Case Study
Stünings Medien

Stünings Medien implemented Endpoint Protector to better control and avoid unauthorized confidential content from being published or transferred across their macOS computers, and to eliminate liability and associated financial risks.

Industry: Media & Entertainment
Challenge
Avoid unauthorized text/image use, eliminate financial risk
Solution
Implementing Endpoint Protector’s Device Control module
Results
Fast set-up, macOS support, offline temporary passwords
Challenge

Stünings Medien is the biggest printing company in its region, publishing journals, travel guides, and reference books and developing websites and apps for smartphones and tablets. Employees’ daily activities involve working with content that is copyright-protected by external authors or photographers. The challenge for Stünings Medien was finding a solution to avoiding unauthorized text or image being published and eliminate liability, financial risks as well as a bad reputation that such an incident would cause for the company.

Solution

The search for a product able to provide Device Control for Macs led to few suppliers. Endpoint Protector from CoSoSys was among the two solutions that were shortlisted and evaluated closely. The user-friendly interface and feature-based structure of Endpoint Protector were clear at first sight, providing the possibility to manage the software with ease. A number of technical features for Macs - the control of USB and peripheral ports, as well as confidential content transfers – convinced Stünings Medien that Endpoint Protector was the right solution. The possibility of creating whitelists to temporarily use certain devices and especially the reporting and analysis features were considered extremely valuable. Stünings Medien decided to go with the Endpoint Protector Virtual Appliance, specifically with the Device Control for Mac OS X module.

The setup of the appliance took very little time; the client software was enrolled to the endpoints from the server web-based user interface. Initially, Endpoint Protector was used for a few days to simply monitor and evaluate the logs related to USB devices. Then, the final policies were created according to the internal policy and compliance requirements. After a few months since Endpoint Protector had been protecting the Stünings Medien computers, Ory Janßen, the head of IT was truly happy with the implementation. His feedback can be seen as a valuable incentive for upcoming features of future releases.

Furthermore, intuitive and granular reporting is a big help. The policies of the company can be supported on a technical level by informing users about actions that do not comply with their access level or with the company policy. The decision of blocking or allowing a device can be done with high accuracy. Moreover, in the event of data loss or data leaks, which no security solution can avoid completely, the incident can be logged and reported. The IT administration can easily understand who transferred which data on what device. The log files help to prove that a certain data transfer leads to a data loss.

Why Endpoint Protector?
  • Technically leading in monitoring Mac OS X
  • Virtual Appliance is set up within a few minutes
  • Intuitive user interface
  • Offline Temporary Passwords for USB devices and computers
With Endpoint Protector, we have the overview needed to evaluate the employees‘ activities. For example, it is easy to comprehend which devices were connected and what content was transferred.
Ory Janßen
Head of IT Stünings Medien GmbH
Let’s talk about your use case Fill in the form below to get in touch with one of our DLP experts
Data Loss Prevention Best Practices
Download our free ebook on
Data Loss Prevention Best Practices

Data Loss Prevention (DLP) tools have become an essential part of data protection strategies. Highly flexible and adaptable to any company size, DLP solutions can be tailored to different needs and support compliance efforts with new data protection regulations. This whitepaper outlines the best practices companies should adopt when implementing DLP tools.

Request Demo
* Your privacy is important to us. Check out our Privacy Policy for more information.