wonderfully unique software solutions

CoSoSys advances threat detection at the endpoint with latest release

CoSoSys has unveiled advanced content detection and integration capabilities in its flagship Endpoint Protector 5.5.0.0.

Roman Foeckl, chief executive officer and founder of CoSoSys, said these capabilities would strengthen and simplify data security for its end users.

“With the new features and integrations, we want to empower businesses to stay ahead of security risks and help them stay productive and focused on their work,” Foeckl said in the official announcement.

As CoSoSys explains, attention to effective data loss prevention (DLP) has become essential.

“Being subject to outside attacks or insider threats is inevitable but data leaks, data loss and data theft can be mitigated,” the vendor says on its website.

“A content and context-aware DLP solution can inspect and control file transfers containing sensitive information like personal data or intellectual property, manage what USB storage devices can or cannot be used and, ensure enforced encryption is used.”

These actions should occur at endpoint level, because this is where attacks are most likely, thje vendor notes. CoSoSys’ Endpoint Protector can be deployed as for DLP on Windows, macOS and Linux endpoints.

New features in version 5.5.0.0 are aimed at helping organisations build even targeted data protection policies, reduce false positives, and tackle the growing complexity of their hybrid work environments, it said.

“In Endpoint Protector 5.5.0.0, it’s possible to define complex conditions for content scanning. This includes combining multiple criteria, using personally identifiable information or dictionary words and other regular expressions, logical operators such as ‘and/or’, and the ability to apply content detection rules only to specific file types,” the announcement explained.

A survey by Menlo Security in March 2022 estimates that fewer than one in three organisations (27%) have deployed advanced threat protection on all endpoint devices that access corporate resources.

( Photo by Buffik at Pixabay )

Recent Articles

RealVNC remote-access highlighted by six finalists for Raspberry Pi prize

RealVNC, maker of RealVNC Connect, has named six finalists for this year's RealVNC Raspberry Pi Prize with winner and runners-up to be...

Cyberattack climate entails customised firewalling, notes Stormshield

Firewalling at the edge is no longer enough so organisations increasingly need to combine suitable location with segmentation and zero-trust strategies that...

Palm vein biometrics market set to explode this decade

The market for palm-vein based biometrics has been forecast to expand in line with a compounded annual growth rate of 22.4% from...

Automox targets unsigned scripts with PowerShell signing capability

Endpoint management company Automox is unveiling Worklets Signing, which complements Worklets and Ask Otto with a view to helping companies dodge the...

Arista warns SMBs to take precautions against edge threats

Arista Networks, the vendor of Arista Edge Threat Management (ETM) has warned that SMBs aren't always aware of the extent of targeting...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox