Please call us (35210792) for more detail
Please pick one category below or use the search function to search our products.
Idynamic . Media Product Category:
Cososys Endpoint Protector
Endpoint Security for Workstations, Laptops and Servers
Endpoint Protector 2008 is designed to protect PCs from threats posed by removable portable storage and endpoint devices such as USB Flash Drives, MP3 Players, iPods and digital cameras. These and other devices could be accidentally or intentionally used to leak, steal, or lose data. Endpoint Protector 2008 as a Data Loss Prevention (DLP) is eliminating these risks. Even the introduction of viruses or malware from infected removable storage devices is prevented. Furthermore self-executing devices like a USB Flash Drive with a CD-ROM autorun feature such as U3 Drives will not be controlled and thereby pose no threats.
Centralized Device Management / Whitelist
The web based administrative interface gives the IT Administration a complete overview of endpoint activity allowing to monitor and control all activities centrally. The whitelist of specific authorized devices for certain users or user groups and their respective policies allows staying productive while maintaining control of what devices are used.
File Tracing / File Shadowing - Control your Data Flow
The File Tracing feature will track all data that was copied to and from prior authorized portable storage devices. The File Shadowing feature saves a copy of all, even deleted files that where used in connection with controlled devices on a network storage server.
A thorough record of all information streams at the network's endpoints is essential to support audits of data flow and controlling the impact of data leakage.
Network "Offline" Mode to Support Field Employees
Protected PCs that are temporary of frequently disconnected from the network like laptops are staying protected based on the last locally saved policy. All notifications about device or file transfer activity or are transmitted to the Endpoint Protector Server at the next network connection.
Policy based Enforcement of Regulations / Active Directory
Simple device management policies with customizable templates help define User Group permissions to allow for an efficient enforcement and maintenance of your latest security policies across your network. This enables your internal IT Guidelines to better comply with government regulations, industry standards and IT governance in regard to data breach prevention and management.
Reporting and Analysis Tools
Endpoint Protector 2008 offers a powerful reporting and analysis tools with the ability to "drill-down" from the high-level reports to more detailed reports, analysis and even "raw log data" to make the data audit processes easy and straightforward.
The administrative Dashboard is a custom Web console that includes:
Reporting needs of both management and security staff
Get endpoint activity insight, for informed decision making and
Identify, monitor and correct suspect activity trends before they
become a threat
High-level "at-a-glance" visual reports for management
TrustedDevice / Enforced Encryption - Protecting Sensitive Data in Transit
The use of TrustedDevices gives the security that in a corporate environment all the endpoint devices are not only authorized and controlled via endpoint software and security policies but also certified and trusted to protecting sensitive and confidential data in transit. This will assure that in the event a device is stolen or lost all the data stored on it is encrypted and therefore not accessible if it gets in the wrong hands.
Choice of Server Platform for fast Integration
Keep your implementation costs within your organization IT budget. Endpoint Protector 2008 features a client-server architecture designed with security in mind that can perfectly fit within your existing infrastructure and software environment. The Endpoint Protector Server runs on Windows 2003 Server and Linux. As web servers and databases Apache or IIS and Microsoft SQL or MySQL are supported.
Status: Contact Us for Special Price
Reference URL http://www.cososys.com/software/endpoint_protector.html
Note: Product information provided above is for reference only. For the detail of the product, please help to visit manufacturer's web site for more information.
If you want to find out more about our products and services,
Please call (852)-35210792 or email to firstname.lastname@example.org.