{"id":20212,"date":"2022-01-31T10:13:02","date_gmt":"2022-01-31T09:13:02","guid":{"rendered":"https:\/\/relnet.hu\/?p=20212"},"modified":"2022-01-31T10:37:25","modified_gmt":"2022-01-31T09:37:25","slug":"cososys-endpoint-protector-the-industry-leading-cross-platform-dlp","status":"publish","type":"post","link":"https:\/\/relnet.hu\/en\/cososys-endpoint-protector-the-industry-leading-cross-platform-dlp\/","title":{"rendered":"CoSoSys Endpoint Protector \u2013 The Industry-Leading Cross-Platform DLP"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/relnet.hu\/wp-content\/uploads\/2022\/01\/Awards.png\" alt=\"Awards\" \/><br \/>\ncenter<br \/>\nCoSoSys and its Endpoint Protector has been recognized with many prestigious awards since 2009. These are only the more recent ones.<br \/>\nrn-kep-kepala<\/p>\n<p>Endpoint Protector incorporates a portfolio of security products and features for network device control, endpoint security and data loss prevention (DLP) for Windows, Mac OS X, and Linux, as well as applications for portable storage device encryption and enhancement.<\/p>\n<p>Portable storage devices such as USB flash drives, smartphones, tablets and cloud services like Dropbox, Google Drive may cause severe issues when it comes to controlling data use within and outside the company. As a full DLP product, Endpoint Protector 5 prevents users from taking unauthorized data outside the company or bringing potential harmful files on storage devices.<\/p>\n<p>Data Loss Prevention (DLP) solution puts an end to data leaks and data theft while offering control of portable storage devices and ensuring compliance with data protection regulations. Endpoint Protector is designed to protect confidential data against insider threats while maintaining productivity and making work more convenient, and secure. The solution is an ideal choice for companies running on multi-OS networks \u2013it has a modular format that allows them to mix and match the right tools to serve specific needs.<\/p>\n<p>By deploying it, organizations can safeguard personal information and meet compliance requirements for regulations such as the GDPR, HIPAA, CCPA, PCI DSS, etc. Endpoint Protector also offers protection to the company\u2019s intellectual property and trade secrets.<\/p>\n<h5>Endpoint Protector Modules<\/h5>\n<p>Device Control, Content Aware Protection, Enforced Encryption, and eDiscovery modules are available for computers running on different Windows, macOS and Linux versions and distributions.<br \/>\njustify<br \/>\nno-repeat;left top;;<br \/>\nauto<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/relnet.hu\/wp-content\/uploads\/2022\/01\/Modules.png\" alt=\"Modules\" \/><br \/>\ncenter<br \/>\nrn-kep-kepala<\/p>\n<p>\u2022 Device Control \u2013 Having the possibility to control USB devices and peripheral ports activity for employees\u2019 computers from a simple web interface simplifies IT admin tasks. Strong device use policies ensure proactive protection for a safer work environment with removable storage devices. Via a secured password, users can safely transfer confidential data and access it on any computer or only on authorized ones. Other features: Lockdown, control, and monitoring of USB and peripheral ports to stop data theft and data loss. Setting rights per device, user, computer, group or globally.<\/p>\n<p>\u2022 Content Aware Protection \u2013 Detailed control over sensitive data that leave computers and endpoints. Through content inspection, transfers of important company documents can be logged and reported. Based on company policy, file transfers can be allowed or blocked. Other features: Monitor and control data in motion, deciding what confidential files can or cannot leave the company. Filters can be set per file type, application, predefined and custom content, regex and more.<\/p>\n<p>\u2022 Enforced Encyption \u2013 Allows for IT administrators to extend their device control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted with AES 256bit encryption. Other features: Cross-platform, password-based, easy to use and very efficient.<\/p>\n<p>\u2022 eDiscovery \u2013 Scans sensitive data stored on endpoints. It offers the ability to setup scans based on specific file types, predefined or custom content, file name, regular expressions or HIPAA protected content. Based on scan results, remediation actions like encrypting and deleting data for data in case confidential data is identified on unauthorized computers.<br \/>\njustify<br \/>\nno-repeat;left top;;<br \/>\nauto<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/relnet.hu\/wp-content\/uploads\/2022\/01\/Gartner_Peer_Reviews.png\" alt=\"Gartner_Peer_Reviews\" \/><br \/>\ncenter<br \/>\nEndpoint Protector\u2019s valuation on the Gartner Peer Insights website<br \/>\nrn-kep-kepala<\/p>\n<h5>Deployment Flexibility<\/h5>\n<p>Endpoint Protector offers seamless deployment with an intuitive interface and set-up process. It fits any company\\&#8217;s needs with multiple deployment options and integration capabilities, and expert support and assistance throughout the deployment process. CoSoSys products are enterprise-grade and continually evolving to best serve any type of network and industry. With a client-server architecture, they are easy to deploy and are centrally managed from the web-based interface. Besides the virtual appliance, the server can be hosted by us and in major cloud infrastructures like Amazon Web Services, Microsoft Azure or Google Cloud.<\/p>\n<p>Multiple deployment options:<\/p>\n<p>\u2022 Virtual appliance \u2013 Available in VMX, PVA, OVF, OVA, XVA and VHD formats, being compatible with the most popular virtualization tools.<\/p>\n<p>\u2022 Cloud services \u2013 Available for deployment in the following cloud services: Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform (GCP).<\/p>\n<p>\u2022 SaaS \u2013 Reduce deployment complexity &amp; cost. Focus more resources on identifying and mitigating risks to your sensitive data and less on maintaining the infrastructure.<\/p>\n<h5>Recources<\/h5>\n<p><a href=\"https:\/\/www.endpointprotector.com\/\" target=\"_blank\" rel=\"noopener\">Endpoint Protector.com<\/a><\/p>\n<p><a href=\"https:\/\/www.gartner.com\/reviews\/market\/enterprise-data-loss-prevention\/vendor\/cososys\/product\/endpoint-protector\" target=\"_blank\" rel=\"noopener\">Gartner Peer Insights \u2013 Endpoint Protector Reviews<\/a><\/p>\n<p><a href=\"https:\/\/www.emtdist.com\/endpoint-protector\/\" target=\"_blank\" rel=\"noopener\">Endpoint Protector \u2013 Award Winning Data Loss Prevention<\/a><br \/>\njustify<br \/>\nno-repeat;left top;;<br \/>\nauto<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CoSoSys Endpoint Protector offers an industry-leading and award-winning Data Loss Prevention solution to protect high-value sensitive data from persistent security threats posed by portable storage devices, cloud services and mobile devices.<\/p>\n","protected":false},"author":1086,"featured_media":20218,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[633],"tags":[1251,640,1933,263,1258],"yst_prominent_words":[],"class_list":["post-20212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cososys-en","tag-cososys-en","tag-data-security","tag-dlp-en","tag-endpoint-protection-en","tag-endpoint-protector-en"],"_links":{"self":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/posts\/20212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/users\/1086"}],"replies":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/comments?post=20212"}],"version-history":[{"count":3,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/posts\/20212\/revisions"}],"predecessor-version":[{"id":20215,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/posts\/20212\/revisions\/20215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/media\/20218"}],"wp:attachment":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/media?parent=20212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/categories?post=20212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tags?post=20212"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/yst_prominent_words?post=20212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}