Endpoint
3/28/2014
11:30 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

New USB Enforced Encryption Device for Mac OS

Protects Key Corporate Data Copied from Apple Computers to Removable Storage Devices

San Francisco, CA and Cluj-Napoca, Romania – March 26, 2014 – A long awaited solution for companies seeking to secure sensitive data and prevent data loss on computers using Mac OS X was launched today by CoSoSys, a leading provider of cross-platform Data Loss Prevention (DLP), Device Control and Mobile Device Management (MDM) solutions. Endpoint Protector 4 is the first DLP tool that provides enforced encryption on removable storage devices for Mac OS X. 

The popularity of Apple computers, in addition to BYOD and BYOC trends, has helped Macs become part of the business environment. Today, more Apple computers and devices access the corporate network, and store growing volumes of sensitive company data. As a result, interest from criminals and others intent on exploiting security vulnerabilities and data breaches in Macs has risen.

It has always been a challenge for IT administrators to find solutions and tools compatible with Mac OS X, but now securing the network and data Mac users access is also becoming a priority. CoSoSys' Endpoint Protector 4 with Enforced Encryption on removable storage devices for Mac OS X solves these problems. It offers an easy, yet secure way for Mac users to encrypt data copied onto USB storage devices. With intuitive 'drag & drop' and copy/paste features, all information copied on the device is instantly protected by password-based military strength AES 256-bit encryption. The Enforced Encryption functionality also incorporates an additional security feature that deletes information if an attempt is made to tamper with the data, or when the device gets lost or stolen.

“After CoSoSys created the first Content Aware Protection solution for Mac OS X, the development of Enforced Encryption on USB storage devices is yet another example of how we are bridging the gap in security between Mac and Windows computers," said Roman Foeckl, CoSoSys CEO. "Endpoint Protector 4 together with the Enforced Encryption is an easy to use, but highly effective DLP tool that allows Apple end users to safeguard confidential data with confidence. Providing solutions simple enough for anyone to use engages everybody in security, which helps users and IT admins view protecting data as a joint responsibility and effort."

Enforced Encryption from CoSoSys turns any removable storage device into a Trusted Device. Combined with CoSoSys' Content Aware Protection and Device Control for Mac OS X, the Endpoint Protector product line provides a complete Data Loss Prevention (DLP) solution for SMBs and enterprises.

For more information about Data Loss Prevention for Mac OS X and other CoSoSys solutions, visit: 
http://www.endpointprotector.com/solutions/data_loss_prevention_DLP_for_Mac_OS_X

About CoSoSys

CoSoSys specializes in network device control, endpoint security and data loss prevention (DLP) for Windows and Mac OS X, Mobile Device Management (MDM) for iOS and Android, and development of applications for portable storage device encryption and enhancement. Our application portfolio includes functionalities encompassing device control, mobile device security, file tracing and shadowing, password security, data synchronization and network security.

CoSoSys distributes its products globally through a network of distributors and resellers, as well as directly to users via http://www.EndpointProtector.com.

CoSoSys enjoys a continuously growing base of users worldwide, and was recognized in 2011 as one of the fastest-growing technology companies as a winner of the 2011 Deloitte Technology FAST 50 ranking for Central Europe. CoSoSys has offices in Germany, the United States and Romania.

Press materials, images and additional information can be downloaded at:

http://www.endpointprotector.com/company/press_kit

http://www.endpointprotector.com/company/press_room

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
allencently
100%
0%
allencently,
User Rank: Apprentice
4/7/2014 | 11:16:53 PM
good solution for mac
Thanks for the post. "TrueCrypt" is a good free choice on windows to password protect USB flsha drive ; You provider a good solution for on Mac.
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

CVE-2014-7292
Published: 2014-10-23
Open redirect vulnerability in the Click-Through feature in Newtelligence dasBlog 2.1 (2.1.8102.813), 2.2 (2.2.8279.16125), and 2.3 (2.3.9074.18820) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to ct.ashx.

CVE-2014-8071
Published: 2014-10-23
Multiple cross-site scripting (XSS) vulnerabilities in OpenMRS 2.1 Standalone Edition allow remote attackers to inject arbitrary web script or HTML via the (1) givenName, (2) familyName, (3) address1, or (4) address2 parameter to registrationapp/registerPatient.page; the (5) comment parameter to all...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.