Endpoint Protector by CoSoSys, works on Windows, MacOS, and Linux as well as Thin clients and puts an end to unintentional data leaks, protects from malicious data theft and offers seamless control of portable storage devices.
Filip Cotfas, channel manager for Endpoint Protector at CoSoSys, said, “With Covid-19, businesses have never been more at risk of data breaches. The crisis today has taught businesses worldwide the importance of data loss prevention solutions, and how its right adoption can help seamless functioning in any given situation.”
Endpoint Protector has several modules that help in safeguarding sensitive data from loss, leakage, and theft. With the content-aware protection module, enterprises can filter what data can or cannot leave their network and offers an advanced method of inspecting confidential data based on both content and context. It protects data in motion ranging from the file type, through predefined and custom content filtering to different regulations such as the GDPR or the Personal Data Protection Bill of 2019.
Cotfas added, “Our coverage also extends to printers, helping companies avoid data leaks. Once a document reaches the printer, there are various ways for the data to leave the network. Our product offers important features like blocking or reporting print jobs and preventing data breaches.”
End Protector solution benefits
- Protection from data loss, leak or theft, mitigating insider threats, and reducing the risks of human error. As the number and costs of security breaches are increasing, enterprises must ensure that sensitive data is adequately protected.
- End-users can be easily restricted from sharing confidential information through a variety of exit points including email clients, web browsers, and different applications, as well as the option to control portable storage devices.
- The solution also offers predefined policies for Aadhaar numbers, phone numbers, etc. Companies can create security policies for different departments, groups, computers, or users, in order to keep sensitive data such as customer data or Intellectual Property safe.
- The USB enforced encryption module allows users to extend their device control policy and make sure that all sensitive data transferred to USB storage devices are automatically encrypted. Via a secured password, users can safely transfer data and access it on any computer or only on authorised ones. The solution has a lightweight agent with no performance impact on the client.