openPR Logo
Press release

Endpoint Protector, Finalist in Info Security Products Guide’s Global Excellence Awards

01-18-2012 02:50 PM CET | IT, New Media & Software

Press release from: CoSoSys Ltd.

The Endpoint Protector Appliance for Device Control and Data Loss Prevention is one of the finalists of the Endpoint Security category

Bucharest, Romania – January 17, 2012 – CoSoSys announced today that its device control and data loss prevention solution, Endpoint Protector Hardware and Virtual Appliance, is one of the finalists in the Endpoint Security category of the Global Excellence Awards, a yearly contest organized by Info Security Products Guide, the industry's leading information security research and advisory guide. These prestigious global awards recognize security and IT vendors with advanced, ground-breaking products and solutions that are helping set the bar higher for others in all areas of technology.

The out-of-the-box device control and data leakage prevention solution for Windows and Mac OS X, the Endpoint Protector Appliance, proactively secures endpoints against the latest threats affecting businesses worldwide, preventing data loss and theft, data exposures and other security breaches that commonly occur when portable storage gadgets like USB flash drives and lifestyle devices are part of the work process. Designed for computer networks ranging from 20 to over 5000 endpoints and available as both hardware and virtual appliance, Endpoint Protector offers full control over device usage, tracking and reporting of all data transferred in or out of the protected network and enforces encryption of data in transit on portable devices, all through an easy to manage central Web-based management interface.

“Having the Endpoint Protector Appliance named finalist in such a prestigious competition comes as recognition of our efforts to offer an efficient endpoint security solution in terms of performance, competitiveness and usability that covers all the security and device control needs of a company” said Roman Foeckl, CoSoSys CEO. “We are extremely proud of what we have accomplished so far and we will continue to develop and release highly reliable and innovative endpoint security solutions designed to respond to the latest security challenges of the business world.”
The Info Security Products Guide Global Excellence Awards recognize and honor excellence in all areas of information security. The 2012 edition rewards top of the line products in over 30 categories, along with the best companies and professionals in the IT field. The winners of the competition will be announced at the Awards Dinner held in San Francisco on February 29, 2012.

About Info Security Products Guide Awards

Info Security Products Guide sponsors leading conferences and expos worldwide and plays a vital role in keeping end-users informed of the choices they can make when it comes to protecting their digital resources. It is written expressly for those who are adamant on staying informed of security threats and the preventive measure they can take. You will discover a wealth of information in this guide including tomorrow's technology today, best deployment scenarios, people and technologies shaping info security and market research that facilitate in making the most pertinent security decisions. The Info Security Products Guide Awards recognize and honor excellence in all areas of information security. To learn more, visit www.infosecurityproductsguide.com and stay secured.

Images and additional materials:
www.endpointprotector.com/en/index.php/resources/screenshots/endpoint_protector_appliance
www.cososys.com/images.html
www.cososys.com/press_room.html

Press Contacts:
Mirror Communications Ltd.
Alina Popescu
Phone: +40 741 073753
Email: alina@mirror-communications.com

About CoSoSys
CoSoSys is specialized in network device control, endpoint security and data loss prevention (DLP) for Windows / Mac and the development of applications for portable storage device enhancement. The application portfolio includes functions from device control, file tracing and shadowing, password security, data synchronization and network security. CoSoSys distributes its products globally through Distributors, Resellers and directly to users at http://www.EndpointProtector.com and http://www.CoSoSys.com. CoSoSys is an independent software developer since a management buyout from Astaro in July 2011. CoSoSys enjoys a continuously growing installation base of users worldwide and was recognized in 2011 as one of the fastest growing technology companies being a winner of the 2011 Deloitte Technology FAST 50 ranking for Central Europe. The company has offices in Germany, the United States and Romania.

CoSoSys Ltd
Haiducului 6
400040 Cluj-Napoca
Romania

Anca Goron
Phone: +40 264 593 110 Ext. 113
Email: anca.goron@cososys.com

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release Endpoint Protector, Finalist in Info Security Products Guide’s Global Excellence Awards here

News-ID: 207329 • Views:

More Releases from CoSoSys Ltd.

Endpoint Protector 4 named Best DLP Solution Finalist in the SC Awards Europe 2013
Endpoint Protector 4 named Best DLP Solution Finalist in the SC Awards Europe 20 …
Our Data Loss Prevention Solution Endpoint Protector 4 has made the shortlist in the Best DLP Solution category Cluj-Napoca, Romania, February 18th, 2013. With competitive companies entering and strict judging criteria, SC Awards Europe honors the most innovative security technologies. CoSoSys announces proudly that Endpoint Protector 4, its Data Loss Prevention, Device Control and Mobile Device Management solution has been named Finalist in the run for the selection of the Best
Thunderbolt and USB 3.0 ports: two more reasons for companies to use Device Control and DLP solutions for Mac OS X to prevent data loss
Thunderbolt and USB 3.0 ports: two more reasons for companies to use Device Cont …
Support for Thunderbolt and USB 3.0 ports against data theft and data leakage through portable storage devices is essential to protect company data is now available with Endpoint Protector 4 for Mac OS X Cluj-Napoca, Romania, January 24th, 2013. While the number of companies incorporating more and more Macs into their networks is increasing, the need for protecting these computers against data leakage and data theft is rising. Especially since all
Endpoint Protector, Winner in the 2012 Mobile Star Awards™
Endpoint Protector, Winner in the 2012 Mobile Star Awards™
Endpoint Protector named “Superstar” for the category Enterprise Solutions: Security and “Shining Star” for Enterprise Solutions: Mobile Device Management category in the 2012 Mobile Star Awards™! Bucharest, Romania, December 20, 2012. CoSoSys is proud to announce that its innovative Data Loss Prevention, Device Control and Mobile Device Management solution, Endpoint Protector, has been named winner in the 11th Annual Mobile Star Awards™ program, organized by the mobile technology news and events

More Releases for Endpoint

Unified Endpoint Management Market: Unified Endpoint Management to Surge to USD …
Unified Endpoint Management Market Scope: Key Insights : Unified Endpoint Management Market size was valued at USD 6.36 Billion in 2022 and is poised to grow from USD 8.41 Billion in 2023 to USD 78.43 billion by 2031, at a CAGR of 32.2% during the forecast period (2024-2031). Discover Your Competitive Edge with a Free Sample Report :https://www.skyquestt.com/sample-request/unified-endpoint-management-market Access the full 2024 Market report for a comprehensive understanding @https://www.skyquestt.com/report/unified-endpoint-management-market In-Depth Exploration of the
Endpoint Security Management Market: Ready To Fly on high Growth Trends | Avast, …
The Latest published market study on Endpoint Security Management Market provides an overview of the current market dynamics in the Endpoint Security Management space, as well as what our survey respondents- all outsourcing decision-makers- predict the market will look like in 2029. The study breaks the market by revenue and volume (wherever applicable) and price history to estimate the size and trend analysis and identify gaps and opportunities. Some of
Revving Up Security: Automotive Endpoint Authentication
An endpoint authentication mechanism is used to verify/track the identity of external devices connected to a network, thereby ensuring the connectivity of only authorized endpoint devices. An endpoint authentication is of vital importance for networks that have flurry of remote users. The mechanism is also implemented via an endpoint authentication system, which not only verifies users but also monitors incoming connections of endpoint devices. At present, cars are equipped with
Endpoint Security Market - Need to Prevent Cyber Attacks and Threats Driving Dem …
In a recent report by Transparency Market Research (TMR), the global endpoint security market is expected to witness an intense competitive environment as the vendor landscape of the market is highly fragmented. This is because of the presence of a number of vendors on the basis of small-scale, regional, and also large multi-national scale basis. Owing to the intense environment of competition in the market, all players focus on making
Endpoint Security Management Market 2018: Emerging Industries, Size, Share, Chal …
Endpoint Security Management Market Research Report 2018 gives estimation of the factors that are boosting the development of the Endpoint Security Management market size, share, growth prospects, segments, future trends, and industry outlook, development status. The report on global endpoint security management market identifies key attributes about the customer to define the potential market and identify different needs across the industry. Get Sample Copy of this Report -https://www.orianresearch.com/request-sample/558686 Market Overview: The
Endpoint Detection and Response Market Analytical Tools are used to Identify the …
The EDR market is broadly segmented on the basis of deployment type, organization size, industry vertical and geography. On the basis of deployment type, global EDR market is segmented into on premise, managed services or hybrid deployment. On the basis of organization size, global EDR market is classified into small & medium sized enterprises (SMEs) and large enterprises. Furthermore, the major industry verticals that are benefitted by EDR solutions include