USB Flash Drives, digital cameras, portable hard drives, notebooks, smartphones, netbooks and iPads have been largely introduced in most business processes, increasing employee and management performance through their high mobility, large storage spaces and the plug and play options they currently feature. But their accidental loss, theft or misuse has lead to severe breaches which include confidential data being exposed, private records or confidential business plans being stolen. The Endpoint Protector Hardware Appliance centrally and proactively manages these risks, allowing companies to take advantage of the latest gadgets without having to worry about security threats.
Once plugged in, the Endpoint Protector Hardware Appliance is set up in under five minutes and protects companies from all the above risks. It enables IT departments to take control of internal device usage, track all data transferred in or out of the protected network and enforce encryption of data in transit on portable devices, all through a central web-based management interface. It provides a safe environment to work with portable devices through file tracing, file shadowing, file whitelisting, device management and many other valuable data and endpoint security features.
Some of the most prominent appliance benefits are:
Quick network plug-in and fast setup (up to 5 minutes), getting this full scale enterprise-class solution as close as possible to a plug and play device
-- Out of the box protection against data loss and theft and other common breaches
-- Centrally manage device usage for PCs and Macs in your network from anywhere with the virtual server appliance
-- Save money - No server hardware requirements; no software requirements; no lengthy training process
-- Save time - No maintenance and update tasks, as the process is rendered automatic
“Our new appliance is designed to cover all company types, from small and medium-sized private businesses to large corporations with thousands of employees, allowing all of them to take advantage of corporate class protection without stretching existing hardware or software resources or requiring IT professionals to go through a lengthy and complicated learning process. The Endpoint Protector Hardware Appliance was created to seamlessly integrate in existing networks and take as little as possible to start working, bringing us very close to a fully plug and play security appliance,” explained Roman Foeckl, CoSoSys CEO.
Endpoint Protector Hardware Appliance is a complete, ready to use solution providing device control and data loss protection in a fast and affordable way for both PCs and Macs in company networks. It allows companies to develop and implement a device security policy within minutes, while protecting existing resources and saving time and money.
More information about the Endpoint Protector Appliance is available online:
CoSoSys is specialized in network endpoint security for Windows and Mac and development of software for portable storage device enhancement. The application portfolio includes functions from password security, data synchronization and network security. CoSoSys distributes its products globally through the world’s leading hardware manufacturers, software Distributors, Resellers and directly to users at http://www.CoSoSys.com and http://www.EndpointProtector.com. CoSoSys enjoys a continuously growing installation base of users worldwide. The company has offices in Germany, the United States and Romania.