{"id":28579,"date":"2023-03-30T15:10:50","date_gmt":"2023-03-30T13:10:50","guid":{"rendered":"https:\/\/relnet.hu\/?p=28579"},"modified":"2023-03-30T15:10:50","modified_gmt":"2023-03-30T13:10:50","slug":"ujabb-elismeres-az-endpoint-protectornak","status":"publish","type":"post","link":"https:\/\/relnet.hu\/en\/ujabb-elismeres-az-endpoint-protectornak\/","title":{"rendered":"\u00dajabb elismer\u00e9s az Endpoint Protectornak"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/relnet.hu\/wp-content\/uploads\/2023\/03\/badges_2023_Gold.png\" alt=\"badges_2023_Gold\" \/><br \/>center<\/p>\n<p>A Cybersecurity Excellence Awards egy \u00e9vente megrendezett, vil\u00e1gm\u00e9ret\u0171 d\u00edjverseny, amely azokat az egy\u00e9neket, szervezeteket \u00e9s term\u00e9keket ismeri el, amelyek az IT-biztons\u00e1g ter\u00fclet\u00e9n mutattak fel kiv\u00e1l\u00f3s\u00e1got, innov\u00e1ci\u00f3t \u00e9s \u00fatt\u00f6r\u0151 szerepet.<br \/>justify<br \/>no-repeat;left top;;<br \/>auto<\/p>\n<p>Az Endpoint Protectorr\u00f3l<br \/>justify<br \/>no-repeat;left top;;<br \/>auto<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/relnet.hu\/wp-content\/uploads\/2023\/03\/cososys_gartner_peer-min.png\" alt=\"cososys_gartner_peer-min\" \/><br \/>center<br \/>Az Enpoint Protector \u00e9rt\u00e9kel\u00e9sei a Gartner Peer Insights platformon<\/p>\n<p>Az Endpoint Protector egy \u00e1tfog\u00f3 adatsziv\u00e1rg\u00e1s-megel\u0151z\u0151 (DLP) megold\u00e1s Windows, macOS \u00e9s Linux alap\u00fa sz\u00e1m\u00edt\u00f3g\u00e9pekhez, illetve v\u00e9kony kliensekhez \u00e9s Desktop-as-a-Service (DaaS) platformokhoz. A CoSoSys megold\u00e1sa megv\u00e9di a v\u00e1llalatokat az adatok kisziv\u00e1rg\u00e1s\u00e1t\u00f3l; minimaliz\u00e1lja a szervezeten bel\u00fcli (pl. munkat\u00e1rst\u00f3l \u00e9rkez\u0151) fenyeget\u00e9sek kock\u00e1zat\u00e1t, \u00e9s seg\u00edt el\u00e9rni az adatv\u00e9delmi szab\u00e1lyoz\u00e1soknak val\u00f3 megfelel\u00e9st (pl. GDPR, PCI DSS, HIPAA stb.). A modern, intuit\u00edv kezel\u0151fel\u00fcletnek \u00e9s a virtu\u00e1lis vagy felh\u0151s integr\u00e1ci\u00f3nak k\u00f6sz\u00f6nhet\u0151en az Endpoint Protector k\u00f6nnyen telep\u00edthet\u0151, \u00e9s futtat\u00e1sa nem ig\u00e9nyel halad\u00f3 technikai ismereteket.<br \/>\n<br \/>Az Endpoint Protector Device Control modulja a legr\u00e9szletesebb eszk\u00f6zkezel\u0151 megold\u00e1s a piacon, amely lehet\u0151v\u00e9 teszi a rendszergazd\u00e1k sz\u00e1m\u00e1ra, hogy olyan krit\u00e9riumok alapj\u00e1n, mint az eszk\u00f6z t\u00edpusa, sorozatsz\u00e1ma, valamint id\u0151- vagy h\u00e1l\u00f3zati h\u00e1zirendek alapj\u00e1n blokkolj\u00e1k a hordozhat\u00f3 t\u00e1rol\u00f3eszk\u00f6z\u00f6k haszn\u00e1lat\u00e1t.<br \/>\n<br \/>A Content Aware Protection modullal szab\u00e1lyozhat\u00f3, hogy mely \u00e9rz\u00e9keny adatok hagyhatj\u00e1k el a sz\u00e1m\u00edt\u00f3g\u00e9peket az\u00e1ltal, hogy el\u0151re meghat\u00e1rozott tartalom vagy megfelel\u0151s\u00e9gi el\u0151\u00edr\u00e1sok alapj\u00e1n h\u00e1zirendeket hoz l\u00e9tre. A Deep Packet Inspection (DPI) funkci\u00f3 enged\u00e9lyez\u00e9s\u00e9vel lehet\u0151s\u00e9g van bizonyos weboldalakhoz val\u00f3 hozz\u00e1f\u00e9r\u00e9s blokkol\u00e1s\u00e1ra vagy bizonyos tartom\u00e1nyokhoz val\u00f3 hozz\u00e1f\u00e9r\u00e9s enged\u00e9lyez\u00e9s\u00e9re.<br \/>\n<br \/>Az Enforced Encryption automatikusan titkos\u00edtja a h\u00e1l\u00f3zati v\u00e9gpontokhoz csatlakoztatott USB-eszk\u00f6z\u00f6ket, \u00edgy biztos\u00edtva, hogy az adatok csak titkos\u00edtott eszk\u00f6z\u00f6kre menthet\u0151k.<br \/>\n<br \/>Az eDiscovery lehet\u0151s\u00e9get k\u00edn\u00e1l az alkalmazottak v\u00e9gpontjain t\u00e1rolt, nyugalmi \u00e1llapotban l\u00e9v\u0151 \u00e9rz\u00e9keny adatok \u00e1tvizsg\u00e1l\u00e1s\u00e1ra el\u0151re defini\u00e1lt f\u00e1jlt\u00edpusok, tartalom, regul\u00e1ris kifejez\u00e9sek, GDPR vagy HIPAA v\u00e9dett tartalom stb. alapj\u00e1n. A vizsg\u00e1lat eredm\u00e9nyei szerint az adatokat titkos\u00edtani vagy t\u00f6r\u00f6lni lehet.<br \/>\n<br \/>Az Endpoint Protectorral kapcsolatos k\u00e9rd\u00e9seivel keresse bizalommal a RelNet munkat\u00e1rsait, akik szem\u00e9lyes konzult\u00e1ci\u00f3 keret\u00e9ben t\u00e1j\u00e9koztatj\u00e1k a lehet\u0151s\u00e9gekr\u0151l az ig\u00e9nyfelm\u00e9r\u00e9s, a tervez\u00e9s, a tesztel\u00e9s, az implement\u00e1l\u00e1s vagy az oktat\u00e1s kapcs\u00e1n.<br \/>\n<\/p>\n<h5>Forr\u00e1s<\/h5>\n<p><a>Cybersecurity Excellence Awards<\/a><\/p>\n<h5>Kapcsol\u00f3d\u00f3 tartalom<\/h5>\n<p><a>CoSoSys k\u00e9pz\u00e9sek a RelNet eLearning programban<\/a><br \/>justify<br \/>no-repeat;left top;;<br \/>auto<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Excellence Awards 2023 gy\u0151ztes lett a CoSoSys Endpoint Protector DLP megold\u00e1sa, amely a hatalmas adatmennyis\u00e9get kezel\u0151 szervezetek, p\u00e9ld\u00e1ul a bankok, ig\u00e9nyeit is marad\u00e9ktalanul k\u00e9pes kiszolg\u00e1lni.<\/p>\n","protected":false},"author":1086,"featured_media":28584,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[577],"tags":[2333,1173,3290,3289,3293,3294,3292,1822,3291,3295,1174,3296,558],"yst_prominent_words":[],"class_list":["post-28579","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cososys","tag-content-aware-protection","tag-cososys","tag-cososys-endpoint-protector","tag-cybersecurity-excellence-awards-2023","tag-daas","tag-deep-packet-inspection","tag-desktop-as-a-service","tag-dlp","tag-dlp-megoldas","tag-dpi","tag-endpoint-protector","tag-enforced-encryption","tag-it-biztonsag"],"_links":{"self":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/posts\/28579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/users\/1086"}],"replies":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/comments?post=28579"}],"version-history":[{"count":3,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/posts\/28579\/revisions"}],"predecessor-version":[{"id":28588,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/posts\/28579\/revisions\/28588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/media\/28584"}],"wp:attachment":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/media?parent=28579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/categories?post=28579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tags?post=28579"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/yst_prominent_words?post=28579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}