My Endpoint Protector Knowledge Base

Below you can explore issues related to My Endpoint Protector and find the advice you need. For any other additional questions, suggestions, improvements requests or if you simply want to report a problem, please contact the support team.

How does My Endpoint Protector work? (Discontinued)

After creating a My Endpoint Protector account you can proactively manage the use of portable devices and file transfers on all protected computers. To do this, simply download and install a small client application on all computers you want to protect and manage. This will help against threats like data theft, data loss or data leakage caused by unauthorized devices use or file transfers to emails, cloud storage, social media, cloud storage or other online applications.

See How it Works Video
Request Demo
* Your privacy is important to us. Check out our Privacy Policy for more information.