Haßberg Kliniken

Haßberg Kliniken implemented Endpoint Protector to secure and protect their customers’ sensitive data, and to better control and manage the risks of portable storage devices .

Healthcare
Challenge
Monitor data transfers, control and monitor all devices
Solution
Implementing Endpoint Protector’s Device Control module
Results
Efficient monitoring of data and file transfers, cost-effectivey
Challenge

Digital patient records are more vulnerable to theft and loss than physical records and, as a consequence, are protected under various data protection laws.

As a network of healthcare institutions, Haßberg Kliniken had to protect a wide range of confidential data, like patient care data, PHI, and PII.

Because of their lack of IT and data security knowledge, they needed a robust Data Loss Prevention (DLP) solution that helps them monitor employees’ activities related to data transfers and control and monitor all devices.

Why Endpoint Protector?

The decisive factor was the price-performance ratio for Endpoint Protector, as well as the stand-alone product option. Their antivirus system at the time was not able to do this

Solution

Device Control from Endpoint Protector by CoSoSys perfectly fit their requirements. It blocks employees or outsiders from copying sensitive files to portable storage devices such as USB sticks, ensuring that confidential data is blocked from being transferred outside the hospital network.

It permits the connection and transfer of files only onto trusted devices such as those issued by the institution to its employees or those that automatically encrypt data copied onto them.

Haßberg Clinics rated Endpoint Protector on a scale from 1 to 5, in offering the highest point to product functionality, ease of installation, support and updates, response time for support and questions, with an average score of 4.6.

“We liked that the product’s update distribution is clear and simple,'' said Jörg Behm, IT Manager. “The support team reacts very quickly and gives quick feedback and help with problems.”

We chose Endpoint Protector due to the various setting options (authorisations) for devices (CD drives, USB sticks, etc.), as well as the central control of rights for all clients and the client-specific setting options.
Jörg Behm
IT Manager
Transcribe_404: [case_studies_download]
观看演示
check mark

您的 Endpoint Protector 试用申请已发送!
我们的一位销售代表将很快与您联系并安排演示。