Protecting data on
more than 30 million devices

+1-888-576 6177
CASE STUDY | AEROSPACE ENGINEERING  
Zeppelin Airship Technology
Zeppelin Airship Technology secures
USB ports with Endpoint Protector
Hardware Appliance
Download PDF
  PROFILE
Industry
Aerospace Engineering
 
The Challenge
Protection against theft of
company data over
commonly used ports for
data transfer such as USB
 
The Solution
Endpoint Protector
Hardware Appliance
 
Why Endpoint
Protector Appliance?
• Central Management
   of ports and interfaces
• Internal Protection of
   the company network
• Traceability of all
   actions at ports and
   interfaces
 
“The Endpoint Protector
Hardware Appliance is
an easy-to-use security
solution that meets our
expectations in full”
Director IT | CIO
ZLT Zeppelin
Luftschifftechnik
GmbH & Co KG

Zeppelin Airship Technology secures
portable devices and ports with the
Endpoint Protector Hardware Appliance

Zeppelin Airship Technology


About ZLT Zeppelin Luftschifftechnik GmbH & Co KG


Since 1993, the ZLT Zeppelin Luftschifftechnik GmbH &
Co KG (ZLT) has been developing, manufacturing and
marketing Zeppelins of New Technology.

Based on the technology introduced by the very company
founded over 100 years ago by Count Ferdinand von
Zeppelin, ZLT has kept intact the business combination for
airship development and manufacturing to this day,
preserving the memory of the world famous airships built in
the early 20thcentury.

The Challenge


About 100 Windows XP workstations within ZLT offices, all
with interfaces and ports such as USB or CD/DVD devices,
have been available for easy access by all users. Accidental
loss or deliberate data theft of company data via standard
interfaces through the endpoints was theoretically possible
for everyone. Our challenge was to prevent this from
actually happening.

The use of portable programs and even executing files and
applications from portable storage devices needs to be
controlled and monitored carefully. Additional protection
against the introduction of malware such as Stuxnet
(Conficker) by such devices was also required by ZLT.

The Solution


The ZLT Zeppelin Luftschifftechnik GmbH had been using
for quite some time the Endpoint Protector 2009 software
solution to ensure the security of their PC interfaces.

To further optimize the internal IT infrastructure, the IT
Director has decided to switch to the now available
Endpoint Protector Hardware Appliance.

Other software solutions that were evaluated in the process
have been DeviceWatch, DeviceGuard and Safend.

By using the Endpoint Protector Hardware Appliance for the
central management of all interfaces and ports, the internal
protection of the company network and the transparency of
user activity in connection with portable device use has
become even easier for the IT department.

Administration and management are rendered extremely
easy by the intuitive Web-based reporting and
administration interface. Through its device control
and data loss prevention features such as file tracing and file
shadowing, the appliance provides a consistent record of all
activities, allowing an ongoing investigation of any activity
related to port and portable device use and possible reporting
to the company's management in the event of irregularities.

About the Endpoint Protector Appliance


Endpoint Protector Hardware Appliance is a complete, ready
to use solution providing device control and data loss
protection in a fast and affordable way for both Windows
PCs and Macintoshs in company networks.

It allows companies to develop and implement a device
security policy within minutes for maximum protection of
USB and other ports, while protecting existing resources
and saving time and money.

     
     
CoSoSys Ltd. CoSoSys USA CoSoSys Deutschland
E-Mail:
Phone:
Fax:
  sales@cososys.com
+40-264-593110
+40-264-593113
  sales.us@cososys.com
+1-888-576 6177
  sales.de@cososys.com
+49-7541-978-2627-0
+49-7541-978-2627-9
 
CoSoSys
Data Security Care
 

Testimonials

Secure it Easy gives us the ability to manage the controlled use of portable USB devices, external hard drives, FireWire devices, CD/ DVD-Readers/ Writers and many other potentially harmful endpoint devices, while also stopping malware, viruses and other unwanted data intrusions.
Dan Fontaine, VP of Technology, VIPdesk
IT Business Edge - Endpoint Protector Review
Touted as an all-in-one device offering that works straight out of the box without the need for complicated server setup, the device secures endpoints with just a few clicks of the mouse.

Newsletter

Feel free to subscribe yourself to our newsletter.

Mr.   Ms.
 
First Name

Last Name

E-mail *
Company