All posts by author

Angela Lepadatu
Angela is Marketing Professional @ CoSoSys with experience in research, PR, copywriting as well as business development for Endpoint Protector, giving her a broad view on IT Security industry and the ability to translate complex technologies into simple terms. She thinks that data security tools and any other technology go hand in hand with the human factor and that education is important in this regard.


RSA Conference Asia Pacific & Japan – Exquisite Location, Inspiring Event

July 10, 2017 Author: Events 0 Comments

Standing as testimony to innovation, strength, and uniqueness, the Marina Bay Sands is accommodating once again the RSA Conference Asia Pacific & Japan between 26 and 28th July. The event is bringing together information security experts just like the MBS is connecting its host city, empowering organisations and individuals to stay ahead of cyber threats.

We are happy to exhibit this year as well and we would like to invite you to join us at booth E92 where our colleagues from CoSoSys Far East are looking forward to welcoming you. For those of you whose presence at events in the US or Europe is more difficult, this is a great opportunity to meet the people behind the Endpoint Protector technology and see live demos, whether you are already using it, you are evaluating it or just looking around for Data Loss Prevention software. We will make sure your visit will be worth your while, dedicating…

Read more

Discover Endpoint Protector 5 – new UI, eDiscovery updates and many other enhancements

We are excited to unveil the newest version of our Data Loss Prevention solution: Endpoint Protector 5, presenting important updates and a brand new redesigned interface. Our aim, as always, is to constantly enhance the data protection features, while offering an intuitive user experience.
Endpoint Protector 5 presents some essential changes.
With a more intuitive design, the complex process of securing data becomes easier. IT Admins can benefit from a more user-friendly, modern, and responsive interface of the management console.

Key features and benefits of the new UI include:

  • Faster access to certain features, such as DLP blacklists and whitelists, which have been included in the main menu as a separate section
  • Flexibility – IT Administrators are now able to manage policies and check reports from any device, from desktop to tablet due to the responsive console
  • Intuitive
Read more

CoSoSys included in the Gartner Critical Capabilities for Enterprise Data Loss Prevention

Next to the Gartner Magic Quadrant for Enterprise Data Loss Prevention, CSOs, IT Managers, and other IT security professionals can take advantage of the most recent research published by Gartner: the Critical Capabilities for Enterprise Data Loss Prevention by Brian Reed and Deborah Kish. The research evaluates DLP products for three use cases: regulatory compliance, intellectual property protection and data visibility and monitoring. Scores have been assigned on a scale of 1 to 5 and derived from nine critical capabilities.

  • DLP Endpoint
  • DLP Discovery
  • DLP Network
  • Ease of Deployment
  • Configuration Flexibility
  • DLP Advanced Detection
  • Internationalization Support
  • DLP Management System
  • DLP Vendor Integrations

We are happy to be included in the research and we believe that the scores reflect our strong DLP capabilities, with a focus on endpoint DLP, with advanced detection techniques,…

Read more

5 Data Security Mistakes Enterprises Can’t Afford to Make

We use the word “enterprise” for a good reason. Big companies or enterprises with more than 500 employees represent complex ecosystems with incredible resources, structures and more importantly, substantial know-how and data. Information security in these organizations is quite challenging and requires significant efforts from several departments and business unit managers, not only the IT department. But does the joint effort really exist? Or it is only a desire of the idealistic IT security vendors? What other recommended practices are not followed in enterprises?

Let’s see what are the 5 most common data security mistakes enterprises can’t afford to make:

1. Failing to make information security a business component

In an enterprise, let’s say, in the clothes manufacturing industry, having a data breach with the unreleased clothes designs is as bad as delaying…

Read more

What CASBs Can and Cannot Do to Secure Your Data

Cloud Access Security Brokers (CASBs) became popular in 2016 and are continuing to get attention from companies, research analysts, and the media. They have emerged as a response to the security and compliance issues caused by cloud adoption and offer visibility into data security threats related to cloud apps usage. CASBs usually sit between users and cloud apps, acting like a gateway to intercept users’ activity and offer control and compliance. The interesting part is that they combine a sum of functionalities from different other existing solutions – firewalls, SIEM, Data Loss Prevention, encryption, and others.

Just to make sure CASBs are not confused with other tools, let’s see what CASBs can and cannot do to secure your data.

CASBs CAN

1. Provide visibility into cloud apps use

CASBs can detect file uploads and downloads and data traffic for approved or unapproved apps…

Read more

CoSoSys Recognized in the 2017 Gartner Magic Quadrant for Enterprise Data Loss Prevention

We are very happy to let you know that we have been included in the February 2017 Gartner Magic Quadrant for Enterprise Data Loss Prevention. As new entrants, we are proud to be positioned the furthest in the Niche Players quadrant.

Vendors have been evaluated based on the ability to execute and the completeness of vision. These two dimensions include several criteria like product or service, overall viability, sales execution/pricing, market execution, customer experience, innovation, and other business and technical aspects. All criteria and their weight are detailed in the report.

We believe one of the factors for our inclusion by Gartner was our ability to help organizations protect data against leakages and theft on Windows, macOS, and Linux, with support for printers, terminal servers and other virtual desktop infrastructure (VDI) thin clients. We also think that a big contribution…

Read more

Do not let the trivial webcam turn into security disasters

Last year, Mark Zuckerberg, has incidentally revealed the simple security measures he takes to secure his MacBook: webcam and mic covered with tape. In short time, the story was covered by many news outlets, drawing everyone’s attention to the security issues. Many asked themselves why he would do such a paranoid thing. Is Mark’s fear of being seen and listened justified? If we think about the possibilities of exploiting webcams, and the fact that there’s even the smallest chance of being watched or heard without our permission, then, Mark’s concerns are totally legit. Taking into consideration the level of success of its business, he has been probably the target of many cyber attacks attempts.
Just imagine yourself sitting home, having a glass of wine and working on your laptop in your pajamas when suddenly your webcam light starts to blink, recording every…

Read more

Extending your InfoSec policies with EasyLock Enforced Encryption

September 29, 2016 Author: Encryption 0 Comments

Not long ago we released the revamped USB Enforced Encryption from Endpoint Protector 4 DLP which has been implemented successfully by many of our customers. We received great feedback, so we want to share more details about this solution with you.

What is Enforced Encryption?

For some time now, Enforced Encryption has become a best practice for security in case of USB devices, e-mail, internal HDDs, communications protocols, etc. Currently, we provide Enforced Encryption for USB devices allowing organizations to remotely deploy EasyLock, USB encryption software through Endpoint Protector 4 and thus forcing users to use only encrypted devices while transferring data. Instead of denying access to these devices, which would be unpractical, with the USB Enforced Encryption you protect data in case USB drives are lost or stolen.

Enforced Encryption is used for two strong reasons:…

Read more

Are you GDPR compliant yet?

There is still time until 2018, but have you sketched a game plan yet? The General Data Protection (GDPR) regulation makes a big statement about individuals’ private data and their right to request data controllers and processors to delete, correct, and forward their data. In consequence, GDPR comes with significant changes compared to the Data Protection Directive 95/46/EC involving operational changes in organizations. So, if you haven’t started to prepare for the new regulation, you better start today.

Let’s see how the game plan would look like in order to maximize your chances of getting to the finish line without spending too many resources.

1. Make sure key people are aware of the changes

Chief Security Officers, IT Managers, CEOs, business unit managers, etc. have to be informed of the legal changes the GDPR imposes and should make sure they translate them into plain,…

Read more

CoSoSys supports students in mastering the DLP technology

I didn’t learn about data security in middle school or high school. Chances are, neither did you and, probably most of your kids either. The majority of schools do not have special programs or curriculum to emphasize the importance of data security or even a solid implementation for their networks to prevent data breaches. But data security and privacy should be a mandatory subject in all schools and universities and, along the pupils or students, professors, and other staff should also be trained, just like in any organization.

Think also about the fact that today’s millennials are entering the labor market, ending up handling companies’ critical data. Future generations will probably be even more connected to technology and the Internet, so it’s not too late to start information security classes in schools and other education facilities. If kids and students don’t have…

Read more