
Közeledik az év legnagyobb SolarWinds eseménye
January 19, 2022
RelNet Welcomes Pentera to Its Vendor Portfolio
February 04, 2022
Közeledik az év legnagyobb SolarWinds eseménye
January 19, 2022
RelNet Welcomes Pentera to Its Vendor Portfolio
February 04, 2022

CoSoSys Endpoint Protector – The Industry-Leading Cross-Platform DLP
CoSoSys Endpoint Protector offers an industry-leading and award-winning Data Loss Prevention solution to protect high-value sensitive data from persistent security threats posed by portable storage devices, cloud services and mobile devices.

CoSoSys and its Endpoint Protector has been recognized with many prestigious awards since 2009. These are only the more recent ones.
Endpoint Protector incorporates a portfolio of security products and features for network device control, endpoint security and data loss prevention (DLP) for Windows, Mac OS X, and Linux, as well as applications for portable storage device encryption and enhancement. Portable storage devices such as USB flash drives, smartphones, tablets and cloud services like Dropbox, Google Drive may cause severe issues when it comes to controlling data use within and outside the company. As a full DLP product, Endpoint Protector 5 prevents users from taking unauthorized data outside the company or bringing potential harmful files on storage devices. Data Loss Prevention (DLP) solution puts an end to data leaks and data theft while offering control of portable storage devices and ensuring compliance with data protection regulations. Endpoint Protector is designed to protect confidential data against insider threats while maintaining productivity and making work more convenient, and secure. The solution is an ideal choice for companies running on multi-OS networks –it has a modular format that allows them to mix and match the right tools to serve specific needs. By deploying it, organizations can safeguard personal information and meet compliance requirements for regulations such as the GDPR, HIPAA, CCPA, PCI DSS, etc. Endpoint Protector also offers protection to the company’s intellectual property and trade secrets.
Endpoint Protector Modules
Device Control, Content Aware Protection, Enforced Encryption, and eDiscovery modules are available for computers running on different Windows, macOS and Linux versions and distributions.
• Device Control – Having the possibility to control USB devices and peripheral ports activity for employees’ computers from a simple web interface simplifies IT admin tasks. Strong device use policies ensure proactive protection for a safer work environment with removable storage devices. Via a secured password, users can safely transfer confidential data and access it on any computer or only on authorized ones. Other features: Lockdown, control, and monitoring of USB and peripheral ports to stop data theft and data loss. Setting rights per device, user, computer, group or globally. • Content Aware Protection – Detailed control over sensitive data that leave computers and endpoints. Through content inspection, transfers of important company documents can be logged and reported. Based on company policy, file transfers can be allowed or blocked. Other features: Monitor and control data in motion, deciding what confidential files can or cannot leave the company. Filters can be set per file type, application, predefined and custom content, regex and more. • Enforced Encyption – Allows for IT administrators to extend their device control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted with AES 256bit encryption. Other features: Cross-platform, password-based, easy to use and very efficient. • eDiscovery – Scans sensitive data stored on endpoints. It offers the ability to setup scans based on specific file types, predefined or custom content, file name, regular expressions or HIPAA protected content. Based on scan results, remediation actions like encrypting and deleting data for data in case confidential data is identified on unauthorized computers.

Endpoint Protector’s valuation on the Gartner Peer Insights website
Deployment Flexibility
Endpoint Protector offers seamless deployment with an intuitive interface and set-up process. It fits any company's needs with multiple deployment options and integration capabilities, and expert support and assistance throughout the deployment process. CoSoSys products are enterprise-grade and continually evolving to best serve any type of network and industry. With a client-server architecture, they are easy to deploy and are centrally managed from the web-based interface. Besides the virtual appliance, the server can be hosted by us and in major cloud infrastructures like Amazon Web Services, Microsoft Azure or Google Cloud. Multiple deployment options: • Virtual appliance – Available in VMX, PVA, OVF, OVA, XVA and VHD formats, being compatible with the most popular virtualization tools.• Cloud services – Available for deployment in the following cloud services: Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform (GCP).
• SaaS – Reduce deployment complexity & cost. Focus more resources on identifying and mitigating risks to your sensitive data and less on maintaining the infrastructure.
Recources
Endpoint Protector.comGartner Peer Insights – Endpoint Protector Reviews
Endpoint Protector – Award Winning Data Loss Prevention

