The website uses cookies to deliver services in accordance with the Cookies Policy. You can define the conditions for storing or accessing the cookie mechanism in your browser.
Complete protection in one simple solution for securing your sensitive data. Endpoint Protector is an extremely easy to manage and implement solution for protecting workstations and mobile devices from data loss, leakage and theft. Fourmodules included in Endpoint Protector provide flexibility and granular administration of rights and access for devices - users - groups or global policy settings. A centralized web-based administration console allows you to manage all modules from a single location.
Device Control - control of peripheral devices and ports
for Windows, macOS and Linux
All the portable devices that plug into our terminals, while seemingly harmless, are one of the leading causes of security incidents that can cause serious damage to any business. The damage ranges from theft of confidential data to huge fines due to violation of compliance rules and regulations. The device control module is the first layer of security provided by Endpoint Protector. By defining detailed access rights to USB ports and peripherals, device security is enforced while maintaining productivity. This prevents accidental or intentional data loss and leakage, and protects endpoints from the spread of USB malware, BadUSB attacks or viruses.
Features:
Controlled device types:
Content Aware Protection - controlling data in motion
for Windows, macOS and Linux
The use of more and more cloud-based services from Dropbox, Google Drive to webmail has increased the number of accidental or intentional data leakage incidents in recent years. Careless employee behavior is actually considered a greater security threat than outside attackers, highlighting the need for close and detailed monitoring of all data sent outside the company. When data leaves the endpoint via the aforementioned applications and services, you need to ensure that the content does not conflict with your policies. This is where the Content Aware Protection module will be perfect.
Features:
Enforced Encryption | Easy Lock - USB forced encryption
for Windows and macOS
EasyLock USB Enforced Encryption in combination with Endpoint Protector allows IT administrators to extend their device control policy and ensure that all sensitive data transferred to USB storage devices is automatically encrypted. Using a secured password, users can securely transfer confidential data and access it on any computers or only on authorized computers. In addition, IT administrators have access to additional useful features such as remotely messaging users, requesting password changes, or wiping sensitive data if a device is lost or stolen.
Features:
eDiscovery - control of data at rest
for Windows, macOS and Linux
The eDiscovery module scans and identifies sensitive information already on an organisation's endpoints and enables administrators to take corrective action, such as encrypting or deleting it. It addresses both internal and external threats - unauthorized employees storing sensitive data on their computers and hackers who manage to bypass network protection and attempt to take over company data. For organizations that collect and manage data such as credit card numbers, personally identifiable information (PESEL or ID), social security numbers, customer records, and intellectual property or corporate secrets, it is essential to protect the information and ensure the secure storage of sensitive data. Organizations implementing this module can achieve compliance with HIPAA, PCI-DSS, RODO and other regulations, avoiding fines and other damages imposed by regulatory entities.
Features:
Managing Endpoint Protector
All modules can be centrally managed from a web-based dashboard. The Dashboard is designed to meet the needs of both management and security staff and offers real-time access to information, charts and reports on controlled devices across the organization and data transfer activity.
On local martkets Bakotech Group operates through a well-established partner network, including over 1,000 active dealers. Key IT-integrators and are involved in the realization of large-scale projects concerning implementing solutions for end-customers from various segments of business. Bakotech's business strategy is True Value Added Distribution or in other words - project oriented distribution.
We are providing our partners with a wide range of services such as PR, co-marketing activities, pre post-sales support, trainings for partners and end-customers, PoC, PoV, solution consulting, implementation support and technical support.
VAT ID 6762466740
REGON 122894922
KRS 0000467615
ph. +48 12 340 90 30