Why opt for the cloud-based DLP and MDM solution

September 15, 2015 Author: Data Loss Prevention 0 Comments

Since we launched My Endpoint Protector, our cloud-based Data Loss Prevention (DLP) and Mobile Device Management (MDM) solution, we have noticed several things about organizations’ perspective towards using this type of tool in the cloud. The attitude towards using SaaS DLP solutions mainly depends on the region, company size, industry, compliance and the organizations’ objectives when it comes to protecting data.

Organizations from regions like USA and Western Europe are more open to implement DLP and MDM in the cloud, while those from CEE, APAC and LATAM prefer to have the on-premise solution. The main reason is compliance, since there are several data protection laws that require data security solutions to be implemented on-premise. Skepticism towards cloud data security solutions also plays an important role. However, companies that do implement SaaS, report…

Read more

Human Error Steve – the biggest data security threat

September 1, 2015 Author: Data Loss Prevention 0 Comments

The threat landscape has always been composed of both external (i.e. hackers) and internal threats (i.e. employees). Regardless of the security threat and whether or not the malicious intent is present, IT departments have always relied on technology to provide a wide range of solutions – from AVs to Firewalls, IPS, and many others. However, all solutions have one vulnerability in common: the human factor. “Human Error Steve” has got everything covered – from incorrect policy configurations as part of the IT department to sending e-mails to wrong recipients as part of any other department. So what options are there in the face of a threat present no matter what? Is this really such a big issue?

How big is the issue?

There is an abundance of statistics that provide insight into the size of the problem as well as some huge stories that made the news.

If you’re interested in figures,…

Read more

Computing Security Awards 2015 nominations

Now in its 6th year, Computing Security Awards UK honors data security solutions and vendors for their achievements in protecting businesses against data breaches and keeping them secure. The awards are worldwide recognized and industry leaders participate each year. What’s great about CS Awards is that finalists and winners are elected by visitors and readers of Computing Security Magazine, users of the solutions, data security experts, bloggers, IT administrators, etc., so you get to be involved in the process and have a say in the outcome.

Endpoint Protector 4 chosen DLP Solution of the Year in 2014

For us it’s the 4th year to participate in the DLP Solution of the Year category. In 2014 we were named winners in this category and we are very proud of this achievement. Data Loss Prevention is our specialty and since last year we released a lot of great features like SIEM integration,…

Read more

Stagefright Android bug – general information and future exploits

Recently there have been many articles about the newly discovered Android vulnerability. Although the stories started to appear from the 27th of July, the exploited has been brought to Google’s attention back in April and May by Joshua Drake, a researcher at the mobile security company Zimperium zLabs. It was patched by Google in the latest versions but Android users are not safe yet. So let’s take a look of what Stagefright is/does, what we can do to protect our Android devices and what the future may hold for users.

What is Stagefright?

From a technical point of view, Stagefright is a collection of seven bugs. Their designations are: CVE-2015-1538, CVE-2015-1539, CVE-2015-3824, CVE-2015-3826, CVE-2015-3827, CVE-2015-3828, and CVE-2015-3829. The libraries… Too much info? OK, let’s go with the easier explanation.

Stragefright is a bug that affects ~95% of the Android devices…

Read more

SysAdmin Day 2015 contest – InfoSec Bloomers

We’re a security company so we cannot help but celebrating SysAdmin Day from a data security perspective, especially because managing security tools is becoming really challenging for them.

To all SysAdmins out there…it’s a day when you are spoiled with rewards and contests and all eyes are on you. It’s also the day when you can shed your sorrows and tell the world your most painful experiences. We have also prepared a cute / sarcastic contest, depending on how you look at it. This year it’s celebrated on 31st of July, but we decided to run the contest the whole week. This is our way of saying thanks for your efforts in raising awareness within your companies regarding data security and for your constant feedback and contribution to improving InfoSec, among others.

We all like to go on the memory lane sometimes and for you, it usually means to go out for a beer with your friends after…

Read more

Endpoint Protector at Mac IT Conference

It’s the first day at Mac IT Conf and we’re set up and looking forward to welcome the first visitors.
For us, it is the second year participating as exhibitors to the world’s premier event for “Deploying Apple in the Enterprise.”
If last year, MacWorld, the consumer show, got more attention, this year, all eyes are on the enterprise.

There are a series of interesting sessions like:

  • CIO Perspectives on Apple in the Enterprise: The MacIT Leadership Panel
  • CSO/CISO Roundtable: A Day In the Life of a Security Leader and others.

There will also be a recap for WWDC2015, so if you didn’t attend you can take advantage of the panel discussions regarding the relevance of Apple updates for the enterprise. You can also read here about WWDC highlights.


We will also have a presentation entitled It’s a Mac, Mac World and Data Loss Prevention Should Be a Part of It today at 1:20pm – 1:40pm,…

Read more

The Most Common Myths about Data Loss Prevention

When it comes to Data Loss Prevention (DLP), you can’t afford to take any shortcuts. Believing that there are situations that couldn’t happen to you and that certain things are better left to chance is a huge mistake. Technology is definitely a godsend in today’s fast-paced society, but it can also be our undoing if the proper security precautions are not taken.

So where would you need to start to ensure that no valuable information is leaked? Well, getting your facts right is the best thing to do because you won’t make any crucial mistakes if you know what you are doing. Here are some common misconceptions you shouldn’t pay heed to:

1. Data loss prevention is too overwhelming, especially for small companies

Many business owners fall into the trap of believing that going with a DLP system means their entire company needs to start focusing all their efforts…

Read more

Mobile Device Management – Not just for security

There is no doubt that a Mobile Device Management (some call it Enterprise Mobility Management) Solution can help any organization safeguard their mobile employees and help navigate the BYOD-related pitfalls. Besides increasing productivity for the workforce in the field, a Mobile Device Management solution makes things easier for the IT admins that have to manage the mobile device fleet. However, an MDM tool can do much more.

A wide range of opportunities with Kiosk Mode

Enabling Kiosk Mode on an Android device (our Endpoint Protector MDM does this very well for Samsung devices) doesn’t require an MDM solution. It does, however, become essential when it comes to taking full advantage of all the benefits and cost savings Kiosk enabled mobile devices can bring. Having a smartphone or tablet locked into a single or only a few applications can turn an affordable device into a dedicated…

Read more

Highlights at WWDC 2015 – OS X El Capitan and iOS 9

With every release and version of OS X, iOS and, of course, new devices and computers, Apple is driving more and more adoption. It’s the company that manages to increase customers’ loyalty and to gain new ones with the speed of light.

In June, I attended WWDC 2015 and just like all their events, it was totally worth it.

Features and enhancements beneficial for both personal and business use

Among the announcements, there was OS X El Capitan and iOS 9 which are scheduled to be released in the fall. Apple’s challenge now is to overcome their own record with El Capitan- the fastest adoption rate for any PC operating system ever – 55% recorded by Yosemite-. From the features included in this new OS version, it seems that they’re on the right track. As we are used to, Apple’s bidding on convenience, user experience and performance. Attention to detail and refinement are pushed to extremes,

Read more

How do you know your Data Loss Prevention solution is efficient?

Since Data Loss Prevention technology has been developed, there are some questions that always pop-up in the mind of customers, analysts, journalists, etc.:

  • How do we measure the Return of Investment?
  • How do we know that our DLP is efficient?

These are perfectly justified questions and we thought of some metrics that could help determine whether DLP is worth the investment.

First of all, Data Loss Prevention purpose is to prevent breaches from happening. Depending on each vendor’s solution, the IT Admin has the option to either block the transfer of confidential data through different channels and have all attempts recorded, or allow it, but have all transfers reported. So, measuring the success of a DLP solution depends also on how the company uses it.

In the first situation, the number of attempts and their severity would be a good metric to realize if the tool is efficient or not.

Read more