Endpoint Protector Blog | All Data Security. All the time.

TOP 10 Endpoint Protector Features According to Our Clients

We always enjoy hearing from our customers and partners and their experience with the Endpoint Protector product family. It’s not only a matter of professional satisfaction: we build our products with our clients’ needs always before us, often adding new features from feedback sessions or developing them together with customers.

This year, we decided to dedicate an entry on our blog to the top ten features that are most often mentioned by our customers and that rank the highest on their list of things they love about Endpoint Protector. Without out further ado, here they are:

1. Easy to install and manage

With one of the biggest concerns about the adoption of Data Loss Prevention (DLP) solutions being how long a potential implementation will take and how difficult the product will be to manage once it is in place, it is no surprise that our customers are relieved and often enthusiastic…

Read more

Two Months Later: Living in a Post-GDPR World

August 3, 2018 Author: Compliance 0 Comments

It’s been over two months since the EU’s General Data Protection Regulation (GDPR) has come into force on May 25th and, after a feverish rush for compliance overtook all businesses, a period of relative calm followed in the wake of its implementation. Whether this was because both organizations and users suffered from an oversaturation of GDPR-related content, updated privacy policies and consent requests or the new regulation has yet to shed its training wheels, the GDPR has effectively left the limelight.

That being said, if it’s not making headlines as it did a year ago, the GDPR is leaving its mark on the data protection field by being the first legislation of its kind to tackle present-day dangers to data security and companies’ accountability to their customers and the law in the face of these threats.

The post-GDPR world is one full of anxiety and opportunity. Many companies…

Read more

5 Tips for Choosing the Best DLP solution for Macs

macOS devices are becoming an ever more prominent presence in the work place. This is chiefly due to two trends: bring your own device (BYOD) and employee choice policies. The first allows employees to bring their own devices onto the company network, while the second lets them choose which device they will be using in the work place. A survey conducted by Jamf earlier this year showed that, in the 580 organizations that participated, 72% of employees chose Macs and a further 75% chose iPhones when given the option.

Apple has been actively pushing for a higher adoption rate of Macs in the business environment, with new security features in High Sierra specifically aimed at enterprises. With the launch of its new 64-bit Apple File System (APFS), native encryption options available through FileVault and the possibility to set a firmware password that will prevent non-standard booting through…

Read more

Apple Introduces USB Restricted Mode

The latest iOS update, 11.4.1, released last Monday, brings with it a new feature meant to safeguard users’ data: USB restricted mode. From now on, if iOS devices have not been unlocked within the past hour, users will be required to enter their passcode when connecting to a Mac or PC or when trying to connect USB accessories to their iPhone, iPad or iPod touch.

This needs to be done only once when first connecting. Even if the devices are then locked, the USB accessories or computer connection will continue. If users don’t first unlock their passcode-protected iOS devices or they haven’t done so in the past hour, their devices will not communicate with the accessory or computer and, in some cases, not even charge. They might also see an alert asking them to unlock their device to use accessories.

Meeting security concerns

While this feature may have little impact on the everyday use of…

Read more

Using N-gram-based Text Categorization to Identify Programming Languages

July 13, 2018 Author: Tech Insights 0 Comments

At Endpoint Protector, we like to take on challenges. When we received more and more requests from customers for the monitoring and blocking of source code, we decided to investigate the matter further and improve on our existing detection techniques. Like any intellectual property, after all, source code is often considered sensitive data depending on the sector a business operates in.

While there are libraries available for programming languages, for them to be effective, they must have an in-depth knowledge of the way these different languages operate in order to accurately differentiate between them.  This leads to complex, heavyweight databases that can severely affect the efficiency and speed of the software using them.

Knowing that N-gram-based text categorization had been successfully used to detect natural languages in text in a number of use cases, we theorized that…

Read more

Top 5 Ways DLP can help with HIPAA compliance

July 5, 2018 Author: Compliance 0 Comments

Health data, due to its sensitive nature, has always been considered a special category of data and invariably falls under the jurisdiction of data protection regulations. Under the EU’s new General Data Protection Regulation (GDPR), it is explicitly classed as a special category of personal data under article 9 which requires the strict application of the regulation’s requirements. In the US, health data falls under the incidence of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH), two interconnected acts which together guarantee its protection.

Regulated by the Department of Health and Human Services (HHS), HIPAA is enforced by the Office of Civil Rights (OCR), outlines the lawful use and disclosure of protected health information (PHI) and guarantees its …

Read more

That’s a wrap! Endpoint Protector at Infosecurity Europe 2018

June 28, 2018 Author: Events 0 Comments

Infosecurity Europe 2018 once more welcomed information security professionals from around the world at the Olympia in London between 5-7 June. Europe’s largest and most comprehensive information security event, featuring over 240 free to attend conference sessions, more than 400 exhibitors and a staggering 19,500+ visitors, Infosecurity Europe 2018 is the place to be for anyone interested in feeling the pulse of the information security sector.

This year’s event was no different: tackling the theme of building tomorrow’s cybersecurity today, it offered a mix of panels and talks on already familiar risks along with those on emerging threats. After last year’s full-blown GDPR panic, data protection policies took a backseat to more attractive if considerably more worrying topics such as nation state attacks and AI and IoT related threats.

Baroness Dido Harding kicked…

Read more

Debunking the Top 3 Myths about DLP

While the rise of data protection regulations such as the GDPR in Europe and HIPAA, FISMA and NIST in the US has lead to an increased awareness of the need for Data Loss Prevention tools to ensure compliance, many companies still hesitate to employ them because they fall victims to some of the common myths that plague DLP software since its infancy.

Here are the most prevalent three charges brought against DLP tools and why they are unfounded:

1. Productivity killer

A myth that has persistently haunted DLP is its negative impact on productivity. It is blamed for making usually easy tasks time-consuming, thus hindering employees’ efficiency and increasing their frustrations. As all myths, this bit of misinformation started from a grain of truth: it’s a remnant of former inadequacies of first generation DLP tools which, as any new technology just being developed, was still difficult…

Read more

The Endpoint Protector Team at it-sa India 2018

June 7, 2018 Author: Events 0 Comments

India’s first it-sa IT security expo and conference took place between 24-25 May 2018 at the Bombay Convention and Exhibition Centre in Mumbai and was organized by NürnbergMesse India with the support of the Indo-German Chamber of Commerce.

Prompted by the major drivers of the IT security market in India which include the expansion of its internet coverage areas, increased mobile device use and data theft as well as the rise of globalization and liberalization among others, it-sa India’s aim is to support the creation of a global expertise with a local perspective on the Indian subcontinent.

The expo showcased information security products and services from all areas of cybersecurity including research and security consulting. The conference program, powered by Deloitte, featured discussions and presentations on a series of relevant themes such as Artificial Intelligence,…

Read more

The Best Data Protection Practices for the Global Era

In the age of globalization and ultra-connectivity, companies are increasingly multinational: they have regional or local offices in more than one country and do business in many more. This invariably involves a lot of meetings and presentations for important clients and the visiting of niche fairs and conferences abroad. As a consequence, the work force has become more and more mobile and, due to the rise of portable devices, they can bring the office with them wherever they go.

While this level of flexibility has a positive impact on companies’ bottom lines, it can spell disaster for data security. The reason is fairly simple: security measures for data protection are often restricted to company networks and once data heads outside them, it can become vulnerable to theft and loss.

What can organizations do then to ensure that their data remains secure even when it heads outside the…

Read more