Works on: Windows 10 | Windows 8.1 | Windows 8 | Windows 7 | Windows 2012 SHA1 Hash: 4e06082512c9969e8bcfddb228a70729aaefb3d2 Size: 13.9 MB File Format: exe
Rating: 2.086956521
out of 5
based on 23 user ratings
Publisher Website: External Link Downloads: 335 License: Demo / Trial Version
Endpoint Protector Basic is a demo software by Cososys and works on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows 2012.
You can download Endpoint Protector Basic which is 13.9 MB in size and belongs to the software category Traceroute Whois Tools. Endpoint Protector Basic was released on 2010-12-20 and last updated on our database on 2017-03-07 and is currently at version 1.
Thank you for downloading from SoftPaz! Your download should start any moment now. It would be great if you could rate and share:
Rate this software:
Share in your network:
Endpoint Protector Basic Description
To protect your PC, we recommend to use Endpoint Protector Basic to monitor and control ports and interfaces such as USB, FireWire, card reader, CD / DVD, etc on your PC. This will protect them against unwanted use of portable storage devices like USB sticks, SD cards or portable hard drives to prevent data theft or data leaks. The best companion for your application firewall, Endpoint Protector Basic is designed to protect your computer’s endpoints acting as a USB firewall. Endpoint Protector Basic installs on your PC and helps you manage your USB device fleet and also to control what devices are authorized to connect to your computer. With its ability to uniquely identify devices you can be sure that you are in control, no 3rd party can use your USB ports to copy data from your computer or to place potential malicious files on it. Gain full control over your laptop’s endpoint devices, everywhere you are: at the office, on the road or in an airport. All portable storage devices such as USB Flash Drives, iPods, MP3 Players, digital cameras, portable HDDs, mobile phones and other devices pose a threat when connected to your PC because any of them can be used to leak your data in just seconds. Controlled Device Types are: USB Flash Drives (Normal USB Drives, U3, etc.) Wireless USB, Memory Cards (SD, MMC, CF, etc.), Card Readers (internal and external), ZIP Drives, Floppy Drives, CD/DVD-Player/Burner (internal and external), Digital Cameras, Smartphones / Handhelds / PDAs, Blackberry, iPhones / iPads / iPods, external HDDs, FireWire Devices, MP3 Player / Media Player Devices, Biometric Drives, Bluetooth, ExpressCard SSD, Printers, PCMCIA
Where to buy?
Last updated price and discount information 7 years agoupdate now