In October, our team members will take their comfy shoes for exhibitions and take part at three major events in Europe and Asia. They are prepared to welcome you in Dubai, at Gitex, in Nuremberg at it-sa and in Dublin, at Tech Trade Live.
We invite you to stop by our booths and make the best of our presence at each event – live demos, Q&As, live presentations, one-on-one meetings, etc. If you have a specific Data Loss Prevention, MDM, USB encryption, Device Control request or doubt, we will be there to clarify it and guide you through the preliminary steps to implement this type of solutions.
You can find below more details about the events.1. Discover the award-winning Endpoint Protector DLP at Gitex 2016
Find us at the emt Distribution Booth C2-10 Hall 2, 16-20 October, Dubai World Trade Center.
GITEX is one of the biggest events where innovation in technology is revealed. The organizers…Read more
Not long ago we released the revamped USB Enforced Encryption from Endpoint Protector 4 DLP which has been implemented successfully by many of our customers. We received great feedback, so we want to share more details about this solution with you.What is Enforced Encryption?
For some time now, Enforced Encryption has become a best practice for security in case of USB devices, e-mail, internal HDDs, communications protocols, etc. Currently, we provide Enforced Encryption for USB devices allowing organizations to remotely deploy EasyLock, USB encryption software through Endpoint Protector 4 and thus forcing users to use only encrypted devices while transferring data. Instead of denying access to these devices, which would be unpractical, with the USB Enforced Encryption you protect data in case USB drives are lost or stolen.
Enforced Encryption is used for two strong reasons:…Read more
Have you ever found a USB stick in a random location or received one in the letterbox? Just stop for a few seconds before plugging it into your computer and remember that curiosity killed the cat and your computer doesn’t have to suffer the same fate.
Recent cases of receiving random USB sticks in letterboxes in Australia draw our attention. The Australian police are warning the citizens that cyber-criminals are sending unmarked USB drives to residential letterboxes. Suspicions are that the USB devices may contain malware or ransomware that could destroy the computer and so far what has been confirmed is the fact that victims have experienced fraudulent media streaming, according to Victoria Police. There are no further details about the extent of this and if any private individual data has been disclosed. Usually the purpose of this kind of attacks is to get confidential data or financial…Read more
Since BYOD (bring-your-own-device) first emerged, there have been some significant changes in the tech and security industries. Companies and mobile devices manufacturers, as well as mobile operating systems developers, have been challenged to step up their game, especially with the constant innovations and security threats.The incredible evolution of mobile devices technology
In 1983 the first mobile phone was manufactured and approved by the FCC (Federal Communications Commission) – Motorola DynaTAC 8000X (it offered 30 minutes of talk time) – and since then, the mobile devices industry has come a long way. Between 2007 and 2015 there were 1,423.9m units shipped worldwide to end users and for 2017 the number of mobile phone users is expected to reach 4.77 billion. That is more than half of the worldwide population. There are also estimated to be 19 million mobile app…Read more
There is still time until 2018, but have you sketched a game plan yet? The General Data Protection (GDPR) regulation makes a big statement about individuals’ private data and their right to request data controllers and processors to delete, correct, and forward their data. In consequence, GDPR comes with significant changes compared to the Data Protection Directive 95/46/EC involving operational changes in organizations. So, if you haven’t started to prepare for the new regulation, you better start today.
Let’s see how the game plan would look like in order to maximize your chances of getting to the finish line without spending too many resources.1. Make sure key people are aware of the changes
Chief Security Officers, IT Managers, CEOs, business unit managers, etc. have to be informed of the legal changes the GDPR imposes and should make sure they translate them into plain,…Read more
This year, RSA Asia Pacific & Japan, the world’s leading information security conference and exposition, held in Singapore, had more than 6,200 participants, with 26% more than the previous year. The event was a big success, having more than 85 speakers, 50 tracks sessions, tutorials and keynotes, and more than 100 exhibitors and sponsors.
CoSoSys attended as an exhibitor at the conference, represented by our colleagues: Carmen Oprita, from CoSoSys HQ and YS Tam, Regional Sales Manager at CoSoSys Far East, who did an amazing job presenting our latest Endpoint Protector updates and had live demos for the interested public. We want to send our warmest thoughts and special thanks to our dedicated partner, Halodata, which helped us to make the best of this event and was supportive as always.
A variety of companies’ delegates visited our stand, from countries like Philippines,…Read more
That moment when your company acknowledged the need for a Data Loss Prevention solution arrived. If you are a meticulous person, you tested at least two or three DLP solutions before you made your purchasing recommendation. So, you acquired Endpoint Protector DLP. Now, what? Again, if you are a perfectionist, you read the User Manual, but let’s face it; when you have 10 more solutions to manage, the audit is at your doorstep and your boss is waiting for fast reports, reading a manual is the last thing you want to do. We’re not saying you don’t have to read it, but when it comes to making your life easier, we really try to put ourselves in your shoes.
To make Endpoint Protector administration easier, we have put together some tips & tricks and we will start with the Content Aware Protection policies.
As you already know, the Content Aware Protection module can prevent accidental or intentional…Read more
The first edition of the Cybersecurity Excellence Awards had quite an impact, creating a lot of buzz among vendors and the Information Security Community on LinkedIn. The competition was tight, with over 430 entries and many vendors competing in the same category. Winners were chosen based on votes but also comments made by voters on the nomination page. Votes were cast by the 300,000-member Information Security Community on LinkedIn, which recognizes the world’s best cybersecurity products, organizations and individuals and, by industry leaders, partners, customers and other stakeholders.
We are thrilled that Endpoint Protector 4 was voted for best Data Leakage Prevention (DLP) product of 2016. This adds up to a nice collection of awards that we won over the years, giving us a great sense of satisfaction and motivation to constantly meet our objectives and bring innovation…Read more
I didn’t learn about data security in middle school or high school. Chances are, neither did you and, probably most of your kids either. The majority of schools do not have special programs or curriculum to emphasize the importance of data security or even a solid implementation for their networks to prevent data breaches. But data security and privacy should be a mandatory subject in all schools and universities and, along the pupils or students, professors, and other staff should also be trained, just like in any organization.
Think also about the fact that today’s millennials are entering the labor market, ending up handling companies’ critical data. Future generations will probably be even more connected to technology and the Internet, so it’s not too late to start information security classes in schools and other education facilities. If kids and students don’t have…Read more
Given the increased demand for Data Loss Prevention in Asia and the great fit between DLP requirements and our products, this month CoSoSys Far East will attend RSA Conference Asia Pacific & Japan 2016 as an exhibitor. The event will take place at the Marina Bay Sands in Singapore, from 20 to 22 July, where you can visit us at booth # E77 to meet our local representatives and make the best of the live interaction and the live demos.Why RSA Asia?
RSA Conference Asia Pacific is the leading information security event in Asia. RSA conferences have over 45,000 attendees/year, being world’s largest provider of security events.
During the three-day event, participants will have the opportunity to interact with professionals from the IT security industry and take part in engaging sessions with valuable speakers from IBM Security, Cisco Security, Ernst & Young Advisory Pte. Ltd, Microsoft…