Endpoint Protector Logo
Endpoint Protector Logo
CoSoSys

Endpoint Protector

6.9 / 10
Category
Endpoint Protector
6.9 / 10

What is Endpoint Protector?

Discover, monitor, and protect your sensitive data with Endpoint Protector, advanced multi-OS data loss prevention.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Endpoint Protector won the following awards in the Data Loss Prevention category

Endpoint Protector Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Endpoint Protector.

82 Likeliness to Recommend

92 Plan to Renew

76 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

+81 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Endpoint Protector?

6% Negative
15% Neutral
79% Positive

Pros

  • Efficient Service
  • Caring
  • Security Protects
  • Continually Improving Product

Feature Ratings

Average 75

Endpoint Support

79

Activity Monitoring Alerts

79

Real Time Scanning

79

Multiple Enforcement Actions

78

Encryption and Decryption Support

77

Data Discovery (DLP)

75

Forensic Analysis Support

74

Centralized Reporting Engine

70

Email and IM Support

70

Customizable and Pre Canned Policies

70

Environment Support

69

Vendor Capability Ratings

Average 72

Business Value Created

94

Availability and Quality of Training

91

Ease of Customization

91

Product Strategy and Rate of Improvement

86

Ease of Implementation

84

Ease of IT Administration

84

Vendor Support

84

Quality of Features

83

Ease of Data Integration

77

Breadth of Features

73

Usability and Intuitiveness

71

Endpoint Protector Reviews

Moues-Lee T.

  • Role: Human Resources
  • Industry: Other
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Jun 2022

Endpoint protector is a great endpoint solution.

Likeliness to Recommend

8 / 10

What differentiates Endpoint Protector from other similar products?

The device management will be terribly granular – by device, by user, by computer, by group. It mechanically finds devices so you’ll add rights and policies to those devices or regarding those devices. There’s also one time Passwords – that i believe last as long as you retain them in the console, therefore can be re-used, despite the name. That is nice for a sure admin to own so I will get my job done.

What is your favorite aspect of this product?

The agent is simple to install/ deploy. The most effective part is that you just can unlock any device additionally without a web connection, that is very vital to us as several of our engineers add remote or desert areas. I can solely extremely suggest this software.

What do you dislike most about this product?

The absence of Okta integration and a Splunk app is what I most dislike regarding endpoint Protector. The UI might use some rewording and work flow changes. If they had some wizards to be ready to copy a Windows policy to a mac policy to a Linux policy that might be huge however those options are still lacking. There’ a touch of automation that the endpoint protector by CoSoSys might do better on.

What recommendations would you give to someone considering this product?

Although you select to host the server in your cloud setting you have to do it with their AMI that disables SSH access for you. Therefore you’re dependent on them for continuing support. Had we known this we would have simply hosted through them from the get-go.

Pros

  • Saves Time
  • Continually Improving Product
  • Performance Enhancing
  • Enables Productivity

Salmine H.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Jun 2022

It is a complete application for DLP.

Likeliness to Recommend

8 / 10

What differentiates Endpoint Protector from other similar products?

I like however granular the settings are. We can create policies for users, computers, devices, and so on this permits us to make terribly specific policies to allow least privilege to end users. They were conjointly very competitive with pricing compared to alternative service suppliers within the same space.

What is your favorite aspect of this product?

End point protector moves with the times, not solely with support of widely used OS’ however its options and GUI set it higher than its competition. Its wonderful that such a complex was created with simplest interface. Controls are clear and principally is used with none issues. Documentation of the merchandise is additionally smart and have thorough details, one among the key issue is Deep packet inspection. This enables the organization like us to observe , what’ going out of the company. Although we’ve got also started using a feature , wherever we can lock the laptop/Desktop, USB and secondary storage device. Reportage is another thing t

What do you dislike most about this product?

The UI isn’t the best, weird sometimes. Additionally sending emails concerning pretected devices suddenly stops (after a couple of weeks). Once you reboot, all of a sudden hundreds of emails arrive. Devices, that you ought to unlock for an endpoint, show up “green” (because they’re already unsecured for others) but are still locked for this specific endpoint.

What recommendations would you give to someone considering this product?

If you’re searching for a straightforward one-stop answer for observance of the most valuable info and belongings of your business, you’ll love using endpoint protector by CoSoSys.

Pros

  • Continually Improving Product
  • Performance Enhancing
  • Efficient Service
  • Inspires Innovation

Danna-jess Z.

  • Role: Finance
  • Industry: Other
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Jun 2022

Excellent software for DLP implementation.

Likeliness to Recommend

9 / 10

What differentiates Endpoint Protector from other similar products?

The best part is that it supports DLP for all the 3 platforms and which provides us the higher feasibility to manage a hybrid environment from a single answer and the vital part is for the simple Management. Conjointly once you see there are leaders for DLP solution but after they are raise what platform does one support than they even have limitation once it involves the management of hybrid environment but when it comes to keeping it serving the info security for all the platform windows, Mac and Linux

What is your favorite aspect of this product?

The merchandise is straightforward to use and offers a rich set of DLP functionality. Product support browser-agnostic information leakage was deteraised. To boot support of a lot of applications like slack and networking protocols like FTP and SCP is great. Cocosys team is really supportive and have a powerful product roadmap. Device management is incredibly functional and beats out several of the opposite choices out there. The flexibility to tune the PII findings with toggles is great. The load on the workers from a management perspective hasn’t been very high, and that we are accomplishing our current DLP goals.

What do you dislike most about this product?

I really would like EPP could be converted into a full SaaS product that doesn’t have foundational network requirements. Gone are the times of staff work from an office and use VPN from remote. The merchandise team at CoSoSys ought to be thinking further ahead and dealing towards a SaaS offering. There are ways to configure it for a remote office resolution however they’re not the most effective. Another nice feature would be JSON formatted logs.

What recommendations would you give to someone considering this product?

For anyone who is trying to manage a hybrid setting and needs straightforward management and preparation, it’s the best solution to deal with. We would advocate monitoring each activity on the endpoint, which permits us crystal clear opportunities for information exfiltration, control USB access & alert/block client data patterns.

Pros

  • Enables Productivity
  • Trustworthy
  • Efficient Service
  • Inspires Innovation

Most Popular Endpoint Protector Comparisons