Endpoint
3/28/2014
11:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New USB Enforced Encryption Device for Mac OS

Protects Key Corporate Data Copied from Apple Computers to Removable Storage Devices

San Francisco, CA and Cluj-Napoca, Romania – March 26, 2014 – A long awaited solution for companies seeking to secure sensitive data and prevent data loss on computers using Mac OS X was launched today by CoSoSys, a leading provider of cross-platform Data Loss Prevention (DLP), Device Control and Mobile Device Management (MDM) solutions. Endpoint Protector 4 is the first DLP tool that provides enforced encryption on removable storage devices for Mac OS X. 

The popularity of Apple computers, in addition to BYOD and BYOC trends, has helped Macs become part of the business environment. Today, more Apple computers and devices access the corporate network, and store growing volumes of sensitive company data. As a result, interest from criminals and others intent on exploiting security vulnerabilities and data breaches in Macs has risen.

It has always been a challenge for IT administrators to find solutions and tools compatible with Mac OS X, but now securing the network and data Mac users access is also becoming a priority. CoSoSys' Endpoint Protector 4 with Enforced Encryption on removable storage devices for Mac OS X solves these problems. It offers an easy, yet secure way for Mac users to encrypt data copied onto USB storage devices. With intuitive 'drag & drop' and copy/paste features, all information copied on the device is instantly protected by password-based military strength AES 256-bit encryption. The Enforced Encryption functionality also incorporates an additional security feature that deletes information if an attempt is made to tamper with the data, or when the device gets lost or stolen.

“After CoSoSys created the first Content Aware Protection solution for Mac OS X, the development of Enforced Encryption on USB storage devices is yet another example of how we are bridging the gap in security between Mac and Windows computers," said Roman Foeckl, CoSoSys CEO. "Endpoint Protector 4 together with the Enforced Encryption is an easy to use, but highly effective DLP tool that allows Apple end users to safeguard confidential data with confidence. Providing solutions simple enough for anyone to use engages everybody in security, which helps users and IT admins view protecting data as a joint responsibility and effort."

Enforced Encryption from CoSoSys turns any removable storage device into a Trusted Device. Combined with CoSoSys' Content Aware Protection and Device Control for Mac OS X, the Endpoint Protector product line provides a complete Data Loss Prevention (DLP) solution for SMBs and enterprises.

For more information about Data Loss Prevention for Mac OS X and other CoSoSys solutions, visit: 
http://www.endpointprotector.com/solutions/data_loss_prevention_DLP_for_Mac_OS_X

About CoSoSys

CoSoSys specializes in network device control, endpoint security and data loss prevention (DLP) for Windows and Mac OS X, Mobile Device Management (MDM) for iOS and Android, and development of applications for portable storage device encryption and enhancement. Our application portfolio includes functionalities encompassing device control, mobile device security, file tracing and shadowing, password security, data synchronization and network security.

CoSoSys distributes its products globally through a network of distributors and resellers, as well as directly to users via http://www.EndpointProtector.com.

CoSoSys enjoys a continuously growing base of users worldwide, and was recognized in 2011 as one of the fastest-growing technology companies as a winner of the 2011 Deloitte Technology FAST 50 ranking for Central Europe. CoSoSys has offices in Germany, the United States and Romania.

Press materials, images and additional information can be downloaded at:

http://www.endpointprotector.com/company/press_kit

http://www.endpointprotector.com/company/press_room

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
allencently
100%
0%
allencently,
User Rank: Apprentice
4/7/2014 | 11:16:53 PM
good solution for mac
Thanks for the post. "TrueCrypt" is a good free choice on windows to password protect USB flsha drive ; You provider a good solution for on Mac.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9676
Published: 2015-02-27
The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

CVE-2014-9682
Published: 2015-02-27
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.

CVE-2015-0655
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.

CVE-2015-0884
Published: 2015-02-27
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

CVE-2015-0885
Published: 2015-02-27
checkpw 1.02 and earlier allows remote attackers to cause a denial of service (infinite loop) via a -- (dash dash) in a username.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.