Now you can remotely manage and enforce USB encryption for Windows and Mac.
CoSoSys has released its newly redesigned cross-platform solution ‘USB Enforced Encryption’ to the Indian market. The solution can encrypt, manage and secure USB storage devices by using 256-bit AES encryption. Password-based, the product is easy to use and very efficient for all types of organisations, from Small and Medium Business to the public sector. It works very well in a mixed environment that has both Windows PCs and Macs.
Enforced Encryption has gotten a makeover and now it has an intuitive modern interface for an improved user experience. Its updates, however, are not only aesthetics, bringing new features to enhance security and support trusted Endpoint Protector servers. The solution is an important module of CoSoSys`s flagship product, Endpoint Protector and can be used with Device Control software to make sure all confidential data transferred to USB storage devices is automatically encrypted.
IT administrators will be able to send messages to the users, request a password change or wipe the confidential data in case the device is lost or stolen. On the other hand, users will be authorized to transfer confidential data only on encrypted portable storage devices. Even more than that, data will be safe even if a device is lost or stolen, due to the password-protected encrypted tool.
In addition to EasyLock Enforced Encryption for USB devices, Endpoint Protector allows IT, administrators, to take advantage of FileVault and enforce encryption on enrolled macOS computers.
Endpoint Protector, CoSoSys`s flagship product, is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft while offering control of portable storage devices and ensuring compliance with data protection regulations such as GDPR, PCI DSS etc. With its modern intuitive interface and smooth integration can Virtual Appliance, Hardware Appliance or cloud. Endpoint Protector features several modules which clients can pick and choose from based on their needs: Content Aware Protection, Device Control, Enforced Encryption and eDiscovery.