wonderfully unique software solutions

CoSoSys updates Endpoint Protector security and compliance

Data loss prevention (DLP) specialist CoSoSys has added automated group assignation and support to its flagship Endpoint Protector software.

Endpoint Protector version 5.3.0.0 can now assign computers or users automatically to specific groups based on their naming convention — easing deployment and reducing labour costs. Also, CoSoSys boosted support for Apple devices with ARM-based M1 processors, macOS Big Sur, and AWS EC2, according to the announcement.

Bluetooth support for USB and peripheral port monitoring, deep packet inspection, e-discovery and user experience features were also improved. The idea is to enable better interoperability with secure gateways and hardware.

Overall, the improvements should deliver better enterprise security and compliance especially with more teams working from home, the company said.

Andrada Coos, writing for CoSoSys, confirmed that managing DLP and securing endpoints was becoming more crucial for organisations.

“Company information is more vulnerable to insider threats than data breaches caused by malicious outsiders,” she said.

Data protection laws including the EU’s General Data Protection Regulation (GDPR) have made it essential for most organisations to safeguard personal information.

In addition, much corporate data, including information on business methods, intellectual property, finances, management systems, research and development projects, customer lists or trade secrets, must be kept confidential to ensure competitive advantage, Coos wrote.

“Employees may be more careless in the handling of such information than they are with personal information — for example, by transferring data via unauthorised messaging apps, file sharing or cloud storage services, and personal email accounts,” she said. “DLP solutions can help protect corporate data from misappropriation.”

DLP applications not only prevent corporate data from being transferred via insecure third-party services but can block copy-pasting, printing, or manually inserting such data into emails, she added.

( Image copyright © CoSoSys 2020-2021 )

Recent Articles

Why storing all your enterprise data enables ROT at the core

Data is everywhere -- and increasingly difficult to track and manage. Worse still -- as Lepide's Philip Robinson notes -- much of...

Diverse file exploits isolated in HP-Bromium threat report for Q4

Hackers and other malicious actors could be increasingly targeting diverse files and applications, according to HP-Bromium's threat intelligence report.

‘Zero trust’ cybersecurity approach is misunderstood: Stormshield

Trusting nothing and no one when it comes to network access is impractical if not completely impossible, endpoint security vendor Stormshield has...

Firmware hackers target embedded systems and IoT apps

Microsoft's report of a a rise in firmware attacks partly reflects the rise of embedded systems and the Internet of Things (IoT),...

Netsparker and Acunetix web scanning apps get design and brand revamp

Invicti Security - the parent brand of web scanners Acunetix and Netsparker - has flagged changes to its product design and user...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox