New USB Enforced Encryption Device for Mac OS
Protects Key Corporate Data Copied from Apple Computers to Removable Storage Devices
March 28, 2014
PRESS RELEASE
San Francisco, CA and Cluj-Napoca, Romania – March 26, 2014 – A long awaited solution for companies seeking to secure sensitive data and prevent data loss on computers using Mac OS X was launched today by CoSoSys, a leading provider of cross-platform Data Loss Prevention (DLP), Device Control and Mobile Device Management (MDM) solutions. Endpoint Protector 4 is the first DLP tool that provides enforced encryption on removable storage devices for Mac OS X.
The popularity of Apple computers, in addition to BYOD and BYOC trends, has helped Macs become part of the business environment. Today, more Apple computers and devices access the corporate network, and store growing volumes of sensitive company data. As a result, interest from criminals and others intent on exploiting security vulnerabilities and data breaches in Macs has risen.
It has always been a challenge for IT administrators to find solutions and tools compatible with Mac OS X, but now securing the network and data Mac users access is also becoming a priority. CoSoSys' Endpoint Protector 4 with Enforced Encryption on removable storage devices for Mac OS X solves these problems. It offers an easy, yet secure way for Mac users to encrypt data copied onto USB storage devices. With intuitive 'drag & drop' and copy/paste features, all information copied on the device is instantly protected by password-based military strength AES 256-bit encryption. The Enforced Encryption functionality also incorporates an additional security feature that deletes information if an attempt is made to tamper with the data, or when the device gets lost or stolen.
“After CoSoSys created the first Content Aware Protection solution for Mac OS X, the development of Enforced Encryption on USB storage devices is yet another example of how we are bridging the gap in security between Mac and Windows computers," said Roman Foeckl, CoSoSys CEO. "Endpoint Protector 4 together with the Enforced Encryption is an easy to use, but highly effective DLP tool that allows Apple end users to safeguard confidential data with confidence. Providing solutions simple enough for anyone to use engages everybody in security, which helps users and IT admins view protecting data as a joint responsibility and effort."
Enforced Encryption from CoSoSys turns any removable storage device into a Trusted Device. Combined with CoSoSys' Content Aware Protection and Device Control for Mac OS X, the Endpoint Protector product line provides a complete Data Loss Prevention (DLP) solution for SMBs and enterprises.
For more information about Data Loss Prevention for Mac OS X and other CoSoSys solutions, visit:
http://www.endpointprotector.com/solutions/data_loss_prevention_DLP_for_Mac_OS_X
About CoSoSys
CoSoSys specializes in network device control, endpoint security and data loss prevention (DLP) for Windows and Mac OS X, Mobile Device Management (MDM) for iOS and Android, and development of applications for portable storage device encryption and enhancement. Our application portfolio includes functionalities encompassing device control, mobile device security, file tracing and shadowing, password security, data synchronization and network security.
CoSoSys distributes its products globally through a network of distributors and resellers, as well as directly to users via http://www.EndpointProtector.com.
CoSoSys enjoys a continuously growing base of users worldwide, and was recognized in 2011 as one of the fastest-growing technology companies as a winner of the 2011 Deloitte Technology FAST 50 ranking for Central Europe. CoSoSys has offices in Germany, the United States and Romania.
Press materials, images and additional information can be downloaded at:
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024