wonderfully unique software solutions

CoSoSys updates Endpoint Protector security and compliance

Data loss prevention (DLP) specialist CoSoSys has added automated group assignation and support to its flagship Endpoint Protector software.

Endpoint Protector version 5.3.0.0 can now assign computers or users automatically to specific groups based on their naming convention — easing deployment and reducing labour costs. Also, CoSoSys boosted support for Apple devices with ARM-based M1 processors, macOS Big Sur, and AWS EC2, according to the announcement.

Bluetooth support for USB and peripheral port monitoring, deep packet inspection, e-discovery and user experience features were also improved. The idea is to enable better interoperability with secure gateways and hardware.

Overall, the improvements should deliver better enterprise security and compliance especially with more teams working from home, the company said.

Andrada Coos, writing for CoSoSys, confirmed that managing DLP and securing endpoints was becoming more crucial for organisations.

“Company information is more vulnerable to insider threats than data breaches caused by malicious outsiders,” she said.

Data protection laws including the EU’s General Data Protection Regulation (GDPR) have made it essential for most organisations to safeguard personal information.

In addition, much corporate data, including information on business methods, intellectual property, finances, management systems, research and development projects, customer lists or trade secrets, must be kept confidential to ensure competitive advantage, Coos wrote.

“Employees may be more careless in the handling of such information than they are with personal information — for example, by transferring data via unauthorised messaging apps, file sharing or cloud storage services, and personal email accounts,” she said. “DLP solutions can help protect corporate data from misappropriation.”

DLP applications not only prevent corporate data from being transferred via insecure third-party services but can block copy-pasting, printing, or manually inserting such data into emails, she added.

( Image copyright © CoSoSys 2020-2021 )

Recent Articles

Responsibility shifts towards vendors with US National Cybersecurity Strategy

The US government has called for aggressive regulation as part of its National Cybersecurity Strategy for 2023, ITops company Automox has warned.

Four critical challenges for cybersecurity provision in 2023

Skill sets, AI, co-operation, and climate have become the critical challenges for cybersecurity provision this year, according to Europe-based IT/OT security software...

Snow adds certifications to partner programme to drive Atlas sales

Technology intelligence software platform Snow Atlas has achieved ISO 27001 certification and completed the Service Organisation Control (SOC) 2 Type 1 examination...

Arista says edge threat defences could have safeguarded Tallahassee health

Tallahassee Memorial Health might not have been disrupted in February, requiring systems downtime and patient inconvenience, had it deployed strong edge threat...

OpenText Cloud Editions aim for accelerated AI and digital transformations

Information software company OpenText has whipped the covers off its Cloud Editions (CE) 23.1, which it says will support AI adoption and...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox