HOME LinuxSecurity Endpoint Protector Basic

Endpoint Protector Basic 1.0.3.2

  • $ 19.71, EUR 14.95
  • Shareware
  • 13.3 MB
  • CoSoSys

Description of Endpoint Protector Basic 1.0.3.2:
To protect your PC, we recommend to use Endpoint Protector Basic to monitor and control ports and interfaces such as USB, FireWire, card reader, CD / DVD, etc on your PC. This will protect them against unwanted use of portable storage devices like USB sticks, SD cards or portable hard drives to prevent data theft or data leaks. The best companion for your application firewall, Endpoint Protector Basic is designed to protect your computer's endpoints acting as a USB firewall. Endpoint Protector Basic installs on your PC and helps you manage your USB device fleet and also to control what devices are authorized to connect to your computer. With its ability to uniquely identify devices you can be sure that you are in control, no 3rd party can use your USB ports to copy data from your computer or to place potential malicious files on it. Gain full control over your laptop's endpoint devices, everywhere you are: at the office, on the road or in an airport. All portable storage devices such as USB Flash Drives, iPods, MP3 Players, digital cameras, portable HDDs, mobile phones and other devices pose a threat when connected to your PC because any of them can be used to leak your data in just seconds. Controlled Device Types are: USB Flash Drives (Normal USB Drives, U3, etc.) Wireless USB, Memory Cards (SD, MMC, CF, etc.), Card Readers (internal and external), ZIP Drives, Floppy Drives, CD/DVD-Player/Burner (internal and external), Digital Cameras, Smartphones / Handhelds / PDAs, Blackberry, iPhones / iPads / iPods, external HDDs, FireWire Devices, MP3 Player / Media Player Devices, Biometric Drives, Bluetooth, ExpressCard SSD, Printers, PCMCIA

Supported OS: Windows XP

System Req: Any PC running Windows XP or higher

User reviews: Endpoint Protector Basic Download

Name: *
Email:
Review: *

 

Software downloads related to Endpoint Protector Basic

My Endpoint Protector
My Endpoint Protector provides device control and data loss prevention to everyone who want to centrally manage and control the use of USB, FireWire and other ports and portable storage device use. It works for PC and Mac OS X. Free for personal use. more info download

AntiCrack Software Protector Basic
AntiCrack Software Protector is the system of software protection of applications,designed for quick implementation of application protection functions, especially targeted for software developers.AntiCrack Software Protector is not only a dll exe... more info download

EasyLock
Turn USB Devices into Portable Data Safes: simple, fast, secure and convenient more info download

AutoRun Disable
AutoRun Disable is a free tool that helps you secure your PC. With it you can easily disable the possibly dangerous AutoRun feature of Windows (XP, Vista, 7). more info download

Licence Protector
Licence Protector generates Demo- and time limited versions, extensive software copy protection, supports concurrent user testing, Web activation, electronic Software Distribution, protects multiple modules per application, multiple languages. more info download

Wireless Protector Workgroup
Wireless Protector is automatically disable wireless and endpoint devices on computers that connected to the company network by LAN cable and re-enable the devices when the LAN cable is disconnected from the protected computers. more info download

Wireless Protector Enterprise
Wireless Protector is automatically disable wireless and endpoint devices on computers that connected to the company network by LAN cable and re-enable the devices when the LAN cable is disconnected from the protected computers. more info download

#1 Smart Protector - Internet Eraser
Smart Protector - Internet Eraser completely erases history, typed URLs (the drop down address list), AutoComplete, cookies, temporary files, recent document list, recycle bin and more. Smart Protector - Internet Eraser works with Internet... more info download

0-Code Email Address Protector
Prevent spam robots harvesting your email address from your website and help reduce the amount of spam you receive as a result. Hixus Email Address Protector converts your email address so it can be read by people visiting your website, but is not... more info download

Absolute Password Protector
Absolute Password Protector offers a brand new level of security using strong encryption algorithms to encrypt your files. Encrypted files can be safely transferred over the Internet via e-mail. Hide sensitive data in pictures. more info download

EditPlus Text Editor
EditPlus is a text editor, HTML editor, PHP editor and Java editor for Windows. While it can serve as a good Notepad replacement, it also offers many powerful features for Web page authors and programmers. more info download

DreamScene Video Wallpaper and Screen Saver
Add life to your desktop wallpaper! With Dreamscene Video Wallpaper you can greatly enhance your desktop by playing videos as background wallpaper. It's similar to the DreamScene feature of Windows Vista Ultimate. more info download

News related to Endpoint Protector Basic

How Basic Endpoint Patching Helps Protect Against Ransomware and Other Attacks - Security Intelligence (blog)
Security Intelligence (blog)
Assess. With BigFix, a single intelligent software agent is installed on all managed endpoints to continuously monitor and report on the endpoint state, including patch levels, with a management server. The...
The HPE backup tool, Data Protector, helps execute companies' DR plans - TechTarget
TechTarget
Data Protector also offers protection for application software. The software's business application integrations extend server backup, automated point-in-time recovery and granular restores to application users. Data...
iSign Launches iSecure Protector to Protect Computers and Servers from Hackers with Impenetrable Security - Benzinga
Benzinga
This week iSign International, an international digital communication and security company dedicated to developing software solutions to make computers and servers impenetrable from hackers, officially released iSecure Protector...
IGEL Software Sales Soar with Growing Demand for Secure, Manageable and Cost-Effective Endpoint Management - Business Wire (press release)
Business Wire (press release)
SAN FRANCISCO--(BUSINESS WIRE)--IGEL, a world leader in endpoint management software for the secure enterprise, announced today that, during the first half of 2017, it has seen dramatic growth in software...
How to design a website on Mac - Macworld UK
Macworld UK
HTML and CSS is by no means difficult to learn, and learning basic HTML is a good idea if you plan to get into web design. However, most people skip coding a website by hand and use either a program to design the site or an...
Americans take more digital risks - Daily Mail
Daily Mail
Researchers discovered the majority of Americans are still ignoring basic rules like not opening email attachments, not using the same password on several sites, or oversharing personal data on social networks that could lead...
Absolute to Host Conference Call for Fiscal 2017 Third Quarter Financial Results - Business Wire (press release)
Business Wire (press release)
VANCOUVER, British Columbia--(BUSINESS WIRE)--AbsoluteŽ, the self-healing endpoint security company, today announced it will host a conference call on Monday, May 8, 2017 at 5:00 p.m. ET (2:00 p.m. PT) to...
Absolute to Host Conference Call for Fiscal 2017 Third Quarter Financial Results - Yahoo Finance
Yahoo Finance
AbsoluteŽ, the self-healing endpoint security company, today announced it will host a conference call on Monday, May 8, 2017 at 5:00 p.m. ET (2:00 p.m. PT) to discuss its fiscal 2017 third quarter financial results. Mr....
Absolute to Host Conference Call for Fiscal 2017 Third Quarter Financial Results - Stockhouse
Stockhouse
AbsoluteŽ, the self-healing endpoint security company, today announced it will host a conference call on Monday, May 8, 2017 at 5:00 p.m. ET (2:00 p.m. PT) to discuss its fiscal 2017 third quarter financial results. Mr. Geoff...
Unify Circuit Review - UCaaS with the Freedom of the Web - CommsTrader
CommsTrader
Underneath the layers of software applications, servers, endpoint hardware, physical network infrastructure and so on, communications over IP fundamentally depends on a specific discipline related to programming