Endpoint Protector Appliance: Stop data theft on Windows and Mac

Don’t trust call centers with your private details!

October 28th, 2009 by Agent Smith (0) In The Spotlight,Research and Studies,security breach

Man and woman wearing headsetsThat is the natural conclusion one reaches after seeing the results of a new survey on how call centers handle private details of customers. According to the survey conducted by Veritape, more than 95% of call centers kept customers’ credit card information on phone call recordings, practice that overtly breaches current industry security standards.

Of the 133 call center managers surveyed, only 39% were aware of in place industry rules against storing such information and only 3% actually wiped credit card details from recorded conversations.

“The routine practice of storing unedited audio recordings of calls is creating a vast reservoir of sensitive data on the servers of call centers across the UK, in direct breach of global industry standards drawn up by the Payment Card Industry Data Security Council,” said a Veritape statement.

When you need to actually contact a call center, make sure you think twice before giving them the information they ask of you!

Security software sales powered by the free offerings

October 20th, 2009 by Agent Smith (0) endpoint security,In The Spotlight

When it comes to security, nothing seems better when it comes to marketing your product than having a free version to offer. Especially when you’re not the major market share holder, giving products away works miracles. At least that is the hypothesis of a recent DarkReading article.

But is this a new approach? Not exactly. From home user solutions to enterprise class security software, the smartest of the pack have a free version.

And why does this work? Simple. Why trust a sales pitch and a nicely designed demo when you can just download and install the product, test it, see how it works with your current infrastructure, then decide to buy. From one month demos to free, limited editions, this is the miracle of free: real results, real tests, no post-demo surprises.

Check out the success stories on DarkReading for more expamples of how free works in the security field.

New Zealands leading payment provider secures devices with Endpoint Protector

October 16th, 2009 by Agent Smith (0) Data Theft & Loss,DLP,endpoint security,In The Spotlight

Paymark, New Zealand’s leading electronic payments provider that processes more than 75% of all electronic transactions in the country, chose Endpoint Protector 2009 as a data loss prevention and device control solution after comparing it to applications developeb by McAfee, Symantec and Devicewall. Why Endpoint Protector? For its ease of use, speedy deployment and natural integration in the existing software and hardware platform.

The electronic payments field comes with specific challenges. As ensuring the highest level of security to customers and protecting them against data security breaches is critical in this field, companies need to effectively control the widespread use of portable storage devices and manage the risks they introduce. That, of course, without restricting in any way the mobility or increased productivity such devices entail. In Paymark’s case, as it happens for other similar businesses, Endpoint Protector is not the only security application they use, that is why compatibility with other security software is as important as features and functionality.

“Endpoint Protector’s simplicity has exceeded our expectations. The speed of deployment and changes is impressive and its encryption features are just what we needed.” Conrad Morgan, Manager ICT Security

To find out more about how implementing a device control and DLP solution in the online payments field goes, read the recently published case study of Paymark and Cososys.

The first fully compatible Device Control solution for Windows 7 and Mac OS X Snow Leopard

October 15th, 2009 by Agent Smith (0) DLP,endpoint security,In the News,In The Spotlight

Yes, folks it was bound to happen. Device Control, Data Loss Prevention and endpoint security applications were bound to conquer the new over-hyped platforms, Windows 7 and Snow Leopard. And the first one to reach this performance is the latest version of Endpoint Protector 2009, developed by CoSoSys, a leading developer of endpoint security and portable storage device applications. The new version has a clear purpose, one that is a must for all companies interested in security: allowing them to test and implement the most recent operating systems, while protecting them from common threats yielded by extreme data portability and mobility.

Endpoint Security and Device Control Solutions with low TCO and great ROI.

“Our goal is to keep companies safe while allowing them to test, implement and turn the latest breakthroughs in software and hardware platforms into a profitable advantage. Releasing a version for the Windows 7 operating system – which is currently one of the most hyped and critically appraised platforms – and for Mac OS X Snow Leopard is a natural step in our ongoing strive to adapt to as many IT environments as possible. It also complements our efforts of maintaining a high level of mobility and productivity for non-technical users by providing them with a continuously increasing range of controlled portable devices, from iPods, cameras and USB sticks to ExpressCard SDD and printers,” explains Roman Foeckl, CoSoSys CEO.

To test the new version of Endpoint Protector 2009, you can download the 30 days trial or check out the online demo at http://www.EndpointProtector.com.

Making the connection: Exposed data and consequences

October 2nd, 2009 by Agent Smith (0) Data Theft & Loss,DLP,Security Voyeurism,Sneak Peeks

Remember our recent post on Californian commuters being forced by the law to submit their private details to a site that was clearly exposing them and doing nothing about it?  While we emphasized the cause of the problem, an SQL injection vulnerability, and the fact that the site failed to fix it after its being reported, another security writer thought of exploring the consequences that could be triggered.

So here’s a fictional take on what could actually happen if anyone would exploit such a vulnerability, along with a few famous data theft cases that have rocked the security world, including the now world famous case of record holder Albert Gonzales.