wonderfully unique software solutions

CoSoSys advances threat detection at the endpoint with latest release

CoSoSys has unveiled advanced content detection and integration capabilities in its flagship Endpoint Protector 5.5.0.0.

Roman Foeckl, chief executive officer and founder of CoSoSys, said these capabilities would strengthen and simplify data security for its end users.

“With the new features and integrations, we want to empower businesses to stay ahead of security risks and help them stay productive and focused on their work,” Foeckl said in the official announcement.

As CoSoSys explains, attention to effective data loss prevention (DLP) has become essential.

“Being subject to outside attacks or insider threats is inevitable but data leaks, data loss and data theft can be mitigated,” the vendor says on its website.

“A content and context-aware DLP solution can inspect and control file transfers containing sensitive information like personal data or intellectual property, manage what USB storage devices can or cannot be used and, ensure enforced encryption is used.”

These actions should occur at endpoint level, because this is where attacks are most likely, thje vendor notes. CoSoSys’ Endpoint Protector can be deployed as for DLP on Windows, macOS and Linux endpoints.

New features in version 5.5.0.0 are aimed at helping organisations build even targeted data protection policies, reduce false positives, and tackle the growing complexity of their hybrid work environments, it said.

“In Endpoint Protector 5.5.0.0, it’s possible to define complex conditions for content scanning. This includes combining multiple criteria, using personally identifiable information or dictionary words and other regular expressions, logical operators such as ‘and/or’, and the ability to apply content detection rules only to specific file types,” the announcement explained.

A survey by Menlo Security in March 2022 estimates that fewer than one in three organisations (27%) have deployed advanced threat protection on all endpoint devices that access corporate resources.

( Photo by Buffik at Pixabay )

Recent Articles

Responsibility shifts towards vendors with US National Cybersecurity Strategy

The US government has called for aggressive regulation as part of its National Cybersecurity Strategy for 2023, ITops company Automox has warned.

Four critical challenges for cybersecurity provision in 2023

Skill sets, AI, co-operation, and climate have become the critical challenges for cybersecurity provision this year, according to Europe-based IT/OT security software...

Snow adds certifications to partner programme to drive Atlas sales

Technology intelligence software platform Snow Atlas has achieved ISO 27001 certification and completed the Service Organisation Control (SOC) 2 Type 1 examination...

Arista says edge threat defences could have safeguarded Tallahassee health

Tallahassee Memorial Health might not have been disrupted in February, requiring systems downtime and patient inconvenience, had it deployed strong edge threat...

OpenText Cloud Editions aim for accelerated AI and digital transformations

Information software company OpenText has whipped the covers off its Cloud Editions (CE) 23.1, which it says will support AI adoption and...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox