Our manufacturer portfolio includes more than 10,000 manufacturers from whom we source and procure products for our resellers. The most intensive contact is with our distribution partners. Together with them, we develop regular marketing and sales campaigns. Here you can get to know our distribution partners.
CoSoSys’ mission since 2004 is to enable businesses and end users around the world to take full advantage of the performance benefits of mobility, portability, and communications solutions, without compromising security. To achieve this, they develop solutions that prevent data loss on the ever-increasing number of devices, endpoints, and mobile devices accessing and storing sensitive data.
CoSoSys offers a rich portfolio of security products and features for device control, data loss prevention (DLP), and eDiscovery for Windows, macOS and Linux, as well as the development of applications for portable storage device encryption and enhancement. The application portfolio includes functionalities including device control, mobile device security, file tracing and shadowing, DLP for data in motion and at rest, file / sensitive data password security, data synchronization and network security. The company strives to make powerful and effective products that can be deployed in hours, simple enough for any IT Administrator to use, all from one centralized web interface.
CoSoSys won numerous, well-known awards. This includes being named a winner of the Deloitte Technology 50 fastest-growing companies.
Download Endpoint Protector Datasheet as PDF.
We are happy to provide more information or a professional quote for this manufacturer. We speak German, English, French, Hungarian, Serbian and Croatian.Request a Quote
Volume license ✔
Reseller discount without registration ✔
Deal registration ✔
IS YOUR SENSITIVE DATA AT RISK?
Lockdown, control, and monitor USB and peripheral ports to stop data theft and data loss.
USB flash drives and other portable USB devices, although harmless at a first glance, are one of the top causes for security incidents which can cause major damages to any business. Damages range from confidential data being stolen to huge fines due to violations of compliance rules and regulations.
- Cross-platform, lightweight agent
Remotely monitor USBs and peripheral ports from a simple web-based interface with no performance impact on the protected computers. Set policies with ease for Windows, macOS and Linux.
- Remote and temporary access
Grant USB access remotely, even when computers are offline, while having a complete list of log reports once back in the network.
- Precise and granular control
Depending on departments’ requirements, specify which devices can or cannot be used, create device whitelists and blacklists, and define policies per user, computer, or group for uninterrupted workflow throughout the company.
CONTENT INSPECTION AND CONTEXTUAL SCANNING OF DATA FOR REMOVABLE DEVICES & APPLICATIONS LIKE OUTLOOK, SKYPE, DROPBOX & OTHERS
The use of more cloud-based services, from Dropbox to web-based e-mail, has increased the number of accidental or intentional data leakage incidents in the last years. Data Leakage Prevention (also called Data Loss Prevention or short DLP) has become one of the main security challenges for companies all over the world. Careless employee behavior is actually being considered a greater security threat than external attackers, highlighting the need for a close and detailed monitoring of all data transferred outside the companies' networks.
Content awareness is vital in order to protect sensitive enterprise data. When data leaves the endpoint (Windows PCs, Macs and Linux computers) through cloud applications, USB sticks or e-mail, you need to be sure that the content is not against your policy. This is where Content-Aware Data Loss Prevention helps you.
One simple example is telephony; you want your company to be as efficient, productive and cost-conscious as possible. You allow users or even encourage them to use Skype. Great to reduce call costs and people connected to work efficiently. On the downside, who knows what files they transfer outside the company network using Skype’s file transfer features? With Content Aware Protection you can take control at the endpoint of what data is allowed to be transferred using Skype.
Here are more reasons why Content-Aware DLP is required in today's workplace:
- Skype is great in many ways but it is also a big risk factor to lose sensitive data.
- Dropbox and Google Drive are great ways to improve productivity, but an even greater way for data to be leaked, lost or stolen.
- Slack is the new preferred messaging and workstream collaboration tool for teams, but file sharing is extremely easy, exposing the organization to potential data breaches.
ENCRYPT, MANAGE & SECURE USB STORAGE DEVICES
With accessibility and portability being an important part of our daily work, securing confidential data and transfers has shifted from a “nice to have” to a “must have”. Data stored on computers, on cloud storage or on USB devices can get into the wrong hands and therefore needs to be protected. An easy to use, cross-platform encryption solution is the best way to ensure confidential data will not fall into the wrong hands due to unauthorized access, lost or stolen devices.
EasyLock USB Enforced Encryption combined with Endpoint Protector allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted. As a cross-platform solution, EasyLock can be used on both macOS and Windows computers. Via a secured password, users can safely transfer confidential data and access it on any computers or only on authorized ones. Moreover, some additional useful features are available for IT Administrators like remotely sending messages to the users, requesting a password change or wiping the confidential data in case the device is lost or stolen.
- Additional layer of security
Using Enforced Encryption, users will be authorized to transfer confidential data only on encrypted USB portable storage devices. Data will be safe even if a device is lost or stolen, due to the password-protected encrypted area.
- Compliance with industry regulations
Numerous industry regulations ask for confidential data to be encrypted regardles of where it resides. Enforced Encryption helps being compliant with HIPAA, PCI DSS, SOX, and others, securing USB devices.
- Data Leakage Prevention
The Endpoint Protector DLP solution will be enhanced with EasyLock Enforced Encryption, making sure sensitive data is secured and data leakages are avoided.
- Business continuity
Minimize risks of data losses that can affect business due to fines, lawsuits, and negative brand image. Take cake of your business, instead of managing data loss consequences.
SCANNING SENSIBLE DATA FROM EMPLOYEES & PROACTIVELY PREVENTING INFRINGEMENTS
Endpoint Protector DLP for data at rest (eDiscovery) scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It addresses both internal and external threats – unauthorized employees storing sensitive data on their computers and attackers which manage to bypass the network defense and try to get a hold of company’s records. For organizations collecting and managing data like Credit Card Numbers (CCNs), Personally Identifiable Information (PII), Social Security Numbers (SSNs), and other employees’ records as well as business records and Intellectual Property (IP), it is imperative to ensure information protection and to make sure that confidential data is safely stored.
Organizations implementing Endpoint Protector eDiscovery can achieve regulatory compliance with HIPAA, PCI-DSS, GDPR, and others, avoiding fines and other damages imposed by regulatory entities.
eDiscovery is available as a module within Endpoint Protector and does not require separate installation, being easily activated within the management console. A single endpoint agent is deployed for both Content Aware Protection (DLP for data in motion) and eDiscovery.
- Flexible policies based on whitelists and blacklists
Whitelists based on file type and file name exclude from scanning specific files, like pictures, video files and others, reducing scan time and consumed resources. Blacklists are based on file types, predefined content, custom content (dictionaries) and file name, allowing IT Administrators to build policies according to the type on sensitive data stored on users' workstations.
- Quick access to scan results and remediation actions
The eDiscovery section offers visibility into scans, the matched sensitive items, the precise location of the discovered data, and remediation actions such as encrypt data and delete data at rest, for immediate reaction in case non-compliant data is identified.
- Intuitive scanning setup
With a few simple steps, scans can be setup based on specific time, recurrence, and entities to be included in the scan. A list with previous scans is also available.