Endpoint
3/28/2014
11:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New USB Enforced Encryption Device for Mac OS

Protects Key Corporate Data Copied from Apple Computers to Removable Storage Devices

San Francisco, CA and Cluj-Napoca, Romania – March 26, 2014 – A long awaited solution for companies seeking to secure sensitive data and prevent data loss on computers using Mac OS X was launched today by CoSoSys, a leading provider of cross-platform Data Loss Prevention (DLP), Device Control and Mobile Device Management (MDM) solutions. Endpoint Protector 4 is the first DLP tool that provides enforced encryption on removable storage devices for Mac OS X. 

The popularity of Apple computers, in addition to BYOD and BYOC trends, has helped Macs become part of the business environment. Today, more Apple computers and devices access the corporate network, and store growing volumes of sensitive company data. As a result, interest from criminals and others intent on exploiting security vulnerabilities and data breaches in Macs has risen.

It has always been a challenge for IT administrators to find solutions and tools compatible with Mac OS X, but now securing the network and data Mac users access is also becoming a priority. CoSoSys' Endpoint Protector 4 with Enforced Encryption on removable storage devices for Mac OS X solves these problems. It offers an easy, yet secure way for Mac users to encrypt data copied onto USB storage devices. With intuitive 'drag & drop' and copy/paste features, all information copied on the device is instantly protected by password-based military strength AES 256-bit encryption. The Enforced Encryption functionality also incorporates an additional security feature that deletes information if an attempt is made to tamper with the data, or when the device gets lost or stolen.

“After CoSoSys created the first Content Aware Protection solution for Mac OS X, the development of Enforced Encryption on USB storage devices is yet another example of how we are bridging the gap in security between Mac and Windows computers," said Roman Foeckl, CoSoSys CEO. "Endpoint Protector 4 together with the Enforced Encryption is an easy to use, but highly effective DLP tool that allows Apple end users to safeguard confidential data with confidence. Providing solutions simple enough for anyone to use engages everybody in security, which helps users and IT admins view protecting data as a joint responsibility and effort."

Enforced Encryption from CoSoSys turns any removable storage device into a Trusted Device. Combined with CoSoSys' Content Aware Protection and Device Control for Mac OS X, the Endpoint Protector product line provides a complete Data Loss Prevention (DLP) solution for SMBs and enterprises.

For more information about Data Loss Prevention for Mac OS X and other CoSoSys solutions, visit: 
http://www.endpointprotector.com/solutions/data_loss_prevention_DLP_for_Mac_OS_X

About CoSoSys

CoSoSys specializes in network device control, endpoint security and data loss prevention (DLP) for Windows and Mac OS X, Mobile Device Management (MDM) for iOS and Android, and development of applications for portable storage device encryption and enhancement. Our application portfolio includes functionalities encompassing device control, mobile device security, file tracing and shadowing, password security, data synchronization and network security.

CoSoSys distributes its products globally through a network of distributors and resellers, as well as directly to users via http://www.EndpointProtector.com.

CoSoSys enjoys a continuously growing base of users worldwide, and was recognized in 2011 as one of the fastest-growing technology companies as a winner of the 2011 Deloitte Technology FAST 50 ranking for Central Europe. CoSoSys has offices in Germany, the United States and Romania.

Press materials, images and additional information can be downloaded at:

http://www.endpointprotector.com/company/press_kit

http://www.endpointprotector.com/company/press_room

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
allencently
100%
0%
allencently,
User Rank: Apprentice
4/7/2014 | 11:16:53 PM
good solution for mac
Thanks for the post. "TrueCrypt" is a good free choice on windows to password protect USB flsha drive ; You provider a good solution for on Mac.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.