and without a connection to the office network, USB flash drives or other devices can be allowed by the Administrator for a specific period from 30 minutes up to 30 days.
Clipboard Monitoring

Clipboard Monitoring

Puts an end to Data Leakage threats of sensitive data through Copy & Paste / Cut & Paste for even further enhanced data security.
Disable Print Screen

Disable Print Screen

Revokes Screen Capture capabilities and makes sure no valuable data displayed on the screen is leaked out of the protected network.
Device use Policy Enforcement

Device use Policy Enforcement

With My Endpoint Protector you will comply with government regulations, industry standards and IT governance in regard to data leakage prevention. Easily enforce internal policies without compromising productivity.
Trusted Devices

Trusted Devices

Using Enforced Encryption with TrustedDevices ensures that all endpoint devices are not only authorized and controlled but also protecting sensitive and confidential data in transit. If you or one of your colleagues loses a USB device, the data on it cannot be read as it is encrypted.
Appetizer License

Appetizer License

Appetizer License offers totally FREE enhanced data and endpoint security for small networks with up to 5 computers to protect against data theft, data leaks and data loss. SMBs have no excuse now to leave their sensitive information unprotected.

FREE Trial Version

free-trial
Allows access to all My Endpoint Protector’s features for a period of 10 days. Protect and manage up to 50 computers (Windows & Mac) and 5 mobile devices (Android & iOS).

 

Get My Trial