CoSoSys Upgrades Endpoint Protector 2009 DLP Offering

Endpoint security solution offers increased control over sensitive data through the File Whitelisting feature

March 19, 2009

3 Min Read


Bucharest, Romania, March 17, 2009. CoSoSys, vendor of the most innovative and effective applications for endpoint security and portable storage devices, launches today the latest version of its DLP (Data loss Prevention) and Device Control solution, Endpoint Protector 2009. The current business environment harbors risks that companies of all sizes must permanently face, from disgruntled terminated employees that take confidential data when they leave, to accidents exposing the private details of their entire customer base and to malicious attempts to breach security for a quick gain. This best-of-breed endpoint security and DLP application aims to help companies stay clear of such threats and concentrate on strengthening and growing their business instead.

The new Endpoint Protector version is the first solution of its class to offer increased control over sensitive data through the File Whitelisting feature. This functionality allows companies to decide which files can be copied to portable devices and which files are restricted, while keeping a record of all attempted file transfers. The increased protection also comes with the newly introduced Lockdown Mode, a feature designed to stop potential ongoing security breaches by immediately blocking all the endpoints in your network and stopping all data transfers and devices in use.

Endpoint Protector 2009 also focuses on helping companies save time and increase productivity by making daily tasks easier for both system administrators and PC users in their staff. The solution comes with a new and improved web-based administration tool, more intuitive and with a multilingual interface that is currently available in five languages (English, German, French, Romanian and Hungarian). Daily administration activities are also aided by the wizard introduced to easily manage devices within a network and the System Snapshots that record previous configuration sets for seamless roll backs to previous policies.

To help non-technical employees stay mobile and productive, Endpoint Protector 2009 offers a wider range of controlled portable devices, from iPods, cameras and USB sticks to ExpressCard SDD and printers. It also comes with faster and more efficient Active Directory synchronization and additional protection in networks where employees have administrative privileges on their PCs making it extremely difficult for them to delete the application from their PC or laptop.

"Our main goal is to keep providing businesses of all sizes with the freedom not to restrict the usage of portable storage devices altogether, while keeping a close track over potential abuse and effectively preventing all potential data breaches. This way, companies can use increased portability and mobility to their advantage, without having to pay an extremely high price for not securing them beforehand," explains Roman Foeckl, CoSoSys CEO. Endpoint Protector 2009 is designed to minimize internal threats, reduce the data leakage risks and control devices connected at endpoints. It allows IT departments to proactively take control of the device internal use, while tracking all data transferred in or out of the protected network and enforcing encryption of the data in transit on portable devices. The new Endpoint Protector version is available as a free 30 day trial or online demo at

About CoSoSys CoSoSys is specialized in network endpoint security and development of software for portable storage device enhancement. The application portfolio includes functions from password security, data synchronization and network security. CoSoSys distributes its products globally through the world's leading hardware manufacturers, software Distributors, Resellers and directly to users at and CoSoSys enjoys a continuously growing installation base of users worldwide. The company has offices in Germany, the United States and Romania.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights