All Data Loss Prevention related articles
We are excited to unveil the newest version of our Data Loss Prevention solution: Endpoint Protector 5, presenting important updates and a brand new redesigned interface. Our aim, as always, is to constantly enhance the data protection features, while offering an intuitive user experience.
Endpoint Protector 5 presents some essential changes.
With a more intuitive design, the complex process of securing data becomes easier. IT Admins can benefit from a more user-friendly, modern, and responsive interface of the management console.
Key features and benefits of the new UI include:
- Faster access to certain features, such as DLP blacklists and whitelists, which have been included in the main menu as a separate section
- Flexibility – IT Administrators are now able to manage policies and check reports from any device, from desktop to tablet due to the responsive console
Next to the Gartner Magic Quadrant for Enterprise Data Loss Prevention, CSOs, IT Managers, and other IT security professionals can take advantage of the most recent research published by Gartner: the Critical Capabilities for Enterprise Data Loss Prevention by Brian Reed and Deborah Kish. The research evaluates DLP products for three use cases: regulatory compliance, intellectual property protection and data visibility and monitoring. Scores have been assigned on a scale of 1 to 5 and derived from nine critical capabilities.
- DLP Endpoint
- DLP Discovery
- DLP Network
- Ease of Deployment
- Configuration Flexibility
- DLP Advanced Detection
- Internationalization Support
- DLP Management System
- DLP Vendor Integrations
We are happy to be included in the research and we believe that the scores reflect our strong DLP capabilities, with a focus on endpoint DLP, with advanced detection techniques,…Read more
We use the word “enterprise” for a good reason. Big companies or enterprises with more than 500 employees represent complex ecosystems with incredible resources, structures and more importantly, substantial know-how and data. Information security in these organizations is quite challenging and requires significant efforts from several departments and business unit managers, not only the IT department. But does the joint effort really exist? Or it is only a desire of the idealistic IT security vendors? What other recommended practices are not followed in enterprises?
Let’s see what are the 5 most common data security mistakes enterprises can’t afford to make:1. Failing to make information security a business component
In an enterprise, let’s say, in the clothes manufacturing industry, having a data breach with the unreleased clothes designs is as bad as delaying…Read more
Health-related data is moving more and more from paper to electronic records, determining changes in how healthcare organizations or other industries processing healthcare records are managing and protecting their data today. Businesses that are involved in any way with the use or management of PHI (personal health information) of individuals, need to ensure that they secure their sensitive data against loss or leakage, by following security guidelines, like HIPAA, in order to avoid penalties.What is HIPAA
Health Insurance Portability and Accountability Act of 1996, HIPAA, provides data privacy and security measures for protecting medical information. The legislation is designed to protect the ePHI (electronic protected health information) of individuals, like Social Security Numbers, medical ID numbers, credit card numbers, drivers’ license numbers, home address,…Read more
We are very happy to let you know that we have been included in the February 2017 Gartner Magic Quadrant for Enterprise Data Loss Prevention. As new entrants, we are proud to be positioned the furthest in the Niche Players quadrant.
Vendors have been evaluated based on the ability to execute and the completeness of vision. These two dimensions include several criteria like product or service, overall viability, sales execution/pricing, market execution, customer experience, innovation, and other business and technical aspects. All criteria and their weight are detailed in the report.
We believe one of the factors for our inclusion by Gartner was our ability to help organizations protect data against leakages and theft on Windows, macOS, and Linux, with support for printers, terminal servers and other virtual desktop infrastructure (VDI) thin clients. We also think that a big contribution…Read more
The 2017 Cybersecurity Excellence Awards honor companies and individuals that demonstrate excellence, innovation, and leadership in information security. Winners are being chosen based on the strength of the nomination and the popular vote by the Information Security Community.
“Congratulations to CoSoSys for winning the Data Leakage Prevention category of the 2017 Cybersecurity Excellence Awards,” said Holger Schulze, founder of the Information Security Community on LinkedIn which organizes the awards program. “With over 450 entries, the 2017 awards are highly competitive. All winners and finalists reflect the very best in leadership, excellence, and innovation in today’s cybersecurity industry.”
For us, it’s the 2nd year to participate in the DLP Solution of the Year category. We are proud that this year, and in 2016 as well, Endpoint Protector 4 …Read more
From a niche player, Apple succeeded to have a general-purpose enterprise use nowadays. Once best suited only for creative roles in design, photography or marketing, today Macs experience a growing adoption in enterprises as a result of a higher demand from all employees. One of the top reasons is the low total cost of ownership; an enterprise could save from $265 to $535 over a four-year period for each employee who uses a Mac over a PC. Apple knows that and their strategy reflects in every release and every product they launch.
Take the macOS Sierra, for example. Currently, its adoption has reached 38% among Mac users, while Windows 10 has less than 25%. When we look at the features that were released in September, we see two things – Apple’s desire to strengthen their market share by unifying users’ experience with all Apple products and their convenience and ease of …Read more
Here we are, at the end of another great year for the cybersecurity world. Along the year, we’ve witnessed some unpredictable events, but also the evolution of data loss prevention.
No one can argue that Data Loss Prevention (DLP) as a concept and technology has come a long way since it emerged in 2006. Back then it disrupted the security industry with the capabilities of identifying and blocking sensitive data from leaving the company, which no other solution could have done. It was a great innovation also due to USB control features that stopped employees from copying sensitive data to USB devices, strengthening companies’ data security. Since 2006, the DLP adoption increased exponentially and now, there is no IT security professional that hasn’t heard about this great IT security tool.
But let’s get back to the year 2016. It is a perfect moment of the year to look back and see …Read more
Every industry has its own particularities when it comes to data security risks, depending on the type of information being stored and processed, as well as on how many people have access to this information and the technologies that use it. For healthcare, patient medical records are what make the headlines when an organization is breached, and for financial organizations, bank accounts details are chased by attackers. For law firms, the trade secrets, patents, copyright details and attorney-client privileged communications are the most vulnerable. None of these industries is immune to external attacks or to insider threats. Moreover, data breaches usually occur where they are least expected because attackers have more sophisticated methods, often getting to the primary target by obtaining a set of data from other companies.
Privacy and confidentiality are essential values…Read more
There is still time until 2018, but have you sketched a game plan yet? The General Data Protection (GDPR) regulation makes a big statement about individuals’ private data and their right to request data controllers and processors to delete, correct, and forward their data. In consequence, GDPR comes with significant changes compared to the Data Protection Directive 95/46/EC involving operational changes in organizations. So, if you haven’t started to prepare for the new regulation, you better start today.
Let’s see how the game plan would look like in order to maximize your chances of getting to the finish line without spending too many resources.1. Make sure key people are aware of the changes
Chief Security Officers, IT Managers, CEOs, business unit managers, etc. have to be informed of the legal changes the GDPR imposes and should make sure they translate them into plain,…Read more