Why Does Linux Need Data Loss Prevention?

Why Does Linux Need Data Loss Prevention?

Linux has earned a reputation of being the most secure operating system, but despite this, it still has its own security flaws. Deploying a secure operating system is an important starting point for every business, but even the most secure networks can be invaded....
Endpoint Protector Wins 3 Major Industry Awards

Endpoint Protector Wins 3 Major Industry Awards

This year Endpoint Protector has been granted three awards already, that demonstrate our expertise, commitment, and innovation in the cybersecurity field. These latest recognitions, including the Infosec Awards 2019, the Cybersecurity Excellence Awards 2019 and the...
All You Need To Know about the GLBA Compliance

All You Need To Know about the GLBA Compliance

Although better known for its privacy stipulations, the Gramm-Leach-Bliley Act (GLBA), also called the Financial Modernization Act of 1999, is a US federal law whose original purpose was to allow different types of financial institutions such as banks,...
What’s New in Endpoint Protector 5.2.0.5

What’s New in Endpoint Protector 5.2.0.5

A new release of Endpoint Protector is available for our clients and it presents the first version of a brand-new feature: Deep Packet Inspection. Currently available for macOS, the new functionality allows network traffic to be inspected for content....
5 Best Practices for PCI DSS Compliance

5 Best Practices for PCI DSS Compliance

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements that helps businesses protect their payment systems from breaches, fraud and theft of cardholder data. Developed by the PCI Security Standards Council, PCI DSS...
Reducing Security Risks with Cross-Platform DLP

Reducing Security Risks with Cross-Platform DLP

Nowadays, the majority of businesses work with a mixture of device types and operating systems. Cross-platform Data Loss Prevention (DLP) solutions help diminishing security vulnerabilities in heterogeneous IT environments. Over the past decade, the organizations have...