Protecting data on
more than 30 million devices
Zeppelin Airship Technology
Zeppelin Airship Technology secures
USB ports with Endpoint Protector
Hardware Appliance
Download PDF
Aerospace Engineering
The Challenge
Protection against theft of
company data over
commonly used ports for
data transfer such as USB
The Solution
Endpoint Protector
Hardware Appliance
Why Endpoint
Protector Appliance?
• Central Management
   of ports and interfaces
• Internal Protection of
   the company network
• Traceability of all
   actions at ports and
“The Endpoint Protector
Hardware Appliance is
an easy-to-use security
solution that meets our
expectations in full”
Director IT | CIO
ZLT Zeppelin
GmbH & Co KG

Zeppelin Airship Technology secures
portable devices and ports with the
Endpoint Protector Hardware Appliance

Zeppelin Airship Technology

About ZLT Zeppelin Luftschifftechnik GmbH & Co KG

Since 1993, the ZLT Zeppelin Luftschifftechnik GmbH &
Co KG (ZLT) has been developing, manufacturing and
marketing Zeppelins of New Technology.

Based on the technology introduced by the very company
founded over 100 years ago by Count Ferdinand von
Zeppelin, ZLT has kept intact the business combination for
airship development and manufacturing to this day,
preserving the memory of the world famous airships built in
the early 20thcentury.

The Challenge

About 100 Windows XP workstations within ZLT offices, all
with interfaces and ports such as USB or CD/DVD devices,
have been available for easy access by all users. Accidental
loss or deliberate data theft of company data via standard
interfaces through the endpoints was theoretically possible
for everyone. Our challenge was to prevent this from
actually happening.

The use of portable programs and even executing files and
applications from portable storage devices needs to be
controlled and monitored carefully. Additional protection
against the introduction of malware such as Stuxnet
(Conficker) by such devices was also required by ZLT.

The Solution

The ZLT Zeppelin Luftschifftechnik GmbH had been using
for quite some time the Endpoint Protector 2009 software
solution to ensure the security of their PC interfaces.

To further optimize the internal IT infrastructure, the IT
Director has decided to switch to the now available
Endpoint Protector Hardware Appliance.

Other software solutions that were evaluated in the process
have been DeviceWatch, DeviceGuard and Safend.

By using the Endpoint Protector Hardware Appliance for the
central management of all interfaces and ports, the internal
protection of the company network and the transparency of
user activity in connection with portable device use has
become even easier for the IT department.

Administration and management are rendered extremely
easy by the intuitive Web-based reporting and
administration interface. Through its device control
and data loss prevention features such as file tracing and file
shadowing, the appliance provides a consistent record of all
activities, allowing an ongoing investigation of any activity
related to port and portable device use and possible reporting
to the company's management in the event of irregularities.

About the Endpoint Protector Appliance

Endpoint Protector Hardware Appliance is a complete, ready
to use solution providing device control and data loss
protection in a fast and affordable way for both Windows
PCs and Macintoshs in company networks.

It allows companies to develop and implement a device
security policy within minutes for maximum protection of
USB and other ports, while protecting existing resources
and saving time and money.

CoSoSys Ltd. CoSoSys USA Endpoint Protector GmbH
+1 888 271 9349
Data Security Care


Endpoint Protector’s simplicity has exceeded our expectations. The speed of deployment and changes is impressive and its encryption features are just what we needed.
Conrad Morgan, Manager ICT Security, Paymark, New Zealand
IT Business Edge - Endpoint Protector Review
Touted as an all-in-one device offering that works straight out of the box without the need for complicated server setup, the device secures endpoints with just a few clicks of the mouse.


Feel free to subscribe yourself to our newsletter.

Mr.   Ms.
First Name

Last Name

E-mail *