Protecting data on
more than 30 million devices
Content Aware Protection
Data Loss Prevention for removable devices, applications like Outlook, webmailers, Skype, Dropbox and more
Content Aware Protection (Content Filtering) - Content-Aware Data Loss Prevention (DLP)

Content Aware Protection (Content Filtering)

Content Aware Protection
Use of more cloud based services from Dropbox to web-based e-mail has in the last years, increased the number of accidental or intentional data leakage incidents. Endpoint Data Leakage Prevention (also called Data Loss Prevention or short DLP) has become one of the principal security challenges for companies all over the world. Careless employee behavior is actually being considered a greater security threat than hackers, highlighting the need for a close and detailed monitoring of all data transferred outside of companies networks.

To protect your sensitive company data you need to be aware of its content. If data leaves the endpoint (Windows PCs, Macs and Linux) to the cloud, USB Stick or in an e-mail, you need to be sure that its content is not against your policy. This is where Content-Aware Data Loss Prevention (DLP) helps you.

One simple example is telephony; you want your company to be as efficient, productive and cost-conscious as possible. You allow users or even encourage them to use Skype. Great to keep call costs low and people connected to work efficient. Downside, who knows what files they transfer outside the company network using Skype’s file transfer features? With Content Aware Protection you can take control at the endpoint what data content is allowed to be transferred using Skype.

- Skype is great in many ways but it is also a big risk factor to lose data
- Dropbox and Google Drive are great ways to improve productivity, but an
  even greater way for data to be leaked, lost or stolen

Don’t let applications and data unsupervised!

What it does?

- Prevent intentional data theft
- Prevent accidental data loss and data leakage
- Stop irresponsible data use by employees
- Monitor all data transfers, either directly
  performed or through a simple copy & paste
- Block screen captures
- Provide compliance
How we prevent?

- Inspect data transfers to applications like e-mail, cloud services,
  web-browsers, file sharing applications, etc.
- Data transfers to removable devices is inspected
- Detecting transfers of regulated data types such as Credit Card
  Numbers (CCN) or Social Security Numbers (SSN)
- Detection of keywords in files based on custom dictionaries, etc.
- Filtering of File Types
- Inspect Clipboard and deactivate Print Screen capabilities

We offer advanced content aware protection for monitoring and blocking unauthorized data transfers:

1. Data in Motion analysis: Complete content scanning of all data in motion.
2. Monitor: Control screen captures, clipboard and all transfers to portable devices, and through
    online applications like E-mail clients, webmail, web-browsers, instant messaging etc.
3. Block: Stop transfers of sensitive data.
4. Report: Find out when, how and who is attempting to take data outside the company network
5. Manage: Create and enforce strong content filtering policies across your company.

Check the complete list of monitored applications
Supported Applications
Web Browsers
Internet Explorer, Mozilla Firefox, Chrome, Opera, Safari, SeaMonkey, Maxthon, AOL Destop 9.6, K-Meleon, Aurora Firefox
E-mail Clients
Microsoft Office Outlook, Mozilla Thunderbird, Windows Live Mail, Outlook Express, Windows Mail, AOL Mail, Opera Mail, SeaMonkey Mail, Courier, IBM Lotus Notes
Instant Messaging
AIM, eBuddy, MySpace IM, ICQ, Google Talk, Skype, Windows Live Messenger, Yahoo! Messenger, mIRC, Trillian, MyChat, LingoWare, Chit Chat For Facebook, Nimbuzz, Facebook Messenger, Microsoft Communicator 2007, Facemoods, Gaim, LAN Chat Enterprise, OpenTalk, TurboIRC, WinSent Messenger, Pink Notes Plus, fTalk, XChat, ooVoo, TweetDeck, Pidgin Instant Messenger
Cloud Services /
File Sharing
iCloud, Google Drive, Microsoft SkyDrive, Dropbox, eMule, Kazaa, Shareaza, Morpheus, eDonkey, DC++, BitTorrent, Azureus, BitComet, uTorrent, iMesh
Social Media / Others
Facebook & Co. (through web-browser), InfraRecorder, iTunes, Nokia PC Suite 2008 / 2011, Samsung Kies, Sony Ericsson PC Companion, TeamViewer, HTC Sync for Android phones, Total Commander, LogMeIn, EasyLock, GoToMeeting, Windows DVD Maker, FileZilla

How it works?

Content Aware Protection (Content Filtering)
Define and enable content DLP policy
Define what content is sensitive
Scan all data transfers (to devices, applications, online services) for sensitive data
Action (blocked and/or reported) is taken if policy violation is detected


Precise control over transfer of documents
Enforce corporate policy by ensuring documents containing confidential data are not shared outside the company. Everything without compromising productivity.
Support for collaboration and communication
Take advantage of the collaborative tools using Skype, Facebook and other online applications while minimizing the risks posed by sharing files containing sensitive information.
Filter what data can or cannot leave the company
Start with general filters and progress granularly to advanced filters.
Compliance to industry standards
Make sure your company complies with the current strict regulations and standards that apply to your industry.
Define your confidential data
Create custom rules to detect and block transfer of data you consider sensitive.
Business continuity
Minimize risks of data losses that can affect business due to image prejudice, fines and lawsuits.

Our Products:

Endpoint Protector

Endpoint Protector

On-premise Data Loss Prevention available as hardware or virtual appliance
  • Device Control (for Windows, Mac and Linux)
  • Content Aware Protection (for Windows, Mac and Linux)
  • Mobile Device Management (for Android and iOS)

My Endpoint Protector

My Endpoint Protector

Cloud-based Data Loss Prevention available anywhere, anytime
  • Device Control (for Windows and Mac)
  • Content Aware Protection (for Windows and Mac)
  • Mobile Device Management (for Android and iOS)

Our customers include industry leading companies:

CoSoSys Customers



Endpoint Protector 4 wins the DLP Solution of the Year Award for the second year in a row at Computing Security Awards 2015Endpoint Protector 4 receives Common Criteria EAL2 Certification

Need our solutions?

We are ready to help! Please fill in the form below and we will contact you shortly.

I'm interested in:

Please contact me on: