Download our FREE whitepaper on data loss prevention best practices. Download Now

What’s New in Endpoint Protector 5.2.0.8

We’re eager to announce that the new version of our award-winning Data Loss Prevention (DLP) solution has been released. Endpoint Protector 5.2.0.8 is out with the aim of offering enhanced data protection options during these challenging times.

The COVID-19 pandemic created a surge in data protection, and many enterprises had to adopt remote working policies suddenly. For us, it was essential to introduce new features and functionalities that can safeguard sensitive data in an advanced way regardless of where employees are located.

Let’s dive into the latest new features and product improvements that Endpoint Protector 5.2.0.8 brings:

Cross-platform Deep Packet Inspection (DPI)

The Deep Packet Inspection functionality is available for Windows, macOS, and Linux computers and enhances data security in multiple ways. With DPI, it is possible to whitelist internal or external URLs accessed via web browsers. This way users can upload files containing confidential data on trusted destinations without the Endpoint Protector client scanning or blocking the file uploads. Seeing the destination URL is an added benefit.

Another advantage of the functionality is that it can scan the email body for sensitive content as well as whitelist or blacklist email domains. By whitelisting the internal email domain, communication between employees will not be scanned, only emails sent to external recipients will be monitored for sensitive information. The email body can be scanned now for sensitive content in all supported email clients.

Main MAC address & MAC address list

This feature provides better visibility of the protected endpoints, and it is particularly useful in home office cases. Additionally, the extra information can be used to correlate the details provided by other security tools such as AV, inventory management, etc.

Cross-platform DLP for printers

Endpoint Protector 5.2.0.8 can monitor confidential file transfers to printers on macOS and Linux endpoints too, providing an overview of what data is being printed and by whom. Restrictions for files sent to printers can be set based on file content policies. Printers can be completely blocked to certain users, ensuring no data is leaked or stolen.

Two-factor authentication (2FA)

The option to enable two-factor authentication for all administrators is now available. 2FA is an extra layer of security, that makes access to the Endpoint Protector server more secure.

Extended source code detection

Source code is an important proprietary, confidential information; with Endpoint Protector, it is possible to accurately identify it as well as to apply policies to manage, limit, or block its transfer and use. The extended functionality allows better detection rules and helps in avoiding false positives when source code is detected within PDFs, DOCX, and other text files.

Improved granularity

Endpoint Protector 5.2.0.8 allows more granular device rights: rights can be set on a specific device, on a specific computer, and for a specific user. The application granularity had been also improved on Windows computers, and now the list includes Edge, Skype, Windows Mail, Facebook Messenger, OneDrive, WhatsApp Desktop, Dropbox, and Evernote.

In conclusion

With the latest version of Endpoint Protector, it is possible to inspect network traffic at an endpoint level, as well as to set more granular policies and to better protect your data even in remote working cases. Besides the highlights mentioned above, there are many other details to be discovered in Endpoint Protector 5.2.0.8. Whether you’re curious about additional PIIs, the eDiscovery dashboards or the EasyLock improvements, you can find the complete list of the updates on the Endpoint Protector website, under Release Notes.

explainer-c_learning

Download our free ebook on
Data Loss Prevention Best Practices

Helping IT Managers, IT Administrators and data security staff understand the concept and purpose of DLP and how to easily implement it.

In this article:

    Request Demo
    * Your privacy is important to us. Check out our Privacy Policy for more information.