wonderfully unique software solutions

CoSoSys updates Endpoint Protector security and compliance

Data loss prevention (DLP) specialist CoSoSys has added automated group assignation and support to its flagship Endpoint Protector software.

Endpoint Protector version 5.3.0.0 can now assign computers or users automatically to specific groups based on their naming convention — easing deployment and reducing labour costs. Also, CoSoSys boosted support for Apple devices with ARM-based M1 processors, macOS Big Sur, and AWS EC2, according to the announcement.

Bluetooth support for USB and peripheral port monitoring, deep packet inspection, e-discovery and user experience features were also improved. The idea is to enable better interoperability with secure gateways and hardware.

Overall, the improvements should deliver better enterprise security and compliance especially with more teams working from home, the company said.

Andrada Coos, writing for CoSoSys, confirmed that managing DLP and securing endpoints was becoming more crucial for organisations.

“Company information is more vulnerable to insider threats than data breaches caused by malicious outsiders,” she said.

Data protection laws including the EU’s General Data Protection Regulation (GDPR) have made it essential for most organisations to safeguard personal information.

In addition, much corporate data, including information on business methods, intellectual property, finances, management systems, research and development projects, customer lists or trade secrets, must be kept confidential to ensure competitive advantage, Coos wrote.

“Employees may be more careless in the handling of such information than they are with personal information — for example, by transferring data via unauthorised messaging apps, file sharing or cloud storage services, and personal email accounts,” she said. “DLP solutions can help protect corporate data from misappropriation.”

DLP applications not only prevent corporate data from being transferred via insecure third-party services but can block copy-pasting, printing, or manually inserting such data into emails, she added.

( Image copyright © CoSoSys 2020-2021 )

Recent Articles

N-able expands channel push with accelerated global support

Remote monitoring and management (RMM) specialist N-able is ramping up its support fot the distribution channel worldwide in a bid to increase...

Keeper Security finds multiple weekly cyberattacks on UK professional services

The IT systems of UK-based professional services and financial services providers are often attacked many times each week, according to a Keeper...

JetBrains previews new IntelliJ based Fleet IDE and editor

Developer tools company JetBrains has opened up public preview access to its Fleet integrated development environment (IDE) and editor.

Go beyond identifying known cyber threats ahead of Industry 5.0

Cybersecurity vendor Stormshield has warned that identifying unknown and future threats has become increasingly crucial for effective enterprise defences.

Bluebeam Revu eased redesign of historic West End arcade

Construction project software from Bluebeam has helped a contractor renovate an historic stone building near London's Piccadilly Circus. According...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox