Endpoint Protector Blog | All Data Security. All the time. - Part 12

All Data Security. All the time.

The right resource for decision makers and IT admins

The 4 Biggest Mistakes Businesses Make Trying To Secure Endpoints

November 14, 2016 Endpoint Protection
by: November 14, 2016

When it comes to data security risks, every industry has its own specifics, depending on the type of information it works with or it stores, depending on the technology it uses, etc. Consequences of data breaches, however,…

GITEX, IT-SA, and Tech Trade Live. Impressions from 3 of the most important IT Security events in 2016

November 4, 2016 Events
by: November 4, 2016

Last month, our company had the privilege to attend three of the most important IT Security events worldwide: GITEX Tech Week in Dubai, IT-SA in Nuremberg, and Tech Trade Live in Dublin. All three events were a major success,…

The Data Security Threats that Prevail in Law Firms

October 21, 2016 Data Loss Prevention
by: October 21, 2016

Every industry has its own particularities when it comes to data security risks, depending on the type of information being stored and processed, as well as on how many people have access to this information and the technologies…

Endpoint Protector at 3 IT security events this fall

October 3, 2016 Events
by: October 3, 2016

In October, our team members will take their comfy shoes for exhibitions and take part at three major events in Europe and Asia. They are prepared to welcome you in Dubai, at Gitex, in Nuremberg at it-sa and in Dublin, at Tech …

Extending your InfoSec policies with EasyLock Enforced Encryption

September 29, 2016 Encryption
by: September 29, 2016

Not long ago we released the revamped USB Enforced Encryption from Endpoint Protector 4 DLP which has been implemented successfully by many of our customers. We received great feedback, so we want to share more details about…

The unknown danger of USB sticks in letterboxes

September 22, 2016 Device Control
by: September 22, 2016

Have you ever found a USB stick in a random location or received one in the letterbox? Just stop for a few seconds before plugging it into your computer and remember that curiosity killed the cat and your computer doesn’t have…

The fascinating world of mobile devices and MDM

September 1, 2016 Mobile Device Management
by: September 1, 2016

Since BYOD (bring-your-own-device) first emerged, there have been some significant changes in the tech and security industries. Companies and mobile devices manufacturers, as well as mobile operating systems developers,…

Are you GDPR compliant yet?

by: August 23, 2016

There is still time until 2018, but have you sketched a game plan yet? The General Data Protection (GDPR) regulation makes a big statement about individuals’ private data and their right to request data controllers and processors…

RSA Asia Pacific & Japan – Impressions and Conclusions

August 4, 2016 Events
by: August 4, 2016

This year, RSA Asia Pacific & Japan, the world’s leading information security conference and exposition, held in Singapore, had more than 6,200 participants, with 26% more than the previous year. The event was a big …

Fastest way to create Content-Aware Data Loss Prevention Policies

by: July 26, 2016

That moment when your company acknowledged the need for a Data Loss Prevention solution arrived. If you are a meticulous person, you tested at least two or three DLP solutions before you made your purchasing recommendation.…