Press release
Security Red Alert: Trendy Netbooks Harbour Real Data Breach Risks
CoSoSys warns about the high threat level that netbooks usage implies for companies and individualsBucharest, January 22, 2009. CoSoSys, vendor of the most innovative and effective applications for portable storage devices and endpoint security solutions, had identified the high risks embedded in this past holiday season’s most popular gift, the netbooks. Affordable netbooks have made their way into our homes and they are now making their way into most corporate offices as secondary PCs as well. With their seamless connectivity and increasingly large solid state disks (SSD) or traditional HDD capacities, netbooks are becoming an easy tool to unintentionally leak company data or to intentionally steal it.
Netbooks can be a useful tool when it comes to increasing productivity, ease of work and employee motivation but they need to be integrated in the company networks proactively and comply with the company’s existing endpoint security measures. Although Netbooks do not include an optical drive such as a CD or DVD drive, their quick and easy connectivity through wireless networks, USB Ports, SD Card readers and other ports pose a substantial threat and make it easy to transfer unauthorized data.
“Corporate IT departments needs to consider Netbooks as a serious issue when it comes to Endpoint Security and they are advised to take control over them as they enter their networks rather than waiting for the first data breaches to happen. Enforcing Endpoint Security policies with Endpoint Protector allows IT administrators to fully control all ports and data transfers from endpoints, including Netbooks, to any other portable device such as USB Flash Drives or External HDDs to prevent data loss” said Roman Foeckl, CoSoSys CEO.
Endpoint Protector is a best-of-breed DLP (Data Loss Prevention) technology, combined with the flexibility of a web management console that reduces the total cost of ownership and significantly lowers implementation time and data leakage risk. It allows IT departments to proactively take control of the device internal use, while tracking all data transferred in or out of the protected network and enforcing encryption of data in transit on portable devices. As the Endpoint Protector solution runs on both Linux and Windows based servers, it allows network administrators to prevent all threats embedded in portable and lifestyle devices, while allowing them to make use of existing IT infrastructure. Endpoint Protector is available as a free 30 day trial or online demo at www.endpointprotector.com.
About CoSoSys
CoSoSys SRL is specialized in network endpoint security and the development of software for portable storage device enhancement. The application portfolio includes functions from password security, data synchronization and network security. CoSoSys distributes its products globally through world’s leading hardware manufacturers, software Distributors, Resellers and directly to users at www.cososys.com and www.endpointprotector.com. CoSoSys enjoys a continuously growing installation base of users worldwide. The company is headquartered in Cluj-Napoca, Romania and has sales representatives in the United States and Germany.
Images and additional materials:
http://www.cososys.com/press_room.html
http://www.cososys.com/images.html
CoSoSys Press contact:
CoSoSys Ltd.
Paula Braun
400036 Cluj-Napoca
Romania
Tel: +40 264 593 110
Fax: +40 264 593 113
E-mail: paula.braun@cososys.com
This release was published on openPR.
Permanent link to this press release:
Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.
You can edit or delete your press release Security Red Alert: Trendy Netbooks Harbour Real Data Breach Risks here
News-ID: 65717 • Views: …
More Releases from CoSoSys

New AutoRun Disable Tool Protects Computers against USB-spreading Malware
Free tool released by Endpoint Protector prevents AutoRun-based malware spread through USB ports and other connections from infecting computers and networks
Boise, ID, USA and Bucharest, Romania, November 17th, 2010. Endpoint Protector launched the free AutoRun Disable tool, a solution designed to prevent malware infections spread through USB ports and other computer interfaces and which require the malicious software to start and run automatically once connected to the infected unit. AutoRun…

World’s First Device Control and Endpoint Security Hardware Appliance
CoSoSys’ Endpoint Protector Hardware Appliance provides out of the box data loss protection and device control
Boise, ID, USA, Bucharest, Romania, October 27, 2010. CoSoSys launches today the first hardware appliance in the world to provide out of the box device control and data security for Windows and Mac called the Endpoint Protector Hardware Appliance. Designed for companies of all sizes, with computer networks ranging from 50 to over…
CoSoSys Launches My Endpoint Protector App for iPhone and iPad
Prevent data loss, identity and data theft and manage portable device use on the go with the new My Endpoint Protector App
Eagle, ID and Bucharest, Romania, August 5, 2010 - Focusing on adapting their endpoint security and data loss prevention cloud services to the lifestyle of modern businessmen and gadget-loving home users, CoSoSys has just released the new My Endpoint Protector App for iPhone, iPad and iPod touch. The…
More Releases for Endpoint
Unified Endpoint Management Market: Unified Endpoint Management to Surge to USD …
Unified Endpoint Management Market Scope:
Key Insights : Unified Endpoint Management Market size was valued at USD 6.36 Billion in 2022 and is poised to grow from USD 8.41 Billion in 2023 to USD 78.43 billion by 2031, at a CAGR of 32.2% during the forecast period (2024-2031).
Discover Your Competitive Edge with a Free Sample Report :https://www.skyquestt.com/sample-request/unified-endpoint-management-market
Access the full 2024 Market report for a comprehensive understanding @https://www.skyquestt.com/report/unified-endpoint-management-market
In-Depth Exploration of the…
Endpoint Security Management Market: Ready To Fly on high Growth Trends | Avast, …
The Latest published market study on Endpoint Security Management Market provides an overview of the current market dynamics in the Endpoint Security Management space, as well as what our survey respondents- all outsourcing decision-makers- predict the market will look like in 2029. The study breaks the market by revenue and volume (wherever applicable) and price history to estimate the size and trend analysis and identify gaps and opportunities. Some of…
Revving Up Security: Automotive Endpoint Authentication
An endpoint authentication mechanism is used to verify/track the identity of external devices connected to a network, thereby ensuring the connectivity of only authorized endpoint devices. An endpoint authentication is of vital importance for networks that have flurry of remote users. The mechanism is also implemented via an endpoint authentication system, which not only verifies users but also monitors incoming connections of endpoint devices. At present, cars are equipped with…
Endpoint Security Market - Need to Prevent Cyber Attacks and Threats Driving Dem …
In a recent report by Transparency Market Research (TMR), the global endpoint security market is expected to witness an intense competitive environment as the vendor landscape of the market is highly fragmented. This is because of the presence of a number of vendors on the basis of small-scale, regional, and also large multi-national scale basis. Owing to the intense environment of competition in the market, all players focus on making…
Endpoint Security Management Market 2018: Emerging Industries, Size, Share, Chal …
Endpoint Security Management Market Research Report 2018 gives estimation of the factors that are boosting the development of the Endpoint Security Management market size, share, growth prospects, segments, future trends, and industry outlook, development status. The report on global endpoint security management market identifies key attributes about the customer to define the potential market and identify different needs across the industry.
Get Sample Copy of this Report -https://www.orianresearch.com/request-sample/558686
Market Overview: The…
Endpoint Detection and Response Market Analytical Tools are used to Identify the …
The EDR market is broadly segmented on the basis of deployment type, organization size, industry vertical and geography. On the basis of deployment type, global EDR market is segmented into on premise, managed services or hybrid deployment.
On the basis of organization size, global EDR market is classified into small & medium sized enterprises (SMEs) and large enterprises.
Furthermore, the major industry verticals that are benefitted by EDR solutions include…