In the News

A collection of relevant articles featuring news about the company and our products.

Media: paymentssource.com
| 11-Nov-2016
| English

Attacks on point-of-sale (POS) systems usually target immediate gain through fraud with payment card data, which is why any organization that uses point of sale devices or processes payment details needs to be on constant alert.

Media: darkreading.com
| 31-Oct-2016
| English

To increase productivity and attract the best talent, many companies encourage employees to take advantage of the latest and greatest advancements in collaborative technology. However, many fail to take into consideration the risks this causes. Corporate data becomes vulnerable and difficult to protect, and infrastructure becomes increasingly complicated because of the many devices and other endpoints that connect to the network. All devices, smartphones, tablets, laptops, computers, servers, USB keys, and other technologies that are part of the same network are endpoints.

Media: rsd.md
| 20-Oct-2016
| Romanian

Ajuns la cea de-a VII-a editie, RSD Day are acelasi scop: de a aduce solutii IT inteligente si accesibile pietei din Moldova.

In data de 20 octombrie 2016, RSD a fost gazda unui eveniment reusit si deosebit din toate punctele de vedere, incepand cu continut, prezentatori, precum si tinand cont de impactul sau asupra participantilor bine alesi, atmosfera placuta si suport din partea partenerilor aferenti.

Media: hawkdive.com
| 05-Oct-2016
| English

USB storage devices have always been the best method of data sharing because of their removable and rewritable features.They are often used for the same purposes for which floppy disks or CDs were once used, but USB storage devices are smaller, faster, have thousands of times more capacity, and are more durable and reliable because they have no moving parts.

Media: csoonline.com
| 04-Oct-2016
| English

There’s a gaping hole in your security infrastructure right now. The front door is open, the side window is ajar, and there’s an open safe with a neon sign saying “steal my data” in flashing lights. While you might have locked down the network used for this software, instituted strict usage policies, and insist on having users stick to complex passwords, the data is leaking.

Media: it-administrator.de
| 04-Oct-2016
| German

Wenn Schnittstellen wie USB und CD/DVD-Geräte für die Benutzer frei zugänglich sind, ist es ein Leichtes, Unternehmensdaten unbeaufsichtigt zu kopieren und aus der Firma zu schaffen. Ebenso gefährlich ist es, wenn Mitarbeiter Software mittels tragbarer Datenspeicher mitbringen und Malware im Gepäck haben. Der Endpoint Protector aus dem Hause CoSoSys verspricht umfassende Sicherheit vor solchen Szenarien.

Media: securityadvisorme.com
| 02-Oct-2016
| English

The Windows dominated company infrastructures are not so frequent anymore. Organisations and IT departments are challenged with multi-platform workstations thanks to several factors.

Media: itsicherheit-online.com
| 28-Sep-2016
| German

Um sein Know-how vor Datenverlust und Datendiebstahl zu schützen, benötigte der Hersteller von Betriebseinrichtungen und Intralogistik-Lösungen BeeWaTec eine Lösung für Data Leak Prevention (DLP). Die Wahl fiel auf Endpoint Protector 4.0 von CoSoSys, da die Software granulare Einstellmöglichkeiten für die Überwachung aller Schnittstellen zulässt und mit einer durchdachten Oberfläche die Bedienung einfach macht.

Media: zdnet.de
| 05-Sep-2016
| German

Endpoint Protector kann Unternehmen davor schützen, dass Anwender unberechtigt Daten auf USB-Sticks kopieren oder in Cloudspeichern ablegen. Auch das unberechtigte Ausdrucken lässt sich blockieren.

Media: searchcio.techtarget.com
| 02-Sep-2016
| English

The Dropbox hack is the latest reminder that the end is near for traditional authentication methods. Also in Searchlight: VMware comes at cloud from a new direction.

Page 1 of 8 pages  1 2 3 >  Last ›