Information
Endpoint Protector Intro
Total Device / Port Control
2 Minute Product Tour
Product FAQ
DLP Content Control
DLP for Mac OSX
Mobile Device Management
Mobile APP Management
FREE 5 User Licence
Try The Interface
Device Security Policies
Defining Usage Rights
Auditing and Shadowing
Virtual Appliance
Hardware Appliance
Interface Screenshots
Case Studies & Whitepapers

Get Started
Download a 30 Day Trial
FREE for Small Business
Request Pricing


Also of interest?
DataLocker Secure USB
McAfee Email Protection


We are here to help...
CALL: 08456 443 911
Request a Call Back
Request a Live Feature Tour
Make a Quick Enquiry
Visit our Tech Support Website

 

Defining Rights
 



Simple, easy to create and manage device management policies will help you define User group permissions, allowing an efficient enforcement and maintenance of the predefined security policies across the network.

Being able to block USB flash drives or other portable devices and track data going on them will help you comply with Government regulations, Industry standards and IT governance in regard to data leakage prevention.

User-based, Consistent Policies

You have the capability to apply policies based on the user being logged on the protected computer. This allows a consistent policy for a particular user wherever that user might log in within the protected network.

Computer (Machine)-based Policies

You can give Endpoint Protector the capability to apply policies based on the computer being used. This allows a consistent policy on a particular PC regardless of who is using it.

Synchronization with Active Directory

Leverages user and user group definitions in existing Active Directory. This feature gives you one more ways to differentiate users from each other and control them without having to re-create the user list manually.

Group Inheritance of Policies

Group Inheritance of Policies describes the capability to have sub-groups take on the properties of the parent group(s).

Group-Based Administrative Rights & Privileges with Detailed Logs

Allow an administrator to grant specific administrative rights and privileges for specific groups of administrators to perform certain operations. All administrative actions are logged as are all client-server communications. Group-based rights facilitate the appropriate distribution of administrative rights throughout the organization while detailed logging provides accountability.

Real-time Client Status Monitoring

Real-time Client Status Monitoring allows to monitor the status of clients (user, OS, security policy/profile, etc.) in real-time.

Access/User Notifications

If a user connects a USB or other device when not allowed, Endpoint Protector will block the device and issue a notification for the user and of course also the Administrators if required.

Disconnected/Offline Remote Computer Protection

If a computer doesn't have access to the network, Endpoint Protector will maintain constant security by keeping a local copy of the last list of policies and permissions on the PC. Endpoint Protector secures computers regardless of network connection and ensures that remote or disconnected users are also protected.

Push Changes to Permissions

Permission changes for devices can be pushed to one user or groups at once. Implements new policies regarding device use immediately - no reliance on reboot or restart of network connection.

More Information


 



softek home