Endpoint Protector
Endpoint Protector (EPP) by Cososys is an award-winning Data Loss Prevention solution suitable for any organization regardsless of size or industry. EPP is provided as hardware and virtual appliance, or as cloud infrastructure. It is easy to configue and provides cross-platform Data Loss Prevention tools that ensure seamless control of USB and peripheral ports, scan data in motion and data at rest, enforce encryption and offer enterprise mobility management.
Characteristics
Device Control
The Device Control module is the first layer of security provided by Endpoint Protector. By defining granular access rights for USB and peripheral ports, device security is enforced while productivity is maintained. As a cross-platform solution, it protects the entire network, regardless if the computers are running on Windows, Mac OS X or Linux.
Content Aware Protection
The Content Aware Protection module is the second layer of security provided by Endpoint Protector. It prevents data leakage through all possible exit points, from clipboard, screen captures, USB devices, to applications including Microsoft Outlook, Skype or Dropbox, OneDrive and even Social Media sites. Through efficient content inspection, transfers of important company documents will be logged, reported and managed.
The Content Aware Protection module allows management of file transfers via the most common exit points, preventing data leakage.
eDiscovery
The eDiscovery module from Endpoint Protector provides Data Loss Prevention for data at rest. It prevents data breaches by scanning and identifying sensitive data at the endpoint level on Windows, macOS, and Linux computers. Endpoint Protector eDiscovery ensures compliance with regulations like HIPAA, PCI DSS and others. eDiscovery offers visibility into scans, identifying where confidential data resides and remediating by encrypting or deleting the identified confidential data.
Mobile Device Management
The Mobile Device Management module extends data security and control over the iOS and Android mobile device fleet. It also provides features for Mac OS X computers. Through remote enforcement of strong security policies, detailed monitoring, logging, and reporting of all mobile device activity, it provides enhanced protection against both insider and outsider threats. Moreover, it also includes Mobile Application Management.
Active Care Support Service Overview
We proactively perform periodic health checks in your environment.
We replicate your environment for troubleshooting and reviewing changes.
Our engineers connect remotely to your system for immediate support.
You have your own personal support engineer.