Top 3 Reasons to Use Endpoint Data Loss Prevention

Top 3 Reasons to Use Endpoint Data Loss Prevention

The primary tool of today’s business environment is the computer. Whether a desktop or laptop, these are the devices in front of which employees spend most of their working hours and on which they access sensitive information. They are indispensable tools, but also...
Why Does Linux Need Data Loss Prevention?

Why Does Linux Need Data Loss Prevention?

Linux has earned a reputation of being the most secure operating system, but despite this, it still has its own security flaws. Deploying a secure operating system is an important starting point for every business, but even the most secure networks can be invaded....
Endpoint Protector Wins 3 Major Industry Awards

Endpoint Protector Wins 3 Major Industry Awards

This year Endpoint Protector has been granted three awards already, that demonstrate our expertise, commitment, and innovation in the cybersecurity field. These latest recognitions, including the Infosec Awards 2019, the Cybersecurity Excellence Awards 2019 and the...
All You Need To Know about the GLBA Compliance

All You Need To Know about the GLBA Compliance

Although better known for its privacy stipulations, the Gramm-Leach-Bliley Act (GLBA), also called the Financial Modernization Act of 1999, is a US federal law whose original purpose was to allow different types of financial institutions such as banks,...
What’s New in Endpoint Protector 5.2.0.5

What’s New in Endpoint Protector 5.2.0.5

A new release of Endpoint Protector is available for our clients and it presents the first version of a brand-new feature: Deep Packet Inspection. Currently available for macOS, the new functionality allows network traffic to be inspected for content....