Device Control
Software

Lockdown, Control & Monitor
USB and peripheral ports

  • #1 Cross-Platform coverage; including macOS, Windows, and Linux
  • Granular management on all data movement
  • Ideal for both Small Businesses and Enterprises
See Demo
* Your privacy is important to us. Check out our Privacy Policy for more information.

Award-winning enterprise DLP, recognized as a premier solution in Gartner's Enterprise DLP Magic Quadrant

See all awards & certifications
Endpoint Protector Leader 2024 Award
Endpoint Protector High Performance 2024 Award
Endpoint Protector Globee 2023 Award
Endpoint Protector Infosec 2022 Award
★★★★★ ★★★★★

"Excellent support and product. Would recommend to colleagues who require a strong DLP solution."

Jun 28, 2022 - G2 Reviews

Nicholas K.

IT Security and Network Specialist

Enterprise (>1000 employees)

★★★★★ ★★★★★

"Great tool for enterprises"

Oct 04, 2022 - G2 Reviews

Verified Endpoint Protector user

Information Technology and Services

Enterprise (>1000 employees)

★★★★★ ★★★★★

"Endpoint Protector fills a gap for most companies."

Jun 28, 2022 - G2 Reviews

Verified Endpoint Protector user

Defense & Aerospace

Mid-Market (51-1000 employees)

★★★★★ ★★★★★

"Works perfectly for our organization"

Aug 04, 2023 - G2 Reviews

Verified Endpoint Protector user

IT Services

Enterprise (>1000 employees)

Trusted by

Four layers of data protection

Device Control

USB & Peripheral port control

Define granular access rights for removable devices and peripheral ports and establish policies for users, computers and groups, maintaining productivity while enforcing device security.

Device Control Device Control
Content-Aware Protection Content-Aware Protection

Content-Aware Protection

Scanning data in motion

Prevent data leakage through all possible exit points, from clipboard, screen captures, USB devices, to applications including Microsoft Outlook, Skype or Dropbox.

eDiscovery

Scanning data at rest

Prevent data breaches by scanning and identifying sensitive data at the endpoint level on Windows, macOS, and Linux computers. Ensure compliance with regulations like HIPAA, PCI DSS and others.

eDiscovery eDiscovery
Enforced Encryption Enforced Encryption

Enforced Encryption

Automatic USB encryption

Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.

Gain full control of USB devices, Bluetooth and peripheral ports

The centrally-managed Device Control module allows for granular control over USB device permissions, enabling full control of the USB ports and connected storage devices. This way, it prevents accidental or intentional data loss and data leaks, while also protecting the endpoints against the spread of USB malware, BadUSB attacks or viruses. With this module, businesses can centralize user access management and customize access permissions for removable device media connections.

Device Control Device Control

How Device Control works

Device Control module is the first layer of security provided by Endpoint Protector. By defining granular access rights for removable storage and peripheral ports, device security is enforced while productivity, functionality, and workflow is maintained. As a cross-platform solution, it protects the entire fleet of endpoints, regardless of the operating system: Windows, macOS, or Linux.

Automatically identity devices connected to USB and peripheral ports.
Build custom policies allowing / denying device use based on device class, level of encryption or user.
Block unauthorized device use or data transfers and enforce data encryption remotely.
Provide remote and temporary access to devices when required, even when computers are offline.

Controlled device types

Device Control allows easy management for the majority of known USB drive types, for enhanced data protection in various work environments.

See all devices
  • USB Storage Devices (USB Flash Drives, Sticks, Pen drives, etc.)
  • External HDDs (incl. sATA HDDs)
  • CD/DVD-Players and Burners (internal and external)
  • iPhones, iPads and iPods
  • Smartphones and Tablets (incl. Android devices, Blackberry and PDAs) 
  • Digital Cameras
  • MP3 Player and other Media Player Devices
  • Card Readers (internal and external)
  • Memory Cards (SD, MMC, CF, Smartcard, etc.)
  • Printers
  • Floppy Drives
  • Webcams
  • WiFi Network Cards
  • FireWire Devices
  • Biometric Devices
  • Bluetooth Devices
  • ZIP Drives
  • ExpressCard SSD
  • Wireless USB
  • Serial Port
  • Teensy Board
  • PCMCIA Storage Devices
  • Thunderbolt
  • Network Share
  • Thin Client Storage (RDP Storage)
  • Additional Keyboards
  • USB Modems
  • Infrared Dongle

Protect company IP, PII, financial data, or other regulated data types without compromising productivity

Intellectual Property (IP) Protection

Endpoint Protector uses advanced technologies such as N-gram-based text categorization to accurately discover IP, including source code, within hundreds of file formats, and then monitor and control any transfers to prevent data theft.

Personally Identifiable Information (PII) Protection

Discover and protect Personally Identifiable Information (PII) and sensitive information stored on employee endpoints with our data discovery module. Monitor data and prevent data exfiltration and data leaks with an all-in-one Data Loss Prevention tool.

Insider Threat Protection

Stop data leakage and data theft and by applying appropriate cybersecurity controls at the endpoint - from logging potential insider threats, to real-time blocking. Discover end-users that fail to follow data security policies and situations that can lead to a policy violation or data leakage.

Compliance and Regulations

Endpoint Protector’s DLP software can help organizations ensure data privacy and achieve regulatory compliance with HIPAA, PCI-DSS, NIST, GDPR, SOX, and others, avoiding fines and other damages imposed by regulatory entities.

Request your tailored demo today

Join thousands of successful customers

Honda Lock
“The most required features for us were the Network Share control from the Device Control module and the Bluetooth device. These features helped the company to manage the users easily and to block transfers to mobile devices, USB devices, and external devices.”
Mr. Alejandro Garcés,
IT
Spectrum of Hope
“Endpoint Protector adds a strong layer of data security. In addition, CoSoSys customer service is excellent.”
Josh McCown,
IT Director
“Our company was set up within hours and the support and service offered by CoSoSys are excellent.”
Jay Patel,
Account Manager