Data has never been more vulnerable than it is today. Companies struggle to keep their data secure as relentless waves of attacks strike at the core of some of the world’s most established brands and trusted online services. Added pressure comes from the adoption of data protection regulations across the globe and the need for every data collector to comply with them.
Data on the move is particularly susceptible to data loss as it is open not only to physical theft, but also human error: portable devices are often forgotten, lost or left open to third party tampering. With today’s work force becoming ever more dynamic, organizations search for solutions that will continue to allow their employees to retain their mobility while also protecting the data they carry with them.
EasyLock Enforced Encryption was developed to address this specific vulnerability in data protection by enabling…Read more
Today marks the release of the latest update of our award-winning cross-platform Data Loss Prevention (DLP) solution, Endpoint Protector 126.96.36.199, that brings with it much-anticipated new features along with a number of improvements to existing functionalities.
The Endpoint Protector development team has been hard at work to bring a significant boost to our already advanced DLP product. Many of our newest features started as suggestions from partners and customer which we later decided to implement.
Here are the highlights of Endpoint Protector 5.2:Contextual Scanning
Contextual Detection is now available as a general feature for both the Content Aware Protection and the eDiscovery modules. It offers an advanced way of inspecting confidential data based on both content and context.
Admins can define complex detection patterns based on proximity to other related or unrelated…Read more
Today marks the launch for public use of macOS 10.14, dubbed Mojave. First announced at the Apple Worldwide Developers Conference (WWDC) 2018, the new version brings new features inspired by pro users, but designed for everyone. It introduces the Dark Mode which dims the screen outside users’ work area, helping them to better focus on the task at hand. Dark Mode also makes macOS’s color scheme customizable, allowing users to swap Apple’s traditional white with black.
A new feature, Stacks, automatically organizes files on desktops, by either document type (images, documents, spreadsheets etc.), dates or tags with project-specific metadata such as company names. Three popular iOS apps are heading to macOS: Apple News, Stocks and Voice Memos. Apple mail will also support emojis from now on. A new app, Home, will allow users to now manage internet-of-things devices from…Read more
Since its adoption the EU’s General Data Protection Regulation (GDPR) has created a domino effect around the world, with many countries moving forward with proposals for new data protection regulations or updates to existing ones. From Brazil’s Data Protection Bill of Law to China’s Internet Security Law, it seems data protection legislation is on every country’s agenda.
Australia is no different. In fact, it was one of the countries to get a head start in aligning its 1988 Privacy Act to some of the new concepts and requirements introduced by the GDPR. The Privacy Amendment (Notifiable Data Breaches) Act 2017 was adopted in November 2017 and actually came into force before the GDPR, on 22 February 2018.
As its name suggests, the Notifiable Data Breaches (NDB) scheme introduced mandatory data breach notifications into Australia’s Privacy Act 1988. It puts organizations…Read more
In an age when data can no longer be left unsorted on company networks and data transparency and the protection of sensitive data have become key to reaching compliance with legislations such as the EU’s General Data Protection Regulation (GDPR) and HIPAA, FISMA, NIST etc. in the US, data classification and Data Loss Prevention have emerged as essential tools for effective data management strategies.
In this week’s blog post we take a closer look at data classification, what it is and how DLP solutions benefit from integration with it.What is Data Classification?
Much like its name implies, data classification is the process of organizing data into appropriate categories for a more efficient use and protection of data across company networks.
In the context of information security, data is tagged based on its level of sensitivity, making it easier to find, track and safeguard …Read more
We always enjoy hearing from our customers and partners and their experience with the Endpoint Protector product family. It’s not only a matter of professional satisfaction: we build our products with our clients’ needs always before us, often adding new features from feedback sessions or developing them together with customers.
This year, we decided to dedicate an entry on our blog to the top ten features that are most often mentioned by our customers and that rank the highest on their list of things they love about Endpoint Protector. Without further ado, here they are:1. Easy to install and manage
With one of the biggest concerns about the adoption of Data Loss Prevention (DLP) solutions being how long a potential implementation will take and how difficult the product will be to manage once it’s in place, it is no surprise that our customers are relieved and often enthusiastic…Read more
It’s been over two months since the EU’s General Data Protection Regulation (GDPR) has come into force on May 25th and, after a feverish rush for compliance overtook all businesses, a period of relative calm followed in the wake of its implementation. Whether this was because both organizations and users suffered from an oversaturation of GDPR-related content, updated privacy policies and consent requests or the new regulation has yet to shed its training wheels, the GDPR has effectively left the limelight.
That being said, if it’s not making headlines as it did a year ago, the GDPR is leaving its mark on the data protection field by being the first legislation of its kind to tackle present-day dangers to data security and companies’ accountability to their customers and the law in the face of these threats.
The post-GDPR world is one full of anxiety and opportunity. Many companies…Read more
macOS devices are becoming an ever more prominent presence in the work place. This is chiefly due to two trends: bring your own device (BYOD) and employee choice policies. The first allows employees to bring their own devices onto the company network, while the second lets them choose which device they will be using in the work place. A survey conducted by Jamf earlier this year showed that, in the 580 organizations that participated, 72% of employees chose Macs and a further 75% chose iPhones when given the option.
Apple has been actively pushing for a higher adoption rate of Macs in the business environment, with new security features in High Sierra specifically aimed at enterprises. With the launch of its new 64-bit Apple File System (APFS), native encryption options available through FileVault and the possibility to set a firmware password that will prevent non-standard booting through…Read more
The latest iOS update, 11.4.1, released last Monday, brings with it a new feature meant to safeguard users’ data: USB restricted mode. From now on, if iOS devices have not been unlocked within the past hour, users will be required to enter their passcode when connecting to a Mac or PC or when trying to connect USB accessories to their iPhone, iPad or iPod touch.
This needs to be done only once when first connecting. Even if the devices are then locked, the USB accessories or computer connection will continue. If users don’t first unlock their passcode-protected iOS devices or they haven’t done so in the past hour, their devices will not communicate with the accessory or computer and, in some cases, not even charge. They might also see an alert asking them to unlock their device to use accessories.Meeting security concerns
While this feature may have little impact on the everyday use of…Read more
At Endpoint Protector, we like to take on challenges. When we received more and more requests from customers for the monitoring and blocking of source code, we decided to investigate the matter further and improve on our existing detection techniques. Like any intellectual property, after all, source code is often considered sensitive data depending on the sector a business operates in.
While there are libraries available for programming languages, for them to be effective, they must have an in-depth knowledge of the way these different languages operate in order to accurately differentiate between them. This leads to complex, heavyweight databases that can severely affect the efficiency and speed of the software using them.
Knowing that N-gram-based text categorization had been successfully used to detect natural languages in text in a number of use cases, we theorized that…Read more