SearchAmerica Chooses Endpoint Protector 2008 From CoSoSys
To safely handle portable storage devices and critical data
This is a Press Release edited by StorageNewsletter.com on April 23, 2008 at 2:54 pmCoSoSys announces that SearchAmerica has selected Endpoint Protector 2008 to manage and enforce portable device security policies in their IT environment. PC users perform an increasing number of tasks employing portable storage devices in their everyday work due to the added comfort and productivity, thus stressing the need to eliminate the inherent risk of data leakage entailed by these devices.
Endpoint Protector 2008 efficiently protects SearchAmerica workstations, notebooks and servers against data loss, data theft and other forms of data leakage. "Endpoint Protector 2008 gives us the ability to manage the controlled use of USB devices, external hard drives, FireWire devices, CD/DVD-Readers/Writers and many other potentially harmful endpoint devices, while also stopping malware, viruses and other unwanted data intrusions", said Carl Bigby, Network Security Manager from SearchAmerica.
Endpoint Protector 2008 additionally monitors and records all data transferred to and from portable storage devices at the organization’s endpoints. This feature gives SearchAmerica IT administrators the possibility to trace all data transfers to and from removable storage and endpoint devices. In case data is deleted before or after being transferred to a portable storage device, a copy of the data is stored onto a network storage server. The information stream at the network‚s endpoints is thoroughly recorded, thus supporting audits of data flow and controlling the impact of data leakage.
"Legislative requirements such as HIPAA call for the proactive management of portable devices that are capable of storing medical records. Enforcing encryption of data in transit on portable devices to prevent possible loss is another important feature that Endpoint Protector 2008 offers," said Roman Foeckl, Managing Director of CoSoSys. "This set of features enables organizations of all sizes to better comply with government regulations and industry standards regarding data breach management and IT governance."