Press release
Endpoint Protector 2009: Enhanced Data Protection to Keep Business Networks Safe
CoSoSys releases the latest version of its endpoint security solution for Data Loss Prevention and Device Control, Endpoint Protector 2009, focusing on enhanced protection and high productivityBucharest, Romania, March 17, 2009. CoSoSys, vendor of the most innovative and effective applications for endpoint security and portable storage devices, launches today the latest version of its DLP (Data loss Prevention) and Device Control solution, Endpoint Protector 2009. The current business environment harbors risks that companies of all sizes must permanently face, from disgruntled terminated employees that take confidential data when they leave, to accidents exposing the private details of their entire customer base and to malicious attempts to breach security for a quick gain. This best-of-breed endpoint security and DLP application aims to help companies stay clear of such threats and concentrate on strengthening and growing their business instead.
The new Endpoint Protector version is the first solution of its class to offer increased control over sensitive data through the File Whitelisting feature. This functionality allows companies to decide which files can be copied to portable devices and which files are restricted, while keeping a record of all attempted file transfers. The increased protection also comes with the newly introduced Lockdown Mode, a feature designed to stop potential ongoing security breaches by immediately blocking all the endpoints in your network and stopping all data transfers and devices in use.
Endpoint Protector 2009 also focuses on helping companies save time and increase productivity by making daily tasks easier for both system administrators and PC users in their staff. The solution comes with a new and improved web-based administration tool, more intuitive and with a multilingual interface that is currently available in five languages (English, German, French, Romanian and Hungarian). Daily administration activities are also aided by the wizard introduced to easily manage devices within a network and the System Snapshots that record previous configuration sets for seamless roll backs to previous policies.
To help non-technical employees stay mobile and productive, Endpoint Protector 2009 offers a wider range of controlled portable devices, from iPods, cameras and USB sticks to ExpressCard SDD and printers. It also comes with faster and more efficient Active Directory synchronization and additional protection in networks where employees have administrative privileges on their PCs making it extremely difficult for them to delete the application from their PC or laptop.
“Our main goal is to keep providing businesses of all sizes with the freedom not to restrict the usage of portable storage devices altogether, while keeping a close track over potential abuse and effectively preventing all potential data breaches. This way, companies can use increased portability and mobility to their advantage, without having to pay an extremely high price for not securing them beforehand,” explains Roman Foeckl, CoSoSys CEO.
Endpoint Protector 2009 is designed to minimize internal threats, reduce the data leakage risks and control devices connected at endpoints. It allows IT departments to proactively take control of the device internal use, while tracking all data transferred in or out of the protected network and enforcing encryption of the data in transit on portable devices. The new Endpoint Protector version is available as a free 30 day trial or online demo at http://www.EndpointProtector.com.
About CoSoSys
CoSoSys is specialized in network endpoint security and development of software for portable storage device enhancement. The application portfolio includes functions from password security, data synchronization and network security. CoSoSys distributes its products globally through the world’s leading hardware manufacturers, software Distributors, Resellers and directly to users at http://www.CoSoSys.com and http://www.EndpointProtector.com. CoSoSys enjoys a continuously growing installation base of users worldwide. The company has offices in Germany, the United States and Romania.
To request a 30 day free evaluation version of Endpoint Protector please visit:
http://www.endpointprotector.com/en/index.php/products/endpoint_protector
Images and additional materials
http://www.cososys.com/press_room.html
http://www.cososys.com/images.html
Press Contacts:
Mirror Communications
Alina Popescu
Tel: +40 37 2975 796
Mob: +40 740 73753
E-mail: alina@mirror-communications.com
CoSoSys Ltd.
Paula Braun
400036 Cluj-Napoca
Romania
Tel: +40 264 593 110
Fax: +40 264 593 113
E-mail: paula.braun@cososys.com
This release was published on openPR.
Permanent link to this press release:
Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.
You can edit or delete your press release Endpoint Protector 2009: Enhanced Data Protection to Keep Business Networks Safe here
News-ID: 72264 • Views: …
More Releases from CoSoSys

New AutoRun Disable Tool Protects Computers against USB-spreading Malware
Free tool released by Endpoint Protector prevents AutoRun-based malware spread through USB ports and other connections from infecting computers and networks
Boise, ID, USA and Bucharest, Romania, November 17th, 2010. Endpoint Protector launched the free AutoRun Disable tool, a solution designed to prevent malware infections spread through USB ports and other computer interfaces and which require the malicious software to start and run automatically once connected to the infected unit. AutoRun…

World’s First Device Control and Endpoint Security Hardware Appliance
CoSoSys’ Endpoint Protector Hardware Appliance provides out of the box data loss protection and device control
Boise, ID, USA, Bucharest, Romania, October 27, 2010. CoSoSys launches today the first hardware appliance in the world to provide out of the box device control and data security for Windows and Mac called the Endpoint Protector Hardware Appliance. Designed for companies of all sizes, with computer networks ranging from 50 to over…
CoSoSys Launches My Endpoint Protector App for iPhone and iPad
Prevent data loss, identity and data theft and manage portable device use on the go with the new My Endpoint Protector App
Eagle, ID and Bucharest, Romania, August 5, 2010 - Focusing on adapting their endpoint security and data loss prevention cloud services to the lifestyle of modern businessmen and gadget-loving home users, CoSoSys has just released the new My Endpoint Protector App for iPhone, iPad and iPod touch. The…
More Releases for Endpoint
Unified Endpoint Management Market: Unified Endpoint Management to Surge to USD …
Unified Endpoint Management Market Scope:
Key Insights : Unified Endpoint Management Market size was valued at USD 6.36 Billion in 2022 and is poised to grow from USD 8.41 Billion in 2023 to USD 78.43 billion by 2031, at a CAGR of 32.2% during the forecast period (2024-2031).
Discover Your Competitive Edge with a Free Sample Report :https://www.skyquestt.com/sample-request/unified-endpoint-management-market
Access the full 2024 Market report for a comprehensive understanding @https://www.skyquestt.com/report/unified-endpoint-management-market
In-Depth Exploration of the…
Endpoint Security Management Market: Ready To Fly on high Growth Trends | Avast, …
The Latest published market study on Endpoint Security Management Market provides an overview of the current market dynamics in the Endpoint Security Management space, as well as what our survey respondents- all outsourcing decision-makers- predict the market will look like in 2029. The study breaks the market by revenue and volume (wherever applicable) and price history to estimate the size and trend analysis and identify gaps and opportunities. Some of…
Revving Up Security: Automotive Endpoint Authentication
An endpoint authentication mechanism is used to verify/track the identity of external devices connected to a network, thereby ensuring the connectivity of only authorized endpoint devices. An endpoint authentication is of vital importance for networks that have flurry of remote users. The mechanism is also implemented via an endpoint authentication system, which not only verifies users but also monitors incoming connections of endpoint devices. At present, cars are equipped with…
Endpoint Security Market - Need to Prevent Cyber Attacks and Threats Driving Dem …
In a recent report by Transparency Market Research (TMR), the global endpoint security market is expected to witness an intense competitive environment as the vendor landscape of the market is highly fragmented. This is because of the presence of a number of vendors on the basis of small-scale, regional, and also large multi-national scale basis. Owing to the intense environment of competition in the market, all players focus on making…
Endpoint Security Management Market 2018: Emerging Industries, Size, Share, Chal …
Endpoint Security Management Market Research Report 2018 gives estimation of the factors that are boosting the development of the Endpoint Security Management market size, share, growth prospects, segments, future trends, and industry outlook, development status. The report on global endpoint security management market identifies key attributes about the customer to define the potential market and identify different needs across the industry.
Get Sample Copy of this Report -https://www.orianresearch.com/request-sample/558686
Market Overview: The…
Endpoint Detection and Response Market Analytical Tools are used to Identify the …
The EDR market is broadly segmented on the basis of deployment type, organization size, industry vertical and geography. On the basis of deployment type, global EDR market is segmented into on premise, managed services or hybrid deployment.
On the basis of organization size, global EDR market is classified into small & medium sized enterprises (SMEs) and large enterprises.
Furthermore, the major industry verticals that are benefitted by EDR solutions include…