openPR Logo
Press release

Endpoint Protector adds Content Aware Protection to Prevent Data Leaks to the Cloud

05-21-2012 06:55 PM CET | IT, New Media & Software

Press release from: CoSoSys Ltd.

Endpoint Protector adds Content Aware Protection to Prevent

Data Loss Prevention (DLP) for cloud services like Google Drive, Dropbox and Co. is now part of Endpoint Protector 4.1

Bucharest, Romania, 15. May 2012: Company data security is under threat more than ever with cloud services such as Google Drive, Dropbox and iCloud finding their way on company PCs. Endpoints such as USB ports, CD/DVD drives, printers etc. are no longer the only concern when it comes to stopping leaks of sensitive data. The Internet and the cloud poses an even greater security threat by allowing an easy transfer of data through file upload services, e-mail, instant messaging applications and other types of applications. On top of these are the currently expanding cloud services, which bring new security risks for companies worldwide. To prevent data loss for businesses via the cloud and at the endpoint, CoSoSys announces today the availability of the latest Endpoint Protector 4.1 version as a customer preview with an advanced Content Aware Protection feature available for its Windows Endpoint Protector Client.

The new version offers IT departments advanced security features to minimize all risks of losing valuable files to the cloud or of exposing them to data theft or data leaks. Having the ability to inspect in depth data on the Client PC endpoint before it leaves the network, Endpoint Protector lets IT departments know at all times where, how and who in their network is trying to copy or move sensible information outside the company and take action by enforcing policies to either stop data before leaving the network or to simply monitor all data in motion, all this offering a valuable insight to employee and insider intentions.

“The increased use of cloud services to help share valuable business data without limits, has not only improved efficiency, but at the same time led to hard to detect data leakage threats, making data sharing over the cloud today’s IT security matter”, says CoSoSys CEO Roman Foeckl.
“Taking action at the endpoint is the most effective way to a full data loss prevention strategy. Trying to stop data on the gateway is usually already a step to late since data has been encrypted by the specific application or service that accesses it and cannot be inspected anymore at this point for sensible content violations. Therefore DLP has to happen at the endpoint.”

As more and more cloud services are adding additional security risks to company data, the Content Aware Protection feature in Endpoint Protector allows data to be flagged as sensible based on each company’s own defined policies that can be enforced for regulated data such as Credit Card Numbers or Personal Identifiable Information like Social Security Numbers or on keywords and even for certain file types. Content Aware Protection monitors all data use and easily identifies users trying to move data away from their laptop or workstation out of the network via:

- Cloud services (Google Drive, Dropbox, iCloud, SugarSync, etc.), or
- Applications such as E-mail clients (Outlook, Thunderbird, etc.), Instant Messaging (Skype, Yahoo Messenger, etc.), Web browsers (Internet Explorer, Firefox, etc.) or
- Removable devices like USB Flash Drives or external hard drives

Endpoint Protector 4.1 with Content Aware Protection module is available as Hardware or Virtual Appliance. The data and device security solution ensures a complete and proactive protection against both inside and outside threats for organizations in an easy, but highly efficient manner with seamless integration and easy administration through its intuitive to use web-based interface.

About CoSoSys
CoSoSys is specialized in data loss prevention (DLP), device control and endpoint security for Windows, Mac and Linux endpoints and development of applications for portable storage device enhancement. The application portfolio includes functions from data leak prevention, device control, file tracing and shadowing, password security, data synchronization and network security. CoSoSys distributes its products globally through Distributors, Resellers and directly to users at http://www.EndpointProtector.com. CoSoSys is an independent software developer since a management buyout from Astaro in July 2011. CoSoSys enjoys a continuously growing installation base of users worldwide and was recognized in 2011 as one of the fastest growing technology companies being a winner of the 2011 Deloitte Technology FAST 50 ranking for Central Europe. The company has offices in Germany, the United States and Romania.

Company name: CoSoSys Ltd.
Address: str. Haiducului, nr. 6, 400040, Cluj-Napoca, Romania

Press Contacts:
CoSoSys Ltd.
Anca Goron
Phone: +40 264 593 110 Ext. 113
E-mail: anca.goron@cososys.com

Mirror Communications
Alina Popescu
Phone: +40 741 073753
E-mail: alina@mirror-communications.com

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release Endpoint Protector adds Content Aware Protection to Prevent Data Leaks to the Cloud here

News-ID: 221537 • Views:

More Releases from CoSoSys Ltd.

Endpoint Protector 4 named Best DLP Solution Finalist in the SC Awards Europe 2013
Endpoint Protector 4 named Best DLP Solution Finalist in the SC Awards Europe 20 …
Our Data Loss Prevention Solution Endpoint Protector 4 has made the shortlist in the Best DLP Solution category Cluj-Napoca, Romania, February 18th, 2013. With competitive companies entering and strict judging criteria, SC Awards Europe honors the most innovative security technologies. CoSoSys announces proudly that Endpoint Protector 4, its Data Loss Prevention, Device Control and Mobile Device Management solution has been named Finalist in the run for the selection of the Best
Thunderbolt and USB 3.0 ports: two more reasons for companies to use Device Control and DLP solutions for Mac OS X to prevent data loss
Thunderbolt and USB 3.0 ports: two more reasons for companies to use Device Cont …
Support for Thunderbolt and USB 3.0 ports against data theft and data leakage through portable storage devices is essential to protect company data is now available with Endpoint Protector 4 for Mac OS X Cluj-Napoca, Romania, January 24th, 2013. While the number of companies incorporating more and more Macs into their networks is increasing, the need for protecting these computers against data leakage and data theft is rising. Especially since all
Endpoint Protector, Winner in the 2012 Mobile Star Awards™
Endpoint Protector, Winner in the 2012 Mobile Star Awards™
Endpoint Protector named “Superstar” for the category Enterprise Solutions: Security and “Shining Star” for Enterprise Solutions: Mobile Device Management category in the 2012 Mobile Star Awards™! Bucharest, Romania, December 20, 2012. CoSoSys is proud to announce that its innovative Data Loss Prevention, Device Control and Mobile Device Management solution, Endpoint Protector, has been named winner in the 11th Annual Mobile Star Awards™ program, organized by the mobile technology news and events

More Releases for Endpoint

Unified Endpoint Management Market: Unified Endpoint Management to Surge to USD …
Unified Endpoint Management Market Scope: Key Insights : Unified Endpoint Management Market size was valued at USD 6.36 Billion in 2022 and is poised to grow from USD 8.41 Billion in 2023 to USD 78.43 billion by 2031, at a CAGR of 32.2% during the forecast period (2024-2031). Discover Your Competitive Edge with a Free Sample Report :https://www.skyquestt.com/sample-request/unified-endpoint-management-market Access the full 2024 Market report for a comprehensive understanding @https://www.skyquestt.com/report/unified-endpoint-management-market In-Depth Exploration of the
Endpoint Security Management Market: Ready To Fly on high Growth Trends | Avast, …
The Latest published market study on Endpoint Security Management Market provides an overview of the current market dynamics in the Endpoint Security Management space, as well as what our survey respondents- all outsourcing decision-makers- predict the market will look like in 2029. The study breaks the market by revenue and volume (wherever applicable) and price history to estimate the size and trend analysis and identify gaps and opportunities. Some of
Revving Up Security: Automotive Endpoint Authentication
An endpoint authentication mechanism is used to verify/track the identity of external devices connected to a network, thereby ensuring the connectivity of only authorized endpoint devices. An endpoint authentication is of vital importance for networks that have flurry of remote users. The mechanism is also implemented via an endpoint authentication system, which not only verifies users but also monitors incoming connections of endpoint devices. At present, cars are equipped with
Endpoint Security Market - Need to Prevent Cyber Attacks and Threats Driving Dem …
In a recent report by Transparency Market Research (TMR), the global endpoint security market is expected to witness an intense competitive environment as the vendor landscape of the market is highly fragmented. This is because of the presence of a number of vendors on the basis of small-scale, regional, and also large multi-national scale basis. Owing to the intense environment of competition in the market, all players focus on making
Endpoint Security Management Market 2018: Emerging Industries, Size, Share, Chal …
Endpoint Security Management Market Research Report 2018 gives estimation of the factors that are boosting the development of the Endpoint Security Management market size, share, growth prospects, segments, future trends, and industry outlook, development status. The report on global endpoint security management market identifies key attributes about the customer to define the potential market and identify different needs across the industry. Get Sample Copy of this Report -https://www.orianresearch.com/request-sample/558686 Market Overview: The
Endpoint Detection and Response Market Analytical Tools are used to Identify the …
The EDR market is broadly segmented on the basis of deployment type, organization size, industry vertical and geography. On the basis of deployment type, global EDR market is segmented into on premise, managed services or hybrid deployment. On the basis of organization size, global EDR market is classified into small & medium sized enterprises (SMEs) and large enterprises. Furthermore, the major industry verticals that are benefitted by EDR solutions include