Press release
Endpoint Protector 2008™
World’s First Endpoint Security and DLP Solution Addressing Wireless USB Security IssuesNew CoSoSys solution provides efficient Data Loss Prevention (DLP), addressing data theft and other forms of data leakage. With increased security and file tracing capabilities all data transfers in connection with portable devices are monitored and controlled
Bucharest/San Jose, February 12th, 2008 – Companies are facing new IT security challenges arising from the introduction of the Wireless USB standard for data transfer that comes without both the requirements and limitations of traditional wired USB connectivity.
Wireless USB connectivity on new notebooks, desktops and other portable devices increases the risk of data leakage through uncontrolled Wireless USB data transfers. Within seconds data can be transferred and stolen if efficient security measures are not in place to protect against such threats.
The new Endpoint Protector 2008 efficiently protects PCs from data loss, data theft and other forms of data leakage. Endpoint Protector allows the controlled use of USB devices, external hard drives, FireWire devices, CD/DVD-Readers/Writers and many other potentially harmful devices, with the goal of stopping malware, viruses and other unwanted data intrusions.
Endpoint Protector 2008 also monitors and records all data transferred to and from portable storage devices. This new feature gives IT administrators the possibility to trace all data activity regarding removable storage and endpoint devices. This file tracing option allows the prevention of possible data breaches or of data being copied without authorization.
In case of data deletion before or after transferring it to and from portable devices a copy of the data is stored onto a network storage server. The information stream at the network’s endpoints is thoroughly recorded, thus supporting audits of data flow and controlling the impact of data leakage. Furthermore, this set of features enables companies to better comply with government regulations, as well as with standards currently being discussed and pending implementation in what security responsibility, data breach management and IT governance is concerned.
The improved administrative and reporting tool with the completely redesigned dashboard is giving a starting point to provide timely and accurate reports and analysis, meeting the reporting needs of both management and IT security staff.
Endpoint Protector 2008 also introduces the TrustedDevice concept, giving IT Security Officers the additional possibility of enforced encryption of data that is put in transit on previously authorized portable storage devices. In the event that a device is lost or stolen, this enforcement makes sure all data stored on it is encrypted and therefore not accessible to other parties.
Endpoint Protector 2008 will effectively secure all PCs running Windows Vista, Windows XP and Windows 2000. The new version of Endpoint Protector Server 2008 is available for Windows 2003 Server with IIS and Microsoft SQL 2005 as database. Alternatively, the new Endpoint Protector Server can be installed on a Linux Debian platform with Apache web server and MySQL as database. The objective of supporting both server platforms is to provide a fast and seamless integration into an existing network infrastructure of SMBs or enterprises.
Press contact:
CoSoSys SRL
Edina Szasz
RO 400036 Cluj-Napoca
Tel: +40-264-593 110
Fax: +40-264-593 113
E-mail: edina.szasz@cososys.com
About CoSoSys
CoSoSys SRL specializes in network endpoint security and software development for portable storage device enhancement. The application portfolio includes functions from encryption, biometric security, data synchronization and network security. CoSoSys distributes its products globally through world’s leading hardware manufacturers, software Distributors, Resellers and directly to users at www.cososys.com. CoSoSys enjoys a continuously growing installation base of users worldwide. The company is headquartered in Cluj-Napoca, Romania and has sales representatives in the United States, Germany and Asia.
This release was published on openPR.
Permanent link to this press release:
Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.
You can edit or delete your press release Endpoint Protector 2008™ here
News-ID: 37409 • Views: …
More Releases from CoSoSys

New AutoRun Disable Tool Protects Computers against USB-spreading Malware
Free tool released by Endpoint Protector prevents AutoRun-based malware spread through USB ports and other connections from infecting computers and networks
Boise, ID, USA and Bucharest, Romania, November 17th, 2010. Endpoint Protector launched the free AutoRun Disable tool, a solution designed to prevent malware infections spread through USB ports and other computer interfaces and which require the malicious software to start and run automatically once connected to the infected unit. AutoRun…

World’s First Device Control and Endpoint Security Hardware Appliance
CoSoSys’ Endpoint Protector Hardware Appliance provides out of the box data loss protection and device control
Boise, ID, USA, Bucharest, Romania, October 27, 2010. CoSoSys launches today the first hardware appliance in the world to provide out of the box device control and data security for Windows and Mac called the Endpoint Protector Hardware Appliance. Designed for companies of all sizes, with computer networks ranging from 50 to over…
CoSoSys Launches My Endpoint Protector App for iPhone and iPad
Prevent data loss, identity and data theft and manage portable device use on the go with the new My Endpoint Protector App
Eagle, ID and Bucharest, Romania, August 5, 2010 - Focusing on adapting their endpoint security and data loss prevention cloud services to the lifestyle of modern businessmen and gadget-loving home users, CoSoSys has just released the new My Endpoint Protector App for iPhone, iPad and iPod touch. The…
More Releases for Endpoint
Unified Endpoint Management Market: Unified Endpoint Management to Surge to USD …
Unified Endpoint Management Market Scope:
Key Insights : Unified Endpoint Management Market size was valued at USD 6.36 Billion in 2022 and is poised to grow from USD 8.41 Billion in 2023 to USD 78.43 billion by 2031, at a CAGR of 32.2% during the forecast period (2024-2031).
Discover Your Competitive Edge with a Free Sample Report :https://www.skyquestt.com/sample-request/unified-endpoint-management-market
Access the full 2024 Market report for a comprehensive understanding @https://www.skyquestt.com/report/unified-endpoint-management-market
In-Depth Exploration of the…
Endpoint Security Management Market: Ready To Fly on high Growth Trends | Avast, …
The Latest published market study on Endpoint Security Management Market provides an overview of the current market dynamics in the Endpoint Security Management space, as well as what our survey respondents- all outsourcing decision-makers- predict the market will look like in 2029. The study breaks the market by revenue and volume (wherever applicable) and price history to estimate the size and trend analysis and identify gaps and opportunities. Some of…
Revving Up Security: Automotive Endpoint Authentication
An endpoint authentication mechanism is used to verify/track the identity of external devices connected to a network, thereby ensuring the connectivity of only authorized endpoint devices. An endpoint authentication is of vital importance for networks that have flurry of remote users. The mechanism is also implemented via an endpoint authentication system, which not only verifies users but also monitors incoming connections of endpoint devices. At present, cars are equipped with…
Endpoint Security Market - Need to Prevent Cyber Attacks and Threats Driving Dem …
In a recent report by Transparency Market Research (TMR), the global endpoint security market is expected to witness an intense competitive environment as the vendor landscape of the market is highly fragmented. This is because of the presence of a number of vendors on the basis of small-scale, regional, and also large multi-national scale basis. Owing to the intense environment of competition in the market, all players focus on making…
Endpoint Security Management Market 2018: Emerging Industries, Size, Share, Chal …
Endpoint Security Management Market Research Report 2018 gives estimation of the factors that are boosting the development of the Endpoint Security Management market size, share, growth prospects, segments, future trends, and industry outlook, development status. The report on global endpoint security management market identifies key attributes about the customer to define the potential market and identify different needs across the industry.
Get Sample Copy of this Report -https://www.orianresearch.com/request-sample/558686
Market Overview: The…
Endpoint Detection and Response Market Analytical Tools are used to Identify the …
The EDR market is broadly segmented on the basis of deployment type, organization size, industry vertical and geography. On the basis of deployment type, global EDR market is segmented into on premise, managed services or hybrid deployment.
On the basis of organization size, global EDR market is classified into small & medium sized enterprises (SMEs) and large enterprises.
Furthermore, the major industry verticals that are benefitted by EDR solutions include…