Endpoint
3/28/2014
11:30 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

New USB Enforced Encryption Device for Mac OS

Protects Key Corporate Data Copied from Apple Computers to Removable Storage Devices

San Francisco, CA and Cluj-Napoca, Romania – March 26, 2014 – A long awaited solution for companies seeking to secure sensitive data and prevent data loss on computers using Mac OS X was launched today by CoSoSys, a leading provider of cross-platform Data Loss Prevention (DLP), Device Control and Mobile Device Management (MDM) solutions. Endpoint Protector 4 is the first DLP tool that provides enforced encryption on removable storage devices for Mac OS X. 

The popularity of Apple computers, in addition to BYOD and BYOC trends, has helped Macs become part of the business environment. Today, more Apple computers and devices access the corporate network, and store growing volumes of sensitive company data. As a result, interest from criminals and others intent on exploiting security vulnerabilities and data breaches in Macs has risen.

It has always been a challenge for IT administrators to find solutions and tools compatible with Mac OS X, but now securing the network and data Mac users access is also becoming a priority. CoSoSys' Endpoint Protector 4 with Enforced Encryption on removable storage devices for Mac OS X solves these problems. It offers an easy, yet secure way for Mac users to encrypt data copied onto USB storage devices. With intuitive 'drag & drop' and copy/paste features, all information copied on the device is instantly protected by password-based military strength AES 256-bit encryption. The Enforced Encryption functionality also incorporates an additional security feature that deletes information if an attempt is made to tamper with the data, or when the device gets lost or stolen.

“After CoSoSys created the first Content Aware Protection solution for Mac OS X, the development of Enforced Encryption on USB storage devices is yet another example of how we are bridging the gap in security between Mac and Windows computers," said Roman Foeckl, CoSoSys CEO. "Endpoint Protector 4 together with the Enforced Encryption is an easy to use, but highly effective DLP tool that allows Apple end users to safeguard confidential data with confidence. Providing solutions simple enough for anyone to use engages everybody in security, which helps users and IT admins view protecting data as a joint responsibility and effort."

Enforced Encryption from CoSoSys turns any removable storage device into a Trusted Device. Combined with CoSoSys' Content Aware Protection and Device Control for Mac OS X, the Endpoint Protector product line provides a complete Data Loss Prevention (DLP) solution for SMBs and enterprises.

For more information about Data Loss Prevention for Mac OS X and other CoSoSys solutions, visit: 
http://www.endpointprotector.com/solutions/data_loss_prevention_DLP_for_Mac_OS_X

About CoSoSys

CoSoSys specializes in network device control, endpoint security and data loss prevention (DLP) for Windows and Mac OS X, Mobile Device Management (MDM) for iOS and Android, and development of applications for portable storage device encryption and enhancement. Our application portfolio includes functionalities encompassing device control, mobile device security, file tracing and shadowing, password security, data synchronization and network security.

CoSoSys distributes its products globally through a network of distributors and resellers, as well as directly to users via http://www.EndpointProtector.com.

CoSoSys enjoys a continuously growing base of users worldwide, and was recognized in 2011 as one of the fastest-growing technology companies as a winner of the 2011 Deloitte Technology FAST 50 ranking for Central Europe. CoSoSys has offices in Germany, the United States and Romania.

Press materials, images and additional information can be downloaded at:

http://www.endpointprotector.com/company/press_kit

http://www.endpointprotector.com/company/press_room

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
allencently
100%
0%
allencently,
User Rank: Apprentice
4/7/2014 | 11:16:53 PM
good solution for mac
Thanks for the post. "TrueCrypt" is a good free choice on windows to password protect USB flsha drive ; You provider a good solution for on Mac.
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7877
Published: 2014-10-30
Unspecified vulnerability in the kernel in HP HP-UX B.11.31 allows local users to cause a denial of service via unknown vectors.

CVE-2014-3051
Published: 2014-10-29
The Internet Service Monitor (ISM) agent in IBM Tivoli Composite Application Manager (ITCAM) for Transactions 7.1 and 7.2 before 7.2.0.3 IF28, 7.3 before 7.3.0.1 IF30, and 7.4 before 7.4.0.0 IF18 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof s...

CVE-2014-3668
Published: 2014-10-29
Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument t...

CVE-2014-3669
Published: 2014-10-29
Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function ...

CVE-2014-3670
Published: 2014-10-29
The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly exec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.