Home
Videos uploaded by user “Endpoint Protector by CoSoSys”
What is Endpoint Security? CoSoSys Information
 
04:31
http://www.cososys.com/ What is Endpoint Security? Data Loss, Data Leakage, Data Theft are all concerns of Endpoint Security. What is Data Loss Prevention? This video is a short info about Endpoint Security and what you can do to conquer Endpoint Security Threats.
What is Podslurping? CoSoSys Information
 
03:12
http://www.cososys.com/ What is Podslurping? Podslurping is just another name used to describe Data Theft, Data Loss, or Data Leakage. Podslurping is putting data on PCs and notebooks at risk. See in this video how podslurping works and how you can protect you data and PCs against it with easy to use endpoint security solutions from CoSoSys, like Endpoint Protector or Secure it Easy.
Endpoint Protector and your data is safe from inside data theft
 
01:14
http://www.EndpointProtector.com Endpoint Protector secures your data from inside data theft, data loss and data leakage. This is a funny video we made about data thieves being ignored in the company since the network is protected with Endpoint Protector and the thieves have no chance copying it to their USB Flash Drives. Visit http://www.EndpointProtector.com for more info and a free trial.
iBeacon and Endpoint Protector MDM and other Security Applications
 
01:12
iBeacons can be used for many different purposes, from simply triggering advertising through Apps installed on iOS and other smart devices to trigger security relevant events like disabling or enabling the camera feature or entire apps on your device. Making use of Endpoint Protector Mobile Device Management for iBeacons offers a wealth of possibilities. With the iBeacon it is now possible to accurately pinpoint the location inside a building addressing security issues, productivity and users' experience. Find our more here: http://www.endpointprotector.com/solutions/iBeacon_for_mobile_device_management_mdm
Setup a Content Aware Protection (CAP) Policy in Endpoint Protector
 
02:22
Learn how to setup a Content Aware Protection Policy in Endpoint Protector 4. Prevent confidential information from leaving the endpoint through USB and peripheral ports, printers, emails, instant messengers, cloud storage and other online applications. Through the Content Aware Protection module in Endpoint Protector 4, file transfer policies can be setup for Windows and Mac OS X computers. Filters can be created based on file extensions, predefined content (Social Security Numbers, Credit Card Numbers, etc.), custom content (create dictionaries based on keywords) or regular expressions. Find our more information here: http://www.endpointprotector.com/products/endpoint_protector Subscribe to our Channel and get more great tips on our Products https://www.youtube.com/user/CoSoSys
How to use USB Enforced Encryption from Endpoint Protector 4 DLP suite
 
04:08
The cross-platform USB Flash Enforced Encryption is the capability within Endpoint Protector 4 Data Loss Prevention that allows you to boost the security of data copied on USB storage devices through encryption. You can convert any USB device into a trusted device, selecting "Allow Access if device is Trusted Device Level 1+" from the Endpoint Protector 4 management console. This policy will automatically push EasyLock, our military strength AES 256 bits encryption, to connected USB devices if the Endpoint Protector 4 agent is installed on the computer. Remote deployment of EasyLock makes IT Administrators’ lives easier, along with the Site License which facilitates the encryption software licensing. Whenever a user attempts to copy data on the encrypted device, he will be asked to insert his password. Then, with a simple Drag & Drop action the user can safely store data on the USB device. The Enforced Encryption for Windows and Mac OS X represents an additional layer of security for data transferred on USB portable storage devices, eliminating the threat of data loss or data theft while supporting employees in tasks continuity. Find out more information here: http://www.endpointprotector.com/solutions/enforced_encryption
Endpoint Protector for Device Control explained in plain English
 
01:39
Try it free today. http://www.EndpointProtector.com Controlling use of portable devices (USB, FireWire, DVD, etc..) in your network is critical to ensure your data is safe. Endpoint Protector secures your data from inside data theft, data loss and data leakage. It works for PCs and Macs. Visit http://www.EndpointProtector.com for more info and a free trial. With Endpoint Protector you have full control, manageability and transparency what is happening at your PC and Macs ports. With device control, port control, file tracing, file shadowing and file whitelisting you take control over all device use.
How Device Control Works? - Endpoint Protector Demo
 
02:28
See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives. ------------------------- More info here: ► https://www.endpointprotector.com/solutions/device-control -------------------------
How My Endpoint Protector Works - Device Control & Endpoint Security as a Service (SaaS)
 
09:16
http://www.EndpointProtector.com Device Control & Endpoint Security hosted and managed in the cloud. Managing and controlling one or more PCs that are in different locations (office, home or on the road) from one central management consol has never been easier. My Endpoint Protector is a Service where the server for central management is located in the cloud and reachable 24/7 online and all protected PCs connect to it to receive policies. Your life securing Endpoints and proactively monitoring device use to prevent data loss, data theft and data leakage has just become allot simpler and affordable. Subscribe to your risk FREE Trial at https://My.EndpointProtector.com
Endpoint Protector 2008 (CoSoSys Endpoint Security)
 
07:17
http://www.cososys.com/ Endpoint Protector 2008 complements signature-based security solutions and provides a policy based approach to enforcing your rules of use for endpoint devices. In a world where portable and lifestyle devices increasingly transforming the way we work and live, Endpoint Protector 2008 is designed to maintain productivity and make work and life more convenient, secure and enjoyable. The whitelist based approach allows the use of specific devices for certain users/groups so they stay productive while maintaining control of what devices are used, and what data users are transferring to and from devices. Endpoint Protector 2008 dramatically reduces the risk posed by internal threats that could lead to your confidential data being leaked, stolen, damaged or otherwise compromised. http://www.cososys.com
How Endpoint Protector DLP can secure your data on Linux endpoints
 
07:03
See how you can setup Data Loss Prevention policies on Linux endpoints, what exit points Endpoint Protector 4 covers, and what type of sensitive data it can detect and block. This video explains how our DLP product can help you protect confidential business information and employees’ records against data breaches on Linux machines (various distributions like Ubuntu, RedHat, CentOS, OpenSUSE), taking you step by step through the policies building. Stop users from uploading, sending, and copying/pasting confidential data from Linux workstations to the cloud, to online applications and to portable storage devices. ➡ Read more about Endpoint Protector for Linux, here: https://www.endpointprotector.com/solutions/data-loss-prevention-DLP-for-Linux ➡ Website: https://www.endpointprotector.com/
How to configure/set-up rights in Endpoint Protector 4
 
03:00
We walk you through and show you how to set-up rights in Endpoint Protector 4. Get a quick insight into: Device Rights, User Rights, Computer Rights, Group Rights and Global Rights. Device Control is an essential solution to prevent Data Losses and Data Leaks. Along with Content Aware Protection and Mobile Device Management it is a key feature in every IT Security strategy. Subscribe to our channel and get more great Tips on content-aware Data Loss Prevention https://www.youtube.com/user/CoSoSys Find out more about the product here: http://www.endpointprotector.com/products/endpoint_protector
Proteja los datos en equipos Linux con Endpoint Protector DLP
 
04:27
Vea cómo configurar políticas de Prevención de Pérdida de Datos (Data Loss Prevention) en equipos Linux, qué puntos de salida son monitorizados por Endpoint Protector y qué tipo de datos confidenciales puede detectar y bloquear. Este vídeo explica cómo nuestro producto DLP puede ayudarle a proteger la información confidencial de la empresa y los registros de los empleados contra las brechas de datos en máquinas Linux (varias distribuciones como Ubuntu, RedHat, CentOS, OpenSUSE). Le guiamos paso a paso en la construcción de las políticas. Asegúrese que los usuarios no suban, envíen o copien datos confidenciales de las estaciones de trabajo Linux en la nube, aplicaciones online y en dispositivos portátiles de almacenamiento.
My Endpoint Protector explained in plain English -- DLP | MDM | Device Control -- can be so easy
 
02:01
Create a Free account at http://my.EndpointProtector.com Manage portable storage devices, control what data is leaving your network through emails, messengers and other cloud applications and even manage the mobile device fleet. With My Endpoint Protector, a cloud-based, cross-platform Data Loss Prevention and Mobile Device Management you can stay clear of today's data security threats. Create a Free account at http://my.EndpointProtector.com With My Endpoint Protector you can: 1. Control portable device use on Windows and Mac 2. Control what data is being emailed, sent through online applications and more 3. Manage the Android and iOS mobile device fleet (MDM) 4. Manage the applications on smartphones and tablets (MAM) 5. Centrally controlled online, no Server Hardware or Server Software Required 6. Prevent Data Loss, Data Theft and Data Leakage 7. Eliminate the BYOD risks and enable a mobile workforce 8. Stay compliant with internal and external requirements 9. Setup in minutes 10. Try it today at https://my.endpointprotector.com/ or visit http://www.endpointprotector.com/ for more information
My Endpoint Protector auf Deutsch erklärt / USB Sicherheit leicht gemacht
 
02:18
Starten Sie heute unter http://www.EndpointProtector.de Kontrollieren und Überwachen Sie den Umgang mit tragbaren Datenspeichern und externen Geräten [USB, externe Festplatten, USB Sticks, U3, Speicherkarten, Kartenleser (intern und extern), ZIP Laufwerke, Floppy, CD/DVD-Player/Brenner (intern und extern), Digitalkameras, Smartphones, PDAs, iPods, FireWire Geräte, MP3 Player, Bluetooth, Drucker etc.] in ihrem Firmennetzwerk und verhindern somit Datendiebstahl und Datenverluste. Starten Sie heute unter http://my.EndpointProtector.com Mit My Endpoint Protector können Sie: 1.Geräte und Schnittstellen wie z.B. USB und FireWire überwachen 2.Zentrales Management aller Endpoints und Geräte von überall über das Internet 3.Kein Server-Setup (keine Hardware, keine Softwarelizenzen und keine Wartung) 4.Enterprise Class Endpoint Security Lösung ist für jedermann verfügbar 5.Leichtes Einrichten und Konfigurieren für jeden Anwender 6.Starten Sie heute unter http://www.EndpointProtector.de
PC-Lock Feature (Windows PC Screenlock) Carry it Easy +Plus
 
02:53
http://www.cososys.com/ Users of Carry it Easy +Plus can now lock their PC using the new PC-Lock feature available in Carry it Easy +Plus Version 3.0. With this feature the user can turn a portable storage device like a USB Flash Drive or an iPod in the key to access their Windows PC. Simply start PC-Lock and whenever you remove the portable storage device from the USB Port the PC will be blocked and your selected personal pictures will be shown until the portable device is connected back to the PC.
Endpoint Protector zur Schnittstellensicherheit auf Deutsch erklärt
 
01:39
http://www.EndpointProtector.de hier schützen Sie Ihre Daten, Endpunkte und Schnittstellen. Überwachen und Kontrollieren Sie den Umgang mit tragbaren Datenspeichern und externen Geräten (USB Sticks, externe Festplatten, Digitalkameras, USB Sticks, U3, Speicherkarten, Kartenleser (intern und extern), ZIP Laufwerke, Floppy, CD/DVD-Player/Brenner (intern und extern), Smartphones, PDAs, iPods, iPhone, iPads, FireWire Geräte, MP3 Player, Bluetooth, Drucker etc.) in ihrem Firmennetzwerk und verhindern somit Datendiebstahl und Datenverluste. Mit Endpoint Protector können Sie USB und alle anderen Schnittstellen in kürze schützen. Testen Sie noch heute http://www.EndpointProtector.de.
EasyLock - Cross-platform encryption for Windows, Mac OS X and Linux
 
01:04
EasyLock features strong military grade encryption algorithms and an intuitive drag and drop interface, helping anyone turn any mobile storage device into a portable data safe. http://www.EndpointProtector.com
Endpoint Protector Basic - Data Protection for Small Offices or Home Use
 
01:06
Manage and control the use of portable devices with Endpoint Protector Basic, the perfect companion for your application firewall http://www.EndpointProtector.com
¿Cómo funciona el módulo de Control de Dispositivos? – Endpoint Protector Demo
 
02:27
Vea cómo puede bloquear, controlar y monitorizar puertos USB y periféricos para detener el robo y la pérdida de datos. Nuestro módulo de Control de Dispositivos protege contra la pérdida de datos monitorizando y controlando las transferencias de datos desde computadoras a dispositivos de almacenamiento extraíbles, como unidades USB. Ver más: https://www.endpointprotector.es/solutions/device-control
Data Loss Prevention (DLP) for Mac OS X with Content Aware Protection by Endpoint Protector
 
01:11
http://www.endpointprotector.com/solutions/data_loss_prevention_DLP_for_Mac_OS_X/ Content Aware Data Loss Prevention (DLP) for Mac OS X, a module in Endpoint Protector, offers detailed control over sensitive data leaving the company's network. Through efficient content inspection, transfers of important company documents will be logged, reported and blocked. Content Aware Protection for Mac OS X by Endpoint Protector will prevent data loss, data theft and data leakage through many possible exit points, from clipboard, screen captures, USB devices to applications including Mail, Microsoft Outlook, Safari, Skype, Yahoo Messenger or Dropbox and many more web or cloud services. Protecting sensitive information on Macs and ensuring compliance with regulations like PCI, HIPAA, etc. is possible now with Content Aware Data Loss Prevention for Mac OS X integrated in Endpoint Protector 4. It also secures data on Windows. More info can be found here: http://www.endpointprotector.com/solutions/data_loss_prevention_DLP_for_Mac_OS_X/
CoSoSys Partner Event 2018
 
01:12
The during, in between, and after party. The leading DLP vendor: https://www.endpointprotector.com/
Endpoint Protector Hardware Appliance for Device Control and Endpoint Security
 
01:13
Endpoint Protector Appliance is Device Control out of the box http://www.EndpointProtector.com/appliance The Endpoint Protector Appliance is a dedicated server appliance for device control and data loss prevention. Our appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices. Some of the controlled device types are USB, FireWire, SD Card Reader, Bluetooth, smartphones, etc. The Endpoint Protector Appliance works for Windows and Mac OS X. Endpoint Protector Appliance is the complete solution for a safe working environment with portable devices. http://www.EndpointProtector.com/appliance
USB Schnittstellenschutz, Gerätemanagement für Mac OS X (USB, FireWire sperren und überwachen)
 
01:36
http://www.EndpointProtector.de/MAC Hier schützen Sie Ihre Daten, Endpunkte und Schnittstellen an Mac OS X. Überwachen und Kontrollieren Sie den Umgang an Ihrem MAC von tragbaren Datenspeichern und externen Geräten (USB Sticks, externe Festplatten, Digitalkameras, Speicherkarten, Kartenleser, CD/DVD-Player/Brenner etc. Mit Endpoint Protector für Mac OS X können Sie USB und alle anderen Schnittstellen in kürze schützen um Datendiebstahl und Datenverluste zu verhindern. Für Privatpersonen ist der Einsatz von My Endpoint Protector für Mac sogar kostenlos. Testen Sie noch heute http://www.EndpointProtector.de/MAC
Content Aware Protection by Endpoint Protector for Content Aware Data Loss Prevention
 
04:17
Content Aware Protection a module in Endpoint Protector, offers detailed control over sensitive data leaving the company's network. Through efficient content inspection, transfers of important company documents will be logged, reported and blocked. Content Aware Protection by Endpoint Protector will prevent data leakage through all possible exit points, from clipboard, screen captures, USB devices to applications including Microsoft Outlook, Skype, Yahoo Messenger or Dropbox and many more web or cloud services. More info can be found here: http://www.endpointprotector.com/solutions/content_aware_data_loss_prevention
How Content Aware Protection Works? - Endpoint Protector Demo
 
04:59
Content Aware Protection gives companies detailed control over sensitive data leaving company computers. Through close content inspection, transfers of important company documents are logged and reported. File transfers can be allowed or blocked based on predefined company policies and can be applied to web, email, applications, file shares etc. Contextual Detection is also available as a general feature, offering an advanced way of inspecting confidential data based on both content and context. ------------------------- More info here: ► https://www.endpointprotector.com/solutions/content-aware-data-loss-prevention -------------------------
Device Control, USB Lockdown and Control for Mac OS X
 
01:29
http://www.EndpointProtector.com/MAC Controlling the use of USB, FireWire, SD Card Reader, Bluetooth, etc on your Mac is vital to protect your data. In seconds anybody with access to your Mac can steal and leak valuable data. Put a stop to this threat today with Endpoint Protector for Mac OS X. Install either My Endpoint Protector the simple internet (cloud) based solution and you are ready in minutes. Try it for free or even better it is free for use on personal used MACs. http://www.EndpointProtector.com/MAC Or use Endpoint Protector as the client-server solution in a company network. Try it today and take control over portable device use on you MACs. With Endpoint Protector you have full control, manageability and transparency what is happening at your PC and MAC ports. With device control, port control, you take control over all device use.
¿Cómo funciona Content Aware Protection? – Endpoint Protector Demo
 
03:45
El control de archivos por contenido es una medida de Prevención de Pérdida de Datos que implica conocer el contexto o el contenido que se está protegiendo. Este módulo permite aplicar políticas basadas en el contenido y contexto cuando se intenta enviar un archivo. Estas herramientas se utilizan para abordar el riesgo de fugas de datos involuntarias o la exposición de información confidencial fuera de los canales autorizados, utilizando las funciones de monitoreo, filtrado, bloqueo y remediación. ------------------------- Más información aquí: ► https://www.endpointprotector.es/solutions/content-aware-data-loss-prevention -------------------------
SafeLogin Password Manager Tutorial - Carry it Easy -CoSoSys
 
03:49
http://www.cososys.com/ SafeLogin in Carry it Easy is a Password Manager that allows you to save your user names and passwords on a portable storage device so you can carry them with you. This tutorial shows you how to use the function for your frequently visited websites.
Comment peut sécuriser vos données le DLP Endpoint Protector  sur les postes Linux
 
05:29
Découvrez comment configurer les stratégies de prévention de la perte de données sur les postes Linux, quels points de sortie couvre Endpoint Protector 4 et quel type de données sensibles il peut détecter et bloquer. Cette vidéo explique comment notre produit DLP peut vous aider à protéger les informations commerciales confidentielles et les dossiers des employés contre les brèches de données sur les machines Linux (diverses distributions comme Ubuntu, RedHat, CentOS, OpenSUSE). Empêcher les utilisateurs de télécharger, d'envoyer, de copier / coller des données confidentielles de postes de travail Linux vers le cloud, vers des applications en ligne et vers des périphériques de stockage portables.
How to use the Offline Temporary Password (OTP) feature in Endpoint Protector 4
 
01:25
Learn how to authorize the use of blocked devices (USB Flash Drives, CD/DVD, external HDDs, etc.) by using the offline temporary password (OTP) feature when computers are off the network. Works for Windows, Mac and Linux computers in the same way. Subscribe to our Channel and get more great tips on content-aware Data Loss Prevention (DLP) https://www.youtube.com/user/CoSoSys Find out more about the product here: http://www.endpointprotector.com/products/endpoint_protector
Comment est-ce que fonctionne la Protection de Contenu? - Endpoint Protector Demo
 
05:00
Le Module de Protection de Contenu vous permet un contrôle détaillé concernant les données de l’entreprise qui sont transférés de vos ordinateurs. Grâce à une inspection minutieuse du contenu, les transferts de documents importants de la société sont consignés et rapportés. Les transferts de fichiers peuvent être autorisés ou bloqués en fonction de stratégies d'entreprise prédéfinies. Vous pouvez appliquer les restrictions pour les transferts en utilisant les navigateurs, le courrier électronique, les applications et services de partages de fichiers, etc. La détection contextuelle est également disponible en tant que fonctionnalité générale, pour vous offrir une modalité avancé d'inspecter des données confidentielles basées sur le contexte. ------------------------- More info here: ► https://www.endpointprotector.fr/solutions/content-aware-data-loss-prevention -------------------------
My Endpoint Protector explained in plain English / Device Control can be so easy (OLD version)
 
02:14
Manage portable device use online with My Endpoint Protector and stay clear of portable device threats. Visit http://my.EndpointProtector.com With My Endpoint Protector you can: 1.Control portable device use on Windows and Mac 2.Centrally controlled online, no Server Hardware or Server Software Required 3.Prevent Data Loss, Data Theft and Data Leakage 4.Find out who is trying to do what with your data 5.Setup in minutes 6.Try it today at http://my.EndpointProtector.com or visit http://www.EndpointProtector.com
Fingerprint Enrollment Tutorial - Carry it Easy - CoSoSys
 
03:28
http://www.cososys.com/ Users of Carry it Easy Bio can protect their valuable portable data using their fingerprint. This tutorial shows how to set up the biometric security feature by registering your fingerprints.
Как работает модуль Управление Устройствами? - Endpoint Protector Demo
 
01:59
Посмотрите, как вы можете заблокировать и контролировать USB и периферийные порты, чтобы предотвратить кражу или потерю данных . Наш модуль Управлением Устройствами защищает от потери данных, отслеживая и контролируя передачу данных с Windows/Mac/Linux на съемные устройства хранения, такие как USB-накопители и многие другие. Узнать больше: https://www.endpointprotector.com/solutions/device-control
Как Endpoint Protector DLP может обеспечить защиту ваших данных на конечных точках Linux
 
04:33
Посмотрите, как вы можете настроить политику по предотвращению потери данных на конечных точках Linux, какие приложения находятся под контролем Endpoint Protector, и какой тип конфиденциальной информации может обнаруживать и блокировать Endpoint Protector. Данное видео объясняет, как Endpoint Protector может помочь вам защитить конфиденциальную деловую информацию или на пример отчеты сотрудников от утечек данных на машинах Linux (различные дистрибутивы, такие как Ubuntu, RedHat, CentOS, OpenSUSE), показывая шаг за шагом, как создавать политику. Остановите пользователей от копирования конфиденциальных данных с рабочих станций Linux на облаке, онлайн приложений и на портативных устройствах.
Endpoint Protector Virtual Appliance for USB Control and Data Leakage Prevention
 
00:46
Endpoint Protector Virtual Appliance - All-in-one Device Control/Data Leakage Prevention Solution http://www.EndpointProtector.com The Endpoint Protector Virtual Appliance is a dedicated virtual appliance for device control and data loss prevention. Our appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices. Some of the controlled device types are USB, FireWire, SD Card Reader, Bluetooth, smartphones, etc. The Endpoint Protector Virtual Appliance works for Windows and Mac OS X. Endpoint Protector Appliance is the complete solution for a safe working environment with portable devices. http://www.EndpointProtector.com
Mobile Device Management (MDM) for iOS and Android with Endpoint Protector
 
01:20
Secure your mobile iOS and Android devices with Endpoint Protector Mobile Device Management (MDM) and keep a close eye on where devices are going with your sensitive enterprise data. Ensure complete protection of all your enterprise mobile devices / mobile endpoints by enforcing your security policy and restrictions. Locate, Lock, Wipe devices to prevent your data getting in the wrong hands. In the BYOD era, Endpoint Protector MDM offers enhanced security for iOS and Android smartphones and tablets. Implemented as a virtual or hardware appliance it is ready to secure your device fleet in less than an hour. Try it now! More information about Endpoint Protector can be found here: http://www.endpointprotector.com/products/mobile_device_management
GDPR Essentials
 
02:50
This video offers a brief overview of what GDPR (General Data Protection Regulation) is and how it translates into actual measures for companies. Find out what type of data GDPR was designed to protect, who it applies to, what the first steps you should take to ensure compliance are and how Data Loss Prevention can help you realize them.
License to Hope by CoSoSys and the Romanian Foundation for Children, Community and Family (FRCCF)
 
01:16
http://www.licensetohope.com CoSoSys together with the Romanian Foundation for Children, Community and Family (FRCCF) initiated the License to Hope campaign (http://www.licensetohope.com), which aims to raise funds to support underprivileged children by offering them access to modern technology and education. The License to Hope campaign goal is provide 50 high end laptops for underprivileged and marginalized children. The campaign also aims to provide the laptops along with courses and training accompanying the computers for about 150 children and a chance to self improve. About FRCCF FRCCF has been active in the children rights protection field for over 12 years. The community centers from Cluj, Oradea, Satu Mare and Câmpia Turzii offer help and care for around 700 children from the poorest families in these cities. FRCCFs mission is to protect childrens rights, so that they can grow up in a protective family environment, benefiting from the education and health services they need. For more information, please visit www.frccf.org.ro . About CoSoSys CoSoSys is specialized in network endpoint security and development of software for portable storage device enhancement. The application portfolio includes functions from password security, data synchronization and network security. CoSoSys distributes its products globally through the worlds leading hardware manufacturers, software Distributors, Resellers and directly to users at http://www.CoSoSys.com and http://www.EndpointProtector.com. CoSoSys enjoys a continuously growing installation base of users worldwide.
Visit Endpoint Protector at RSA Conference 2016
 
00:34
CoSoSys at RSA Conference 2016 - showcasing Endpoint Protector, our Data Loss Prevention and Mobile Device Management software. We invite you to visit our booth #N4328 in the North Expo. Our representatives are prepared to clarify your DLP concerns and doubts and to speak about our Data Loss Prevention for Linux release. Come meet us also at the Demo Showcase organized by Trusted Computing Group at Moscone West, Room 2002/2006 between 8:30AM – 12:30 PM on 29th of February. You will be welcomed by Zoran, our Presales Engineer and Business Development wizard who will showcase Data Loss Prevention in mixed environments: Windows, Mac and Linux.
Endpoint Protector DLP at the RSA Conference 2017
 
00:21
The RSA Conference 2017 Expo Hall is the meeting point for thousands of information security professionals from across the United States and around the world. As always, it's great to be in the middle of the most innovative data security product releases, updates, and, most importantly, to network with our peers. If you are registered, make sure to include our Endpoint Protector booth #N4337 from the North Expo in your itinerary to discuss about one of the preeminent threats in organizations - insiders - and the perfect tool to deal with them - cross-platform Data Loss Prevention software with USB Enforced Encryption. We are looking forward to welcoming you with demos, great giveaways, and our top experts to help you with your data protection concerns.
Upgrade Instructions for Endpoint Protector 2009 (Windows 2003 Server) from 3.0.1.2 to 3.0.3.7.avi
 
09:41
Upgrade Instructions for Endpoint Protector 2009 Endpoint Protector Server Running on Windows 2003 Server Upgrade from Version 3.0.1.2 to 3.0.3.7
Как работает Защита на Основе Содержимого? - Endpoint Protector Demo
 
03:20
Защита на основе содержимого от Endpoint Protector предлагает компаниям возможность детального контроля над конфиденциальными данными. Посредством тщательной проверки содержимого решение Endpoint Protector блокирует и / или сообщает о передаче важных документов компании. Передача файлов может быть разрешена или заблокирована на основе предварительно определенных политик компании и может быть применена к веб-браузерам, почте, приложениям, общим папкам и т. д. Контекстное обнаружение также доступно как общая функция, предлагая расширенный способ проверки конфиденциальных данных на основе содержимого и контекста. ------------------------- Более подробную информацию вы можете найти здесь: ► https://www.endpointprotector.com/solutions/content-aware-data-loss-prevention -------------------------
Comment est-ce que fonctionne le Contrôle de Dispositifs? - Endpoint Protector Demo
 
02:35
Voyez comment verrouiller, contrôler et surveiller les ports USB et les périphériques pour empêcher le vol et à la perte de données. Notre module de Contrôle de Dispositifs protège contre la perte de données en surveillant les transferts de données de l’ordinateur vers des périphériques de stockage amovibles tels que les clés USB. Voir plus: https://www.endpointprotector.fr/solutions/device-control