wonderfully unique software solutions

CoSoSys Endpoint Protector in AON search for data loss prevention

Global insurance company AON has implemented Endpoint Protector by CoSoSys to reduce the risk presented by the all-too-common data breaches and informational losses in the business world.

According to AON in a case study produced by CoSoSys, the organisation needed a way to secure data as well as control and restrict end user activities involving data.

With Endpoint Protector’s Content Aware Protection module, the insurance company gained an “intuitive and efficient” ability to monitor data and file transfers as well as an ability to manage customers’ confidential information in an “advanced, granular” way.

The software also complies with GDPR, HIPAA, PCI DSS and RBI requirements, the vendor said.

Endpoint Protector by CoSoSys also offers organisations the ability to control the risk presented by removable devices, such as USB keys, flash drives, smartphones, optical disk players, and other peripheral devices popular with end users.

The Endpoint Protector DLP software module dedicated to device control can limit or block the use of removable media or Bluetooth connectivity, ensuring that extraneous devices cannot connect to work computers.

Removable device use can be restricted in a granular way but assigning different levels of trust to specific devices based on their encryption level.

If encrypted appropriately as part of a granular security polity, data on removable devices can be used relatively safely — for instance, as part of an offline backup strategy that ensures files are recoverable in case of disaster, or to enable hybrid working practices.

“In this way, only removable media devices with a high level of security are allowed to connect to endpoints,” CoSoSys explained in a blog post.

“The policies that organisations can apply to portable storage devices through Endpoint Protector are not limited to devices’ level of security or global settings for all company computers. Different rules can be created for particular groups, users, or computers.”

( Photo by charlesdeluvio on Unsplash )

Recent Articles

Four critical challenges for cybersecurity provision in 2023

Skill sets, AI, co-operation, and climate have become the critical challenges for cybersecurity provision this year, according to Europe-based IT/OT security software...

Snow adds certifications to partner programme to drive Atlas sales

Technology intelligence software platform Snow Atlas has achieved ISO 27001 certification and completed the Service Organisation Control (SOC) 2 Type 1 examination...

Arista says edge threat defences could have safeguarded Tallahassee health

Tallahassee Memorial Health might not have been disrupted in February, requiring systems downtime and patient inconvenience, had it deployed strong edge threat...

OpenText Cloud Editions aim for accelerated AI and digital transformations

Information software company OpenText has whipped the covers off its Cloud Editions (CE) 23.1, which it says will support AI adoption and...

How to prevent more fraudulent electronic transactions with Nitro

E-signatures and PDF management software vendor Nitro has conceded that fraudsters have in some cases taken advantage of e-transaction practices, pointing out...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox