Endpoint Protector Appliance: Stop data theft on Windows and Mac

CoSoSys Releases Endpoint Protector 4 – New Device Control Hardware and Virtual Appliance

October 27th, 2011 by Agent Smith (0) Data Encryption,DLP,endpoint security,In The Spotlight

Endpoint security developer CoSoSys has released a new version of their data loss prevention, device control and endpoint security solution for Windows and Mac OS, Endpoint Protector. Offering enhanced protection, increased effectiveness and the fastest implementation time in its segment, the out-of-the-box Hardware and Virtual Appliance is now available for small, medium and large companies and organizations.

en-banner.png

Coming with a long list of new features targeting better security, reliability, ease of use and better adapting to company structures and organization charts, Endpoint Protector 4 is designed to protect networks ranging from 20 computers (endpoints) to more than 5.000 endpoints.

Some of the top benefits of this latest Endpoint Protector solution are:

  • Seamless integration in business processes
  • Saving time and money when the solution is installed
  • Increased security through enhanced protection
  • Reducing allotted resources of the security staff
  • Optimum security through enhanced stability
  • Enhanced protection through complex, adaptable end efficient security
  • Reliable security through enhanced monitoring and policy control
To find out more about the Endpoint Protector 4 Hardware and Virtual Appliance and see the detailed list of features, visit the product page and the official press release.

Israeli Ministry Falls Pray to Insider Theft of 9 Million Records

October 24th, 2011 by Agent Smith (0) Data Theft & Loss

No one is safe from inside threats, not even state departments and ministry, as a very recent incident at Israel’s Ministry of Labor and Welfare. A contract worker has stolen personal information of over 9 million Israelis from the country’s Population Registry. The Jerusalem Post quoted by Dark Reading states that the perpetrator copied the ID numbers, full names, addresses, dates of birth, information on family connection as well as other details and used it to create a searchable database which was going to be sold to a private buyer.

As the contract worker lacked the tech skills needed to create the database, he shared the 9 million stolen records to another individual who did the actual design of the software program that exploited the existing database of Israeli citizens and called his creation “Agron 2006″.  Read more

Spectrum Health Client Data Stolen With Hard Drive

October 24th, 2011 by Agent Smith (0) Data Theft & Loss,security breach

Health systems company Spectrum has been the victim of a data breach affecting confidential health information of some of their clients. The breach was the result of an electronic device theft, the perpetrators also taking a hard drive that included the medical details. According to Spectrum representatives, the stolen information was not encrypted, but it was double password protected.

Device Control for Windows and Mac

The thieves took three electronic devices when breaking in the offices located at  484 Main St. in Worcester in late August, but only one was used to temporarily store personal and protected health information. Read more

This time it seems to be too much

October 12th, 2011 by Cristina (0) In the News,Malware Infections

What you can see in the picture is belonging to US Navy Drone Reaper. It is remotly controlled air vehicle used during combat missions in Afghanistan. A machine that is capable of neutralising targets or performing reckon missions. What would you say if you found out, that every “step” of the machine was tracked by a computer virus - a keylogger? dangerroom says that no more than 2 weeks ago on computers in Creech Air Force Base in Nevada. Since then, pilots are still performing overseas missions, and also there were several attempts to remove the malware. However,

We keep wiping it off, and it keeps coming back

It does not sound promising if one of most important America’s weapons is infected. It is not sure whether the infection was done on purpose or it was accidental. The virus is believed to be spread with removable devices, that are used to load map updates and transport mission videos from one computer to another. Read more

Hardware loss in a hospital endangers data of 1.6 million people

Nemours, an American organization for children’s health announces through a press release the loss of three unencrypted backup tapes that contained information such as the name, address, date of birth, social security number, insurance and medical treatment information and bank account information of 1.600.000 patients and employees.

The three backup tapes were stored in a cabinet that might have disappeared during a facility modernization project.

So far, there is no evidence that the tapes were stolen, accessed or used for fraudulent purposes.

Nemours offers free credit monitoring, identity theft protection and call center support.

Find their press release here: http://www.nemours.org/mediaroom/news/2011/missingtapes.html