My Endpoint Protector for Mac
My Endpoint Protector a full device control and Data Loss Prevention solution
that allows you to manage all MAC ports/endpoints from one centralized online console.
With My Endpoint Protector you can eliminate the risks of data loss and data theft that
are posed by portable devices like USB Flash Drives. Take control of who can connect
portable storage devices to your MAC.
My Endpoint Protector allows companies of all sizes to manage all their endpoints from
one centralized online console, be it Desktops, Notebooks or Netbooks, used in the office,
at home or on the road. My Endpoint Protector is eliminating the risks of data loss and
data theft that are posed by portable devices like USB Flash Drives.
- Mac OS X 10.5 or later
- 512 MB RAM
- 150 MB of free hard disk space
|License:||Free to try, $19.95 to buy|
Why you will love My Endpoint Protector:
My Endpoint Protector for Mac Key Features:
- Centrally manage your endpoint / device use from anywhere
- No server setup (hardware, licenses or maintenance)
- Enterprise class endpoint security for every size company
- Manage one or hundreds of Mac endpoints from one online place
- Every Mac user can set it up. No experienced Admin needed
- Setup in minutes
- Works with any Mac that has an internet connection
- Everyone can now protect PC endpoints.
- Centralized Device Management / Device Whitelist
The online administrative console gives you the complete overview of all device activity
at endpoints allowing to centrally monitor and control them. The device whitelist of
specific authorized devices for certain users or user groups and their respective policies
allows staying productive while maintaining control of what devices are used.
For Mac OS X the use of USB storage devices, Firewire devices and CD/DVD is controlled.
- Support for Mac OS X and Windows (XP, Vista, 7)
With our solutions you can make portable device use secure in networks where Macs and
PCs are used. This widens your security and offers an even more secure working environment
with portable storage.
- Offline Temporary Password
While on the road and without a connection to the office network, devices can be
allowed by the Administrator for a specific period from 30 minutes to 30 days.
- File Tracing - Control your Data Flow (for Endpoint Protector)
The File Tracing feature will track all data that was copied to and from prior
authorized portable storage devices. A thorough record of all information streams
at the network's endpoints is essential to support audits of data flow and controlling
the impact of data leakage.
- Policy based Enforcement of Regulations
Simple device management policies with customizable templates help define User Group permissions
to allow for an efficient enforcement and maintenance of your latest security policies across
your network. This enables your internal IT guidelines to better comply with government
regulations, industry standards and IT governance in regard to data breach prevention
- Reporting and Analysis Tools
Endpoint Protector offers a powerful reporting and analysis tools with the
ability to "drill-down" from the high-level reports to more detailed reports,
analysis and even "raw log data" to make the data audit processes easy and straightforward.
| RELATED SOFTWARE DOWNLOADS FOR My Endpoint Protector for Mac
- Secure it Easy
will give you the control you need over PCs endpoints
- AirStop Pro
AirStop Professional - Wireless Endpoint Security Policy Enforcement for Laptops and Tablet PCs.
- Dmailer Backup U3 edition
Dmailer Backup U3 edition is Data Backup Software about data protection and data loss prevention.
- Carry it Easy +Plus
turn your portable storage device into a powerful tool. Protect your data, sync your Outlook.
is the policy based access control solution that prevents unauthorized users from using USB and FireWire ports, removable devices, CD-ROMs, and so on.
- Surf it Easy
is an enhancing application for Flash Drives that allows surfer to launch the browser from portable device
- USB over Network
Share and access your USB devices over network.