Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:00 AM
Dark Reading
Dark Reading
Products and Releases

CoSoSys Connects the Dots between Cloud Storage Services and Cloud-Based Data Loss Prevention

Global Security Vendor Foresees an Increase in Cloud-Based DLP Adoption Due to Mobile Workforce and Ease-of-Use

San Francisco, CA and Cluj-Napoca, Romania (July 1, 2014) – To better support companies struggling with changes to their infrastructure, CoSoSys announced today the release of a new version of My Endpoint Protector, the industry leading cloud-based Data Loss Prevention (DLP) and Mobile Device Management (MDM) solution for both Macs and PCs. The new features provide corporate IT departments with increased data loss and data theft prevention services to keep pace with the growing worldwide demand for cloud adoption and storage solutions.

According to internal research, CoSoSys discovered that the number of enterprise customers that opted for the SaaS version of their DLP and MDM solution has registered an increase of 140% since the beginning of 2014. The areas where SaaS DLP is mostly implemented include the United States and Western Europe, particularly in the United Kingdom, Germany and Switzerland.

“Our customers were keen to take advantage of Endpoint Protector’s functionalities straight from the cloud. For a significant percentage of companies, a cloud-based version is easier to test, it requires less resources and it represents a more agile way of securing information,” said Roman Foeckl, CEO of CoSoSys. “Globalization has forced companies to allow the use of cloud storage services like Dropbox, Google Drive, iCloud, OneDrive, and many others, in order to support collaboration from different parts of the country or the world. The same reasoning is applied for cloud-based DLP and MDM solutions in the enterprise.”

In this context, data privacy while storing data in the cloud is a major point of concern for businesses of all sizes across all industries. Any and all corporate information, especially anything related to a company’s Intellectual Property, should be filtered before it ends up in a less controllable environment. Different levels of authorization for data transfers should also be put in place to make sure productivity is not affected.

The new version of My Endpoint Protector brings updates that support both IT administrators and organizations by enhancing protection against data loss and theft.

On the Content Aware Protection (DLP) section, the additions to My Endpoint Protector increase users’ productivity and network performance by eliminating unneeded restrictions. Specifically, URL and Domain Whitelists allow data transfers to trusted web addresses and e-mail addresses.

For advanced custom content filters, Regular Expressions have been added, so IT Administrators can easily create their own data algorithms to be scanned in documents, which are consequently blocked and reported.

Additionally, enhancements to the Offline Temporary Password features help mobile workforces obtain access to removable devices and enable users to send / upload files that normally are not authorized. The new version also provides a Custom Classes option, which can be used in scenarios like authorizing a specific brand of devices that are given by the management to employees.

To test the new features, create a free account at: http://www.endpointprotector.com/products/my_endpoint_protector_SaaS.

About CoSoSys

CoSoSys is specialized in network Device Control, Data Loss Prevention (DLP) for Windows, Mac OS X and Linux, Mobile Device Management (MDM) and Mobile Application Management for iOS and Android and development of applications for portable storage device encryption and enhancement. The application portfolio includes functions from device control, mobile device security, file tracing and shadowing, password security, data synchronization and network security. CoSoSys distributes its products globally through distributors, resellers and directly to users at http://www.EndpointProtector.com. CoSoSys enjoys a continuously growing installation base of users worldwide and was recognized in 2011 as one of the fastest growing technology companies being a winner of the 2011 Deloitte Technology FAST 50 ranking for Central Europe. The company has offices in Germany, the United States and Romania.

Press kit, images and additional materials:


# # #

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-21
Jalios JCMS 10 allows attackers to access any part of the website and the WebDAV server with administrative privileges via a backdoor account, by using any username and the hardcoded dev password.
PUBLISHED: 2019-11-21
Shibboleth Service Provider (SP) 3.x before 3.1.0 shipped a spec file that calls chown on files in a directory controlled by the service user (the shibd account) after installation. This allows the user to escalate to root by pointing symlinks to files such as /etc/shadow.
PUBLISHED: 2019-11-21
An exploitable local privilege escalation vulnerability exists in the GalaxyClientService installed by GOG Galaxy. Due to Improper Access Control, an attacker can send unauthenticated local TCP packets to the service to gain SYSTEM privileges in Windows system where GOG Galaxy software is installed....
PUBLISHED: 2019-11-21
Centreon Web 19.04.4 allows Remote Code Execution by an administrator who can modify Macro Expression location settings.
PUBLISHED: 2019-11-21
Centreon Web 19.04.4 has weak permissions within the OVA (aka VMware virtual machine) and OVF (aka VirtualBox virtual machine) files, allowing attackers to gain privileges via a Trojan horse Centreon-autodisco executable file that is launched by cron.