Videos & Tutorials for Device Control, Data Loss Prevention (DLP)

Security Briefings

Data Protection for Banking and Finance - Endpoint Protector by CoSoSys

In this Security Briefing, Tim Deluca-Smith, CMO @ CoSoSys, is joined by Jay Kay, Technical Account Director @ Askaris, and Carmen Oprita, Sales & Business…

Data Protection for Law Firms - Endpoint Protector by CoSoSys

In this Security Briefing, Tim Deluca-Smith is joined by Chris Roney, DLP Specialist and Daryl Craig, Director of Information Technology @ Lenczner Slaght. The team…

Securing your business for a new hybrid workforce — Endpoint Protector by CoSoSys

In this Security Briefing, Tim Deluca-Smith is joined by CoSoSys Founder and CEO, Roman Foeckl, and CoSoSys Enterprise Specialist, Zoran Cocoara. The team discuss the…

Endpoint Protector Videos

How eDiscovery Works?

eDiscovery scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It…

How Enforced Encryption Works?

Enforced Encryption allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted.…

How Content Aware Protection Works?

Content-aware data loss prevention is a data loss-prevention measure that involves awareness of the context or content that is being protected. This module enables the…

How Device Control Works?

See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data…

User Remediation - Endpoint Protector by CoSoSys

User Remediation is an important new feature that can be applied to your DLP policies in Endpoint Protector 5.4.0.0. If enabled, your users will be…