Endpoint Security

PC Data Leak Prevention, Document Security, and Vulnerability Management Solution

Are you worried that your proprietary technology or core information asset might leak?
Is your core information exposed to unauthorized users or do you need a systemic response mechanism?

Endpoint Security provides essential security features such as information leakage prevention, malicious code protection, document security, and print control.

Manage your complex security posture easily and securely with Endpoint Security leveraging Samsung SDS' endpoint security operational know-how.
What makes Samsung SDS Endpoint Security special?
Systematically protect and manage your enterprise endpoints in the contactless era!

• Years of Endpoint Security Experience

  • For over 25 years, Samsung SDS has managed the security of 490,000 PCs for Samsung affiliates worldwide and 290,000 PCs for 174 customer companies. Our proven expertise ensures a reliable working environment against hidden security threats.

• Global Technical Support System

  • Samsung SDS operates its own Global Technical Support system, with technical support centers located at six major hubs around the world. We provide 24/7 technical support in multiple languages, ensuring that customers receive assistance anytime, anywhere.

• Competitive Price

  • Backed by years of solution experience, we reduce costs and provide our Endpoint Security solution at a competitive price, making adoption more affordable for your business.
Endpoint Security PC image
Endpoint Security Mobile image
Endpoint Security를 설명하는 이미지
관리자들
Endpoint Security
서버 관리콘솔 ESCORT NASCA SecuPrint
DB ESCORT DB NASCA DB SecuPrint DB
에이전트 설치파일 사용자들

Key Features

01
Device Control

Network Drive/Memory/External HDD/Imaging Device/Scanner/Smartphone/Storage Device Control/Logging
 → Storage Device Control/Logging → User PC

Endpoint Security helps efficient management and control of all storage devices connected to your PC, including USB memory, external hard drives, and network drives. It also provides robust control over devices that can be connected via wired or wireless interfaces, such as cameras, scanners, and smartphones, which could potentially be exploited as data leakage channels.

Document Security Management

Save Document→Verify user information→Configure document access permissions based on policy→Encrypt the document→Verify user information

NASCA→Open NASCA Document→Verify that the document access permission matches the authenticated user→Decrypt the document

Endpoint Security encrypts all documents created on the PC to transfer them. It also controls document access rights and prevents data leaks through document encryption and decryption.

Printing Control

Authentication→Network Printer→Local Printer→Watermarking→Storing Print Logs

Endpoint Security prevents data leakage from printed documents through printing control such as print watermarks, print policies setting for groups, departments, or individuals, and tracking of print usage history.

Use Cases

    FAQs

    • Endpoint Security is an on-premises solution that includes ESCORT (which blocks internal data leaks), NASCA (which provides electronic document encryption and manages user permissions for documents), and SecuPrint (which offers print control and screen watermark feature).

    • Please submit an inquiry through the "Get in Touch" at the bottom of the current page. Our Account Manager (AM) will review your request and reach out to you using the contact information you provided to proceed with the consultation.

    • Depending on the customer's situation, it takes about 1 to 3 months. During this period, a customer environment is assessed, a server is installed, agents are deployed, and pilot testing and function checks are performed.

    Let’s talk

    Whether you’re looking for a specific business solution or just need some questions answered, we’re here to help