Lan-Secure Logo

Lan-Secure Device Protector

DLP Endpoint Security Device Control


Device Protector Datasheet

Product Overview

Device Protector is Data Loss Prevention (DLP) and device control endpoint security software that enforce endpoint devices protection policies on organization computers. The software helps to secure IT environments from un-trusted endpoint devices that can be used by potential intruders to access sensitive organization data and prevent data leakage and information theft.

Device Protector is acting as a server to all protected computers and can be deployed through the software management console or through any 3rd party deployment system by using the software deployment MSI package. The software powerful engine can control and secure any number of computers by installing a remote service on the protected computers. It is supporting devices online and offline protection including read-only, read-write, working hours, exclude users and exclude media serial numbers capabilities. It is also providing easy-to-use network administration including auto discovery, auto scanning, reports, actions, exporting capabilities, database support and remote administration console. The software can collect activity logging with optional actions on the protected endpoint devices that helps network administrators to track and maintain the organization endpoint security and data loss prevention.

Device Protector can secure the following endpoint devices: Bluetooth, DVD/CD-ROM, Firewire, Floppy, Imaging, Infrared, Microphones, Modems, Portable Mobile Phones, Ports, Printers, Removable Disks, SD cards, Sound, Tape Drives Wireless 802.11 and Broadband (3G / 4G / WiMax) devices.

Device Protector can secure the following operating systems: Windows 10, Windows 8, Windows 7, Vista, XP.

Quick Tour

Take a quick tour to learn more about the software unique capabilities that will help you to control your endpoint devices and prevent data loss and information theft.

Device Control Dashboard

Device Control Dashboard

Computers endpoint device control dashboard including total successful, unreachable, failed and unknown computers protection events and software endpoint security activity status.

Scanning Monitor View

Scanning Monitor View

Scan monitoring view of protected computers including endpoint security deployment and device control capabilities including online and offline protection and exclude users and media options.

Activity Logging Reports

Activity Logging Reports

Real-time activity logging reports of protected computers including online and offline endpoint device control and data loss prevention events for endpoint security administration.

Automatic Actions Capabilities

Automatic Actions Capabilities

Automatic actions options including windows execution command email messages and syslog alerts capabilities upon receiving endpoint device control events from protected computers.

Automatic Export Capabilities

Automatic Export Capabilities

Automatic exporting capabilities for text files and windows SQL/Access ODBC database including protected endpoint device control events and current protection status.

Remote Control Viewer

Remote Control Viewer

Remote control management console viewer option providing endpoint security administration interface from remote sites including optional administrators permissions.

Events Removal Options

Events Removal Options

Provide automatic notification and protection events removal options for management and administration of the collected endpoint security and device control events on the protected computers.

Unstoppable Protection Service

Unstoppable Protection Service

Provide optional unstoppable client protection service that prevent local computer administrators from stopping or controlling the status of the endpoint security protection service.

DHCP Release Option

DHCP Release Option

Provide automatic DHCP release option before disabling protected wireless devices to help reclaim new wireless adapters IP addresses when endpoint wireless devices being enabled.

Client Notification Message

Client Notification Message

Provide automatic editable client notification message that will be displayed when endpoint device control protection is being activated on the protected computers.

Auto Discovery Scanning

Auto Discovery Scanning

Automatic computers discovery and scanning options for active endpoint security and data loss prevention of network computers from domain, workgroup or IP addresses range.

Exclude Endpoint Computers

Exclude Endpoint Computers

Provide exclude computers list of computers names and IP addresses ranges that will be excluded from the selected endpoint security and data loss prevention protection rules.

Multiple Redundant Servers

Multiple Redundant Servers

Provide options end point security on multiple redundant servers for clients protection service installation on distributed environment including first available or first responsive server.

Server Administration Permissions

Server Administration Permissions

Provide optional server administrations permissions that enable to control the endpoint security operations and viewing options that will be available for specific system administrators.

Key Features

Learn more about the software device control and endpoint security key features to complete your knowledge about the available capabilities that the system has to offer.

  • Support Windows 7, 8, XP, Vista operating systems.
  • Provides Data Loss Prevention (DLP) device control endpoint security.
  • Support endpoint device control for DVD/CD-ROM, Flash Drives, Mobile Phones, Wireless devices and more.
  • Support online and offline endpoint security including read-write, read-only and working hours protection.
  • Support device control exclude options of users and DVD/CD, Flash drives media serial numbers.
  • Support multiple or redundant servers including first available or first responsive options.
  • Support automatic discovery and deployment of network computers.
  • Support remote control administration console with permissions.
  • Support automatic DHCP release of protected wireless devices.
  • Support client protection service unstoppable mode option.
  • Support automatic actions and exporting capabilities.
  • Support enhanced statistics and reports.
System Requirements

Verify the pre-installation requirements of the software device control and endpoint security capabilities to ensure smooth and easy installation and operation on your network.

  • Computer Platform: A 800 MHz or faster processor with at least 256 MB of RAM
  • Operating Systems: Microsoft Windows 2000 / XP / 2003 / Vista / 2008 / 7 / 2012 / 8 / 10