tECHdOGS-"CoSoSys Launches New Advanced Data Protection Features in Endpoint Protector v5.6"

IT Security

CoSoSys Launches New Advanced Data Protection Features in Endpoint Protector v5.6

By Business Wire

Business Wire
Overall Rating


RALEIGH, N.C.--(BUSINESS WIRE)--#endpointprotector--CoSoSys, a leader in multi-OS Data Loss Prevention (DLP) solutions, has announced the latest version of its award-winning Endpoint Protector solution.

Endpoint Protector v5.6 launches with a host of new features to help organizations better protect their sensitive data from insider threats, accidental loss, and compliance breaches.

“Whether it’s customer PII or healthcare records, payment card data or company IP, the need to protect sensitive information from leaving an organization is one of the most critical challenges facing businesses today,” explains Roman Foeckl, CoSoSys CEO and Founder. “This growing challenge is why we continue to innovate, helping our customers to avoid the regulatory fines and reputational damage that can result from a data breach.”

Named a DLP category-leader by G2, the world’s largest and most trusted tech marketplace, Endpoint Protector v5.6 features new levels of control for security admins; including advanced content detection rules, blocking network printing from an endpoint, and the ability to restrict content sharing through employee’s personal Google accounts.

Key updates in the latest release include:

User Remediation for Device Control*
User Remediation is already available within Endpoint Protector’s Content Aware Protection module. This release now brings the feature to Device Control, allowing users to override a policy, adding a time-stamped justification for doing so. Not only does User Remediation improve the experience for end-users, but it also reduces the time your admin team spends responding to tickets and requests to bypass a policy restriction.

Network Printer Detection
Endpoint Protector already features the industry’s widest library of controllable devices - from USB flash drives and smartphones, to printers and Bluetooth devices. v5.6 adds to this with support for network printers, allowing administrators even greater endpoint control over physical and network attached devices.

Control Personal Google Accounts
With many organizations now benefiting from Google accounts and apps, it’s important to be able to differentiate between an official business account and an employee’s personal account. New to v5.6 is the ability to build policies that whitelist the business account but (e.g.) block uploads to an employee’s personal Drive, or restrict the transfer of sensitive data via a personal Gmail account.

Advanced Content Detection (Thresholds)*
Administrators can already build powerful policies in Endpoint Protector’s Content-Aware Protection module by combining multiple criteria (such as PIIs, dictionary words, and regular expressions) with using logical operators (AND/OR), and the ability to apply content detection rules only to specific file types. v5.6 adds to this advanced level of control with the inclusion of Thresholds. This allows an administrator to specify the number of threats that can be passed before a policy triggers and an action is blocked.

What else is available in v5.6?

Encrypted SIEM logs
For organizations that send Endpoint Protector logs to a SIEM, these can now be asymmetrically encrypted (TCP and UDP) for additional security with v5.6.

New PIIs
CoSoSys is committed to continually expanding its libraries of PII, allowing Administrators to quickly build policies against common PII types. v5.6 adds additional Social Security Numbers, Tax IDs, Electoral Roll Numbers, VIN (Vehicle ID Numbers), addresses, passport numbers and VAT IDs across a number of countries. For a full list of new PII types, see the full release notes.

New File Types
For healthcare organizations managing patient records and medical images (such as ultrasound scans), v5.6 brings support for DICOM (Digital Imaging and Communications in Medicine) files. WebM audiovisual media files are also now supported.

For more information about Endpoint Protector, please visit https://www.endpointprotector.com.

* Available on Endpoint Protector Premium Plans.

About CoSoSys

Built to protect organizations from insider threats, accidental loss, and data compliance breaches, Endpoint Protector combines the visibility needed to identify at-risk data on the endpoint with the controls to stop data loss in its tracks.

With support for macOS, Windows, and Linux, Endpoint Protector is proven in the enterprise and trusted across regulated industries that want to reduce the risk of a data compliance breach or data loss from malicious, negligent, and compromised users and demand continuous protection wherever their employees are working, even when they’re offline, without impacting productivity.


Contacts

Codina Sabau, Ph.D.
codina.sabau@cososys.com
www.endpointprotector.com

Like what you read? Head to the TechDogs homepage to find the latest tech content infused with drama and entertainment. We've got ArticlesWhite PapersCase StudiesReportsVideos and Events - the complete lot to help you Know Your World of Technology.

First published on Tue, Jul 19, 2022

Enjoyed what you've read so far? Great news - there's more to explore!

Stay up to date with the latest news, a vast collection of tech articles including introductory guides, product reviews, trends and more, thought-provoking interviews, hottest AI blogs and entertaining tech memes.

Plus, get access to branded insights such as informative white papers, intriguing case studies, in-depth reports, enlightening videos and exciting events and webinars from industry-leading global brands.

Dive into TechDogs' treasure trove today and Know Your World of technology!

Disclaimer - Reference to any specific product, software or entity does not constitute an endorsement or recommendation by TechDogs nor should any data or content published be relied upon. The views expressed by TechDogs' members and guests are their own and their appearance on our site does not imply an endorsement of them or any entity they represent. Views and opinions expressed by TechDogs' Authors are those of the Authors and do not necessarily reflect the view of TechDogs or any of its officials. While we aim to provide valuable and helpful information, some content on TechDogs' site may not have been thoroughly reviewed for every detail or aspect. We encourage users to verify any information independently where necessary.

Join The Discussion

- Promoted By TechDogs -

Join Our Newsletter

Get weekly news, engaging articles, and career tips-all free!

By subscribing to our newsletter, you're cool with our terms and conditions and agree to our Privacy Policy.

  • Dark
  • Light