Endpoint Protector Logo
Endpoint Protector Logo
CoSoSys

Endpoint Protector

6.9 / 10
Category
Endpoint Protector
6.9 / 10

What is Endpoint Protector?

Discover, monitor, and protect your sensitive data with Endpoint Protector, advanced multi-OS data loss prevention.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Endpoint Protector won the following awards in the Data Loss Prevention category

Endpoint Protector Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Endpoint Protector.

82 Likeliness to Recommend

92 Plan to Renew

76 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

+81 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Endpoint Protector?

6% Negative
15% Neutral
79% Positive

Pros

  • Efficient Service
  • Caring
  • Security Protects
  • Continually Improving Product

Feature Ratings

Average 75

Endpoint Support

79

Activity Monitoring Alerts

79

Real Time Scanning

79

Multiple Enforcement Actions

78

Encryption and Decryption Support

77

Data Discovery (DLP)

75

Forensic Analysis Support

74

Centralized Reporting Engine

70

Email and IM Support

70

Customizable and Pre Canned Policies

70

Environment Support

69

Vendor Capability Ratings

Average 72

Business Value Created

94

Availability and Quality of Training

91

Ease of Customization

91

Product Strategy and Rate of Improvement

86

Ease of Implementation

84

Ease of IT Administration

84

Vendor Support

84

Quality of Features

83

Ease of Data Integration

77

Breadth of Features

73

Usability and Intuitiveness

71

Endpoint Protector Reviews

  • Role: C-Level
  • Industry: Engineering
  • Involvement: Business Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Mar 2022

Easy to use and a new age product in making.

Likeliness to Recommend

9 / 10

Pros

  • Reliable
  • Performance Enhancing
  • Enables Productivity
  • Unique Features

Palak G.

  • Role: Information Technology
  • Industry: Utilities
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Mar 2022

Good features but agent issues are alot

Likeliness to Recommend

7 / 10

What differentiates Endpoint Protector from other similar products?

Custom policies and data bifurcation

What is your favorite aspect of this product?

Data bifurcation on different aspects

What do you dislike most about this product?

Issues with custom agents

What recommendations would you give to someone considering this product?

Please check agent lifecycle

Pros

  • Security Protects
  • Client's Interest First
  • Helps Innovate
  • Continually Improving Product

Cons

  • Under Delivered
  • Wastes Time

James R.

  • Role: Information Technology
  • Industry: Healthcare
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Mar 2022

Rock solid program but not user friendly.

Likeliness to Recommend

8 / 10

What differentiates Endpoint Protector from other similar products?

I haven’t used a lot of other products that can do the file shadowing so I don’t have a lot to compare to. Many if it’s other features I have seen in other software and it works just as well.

What is your favorite aspect of this product?

Being able to quickly lock down peripherals.

What do you dislike most about this product?

I really dislike the interface and how it is not very user friendly. It’s difficult to search through and find what I want quickly. And sorting is basically non existing on data which is a must have in my opinion.

What recommendations would you give to someone considering this product?

It works solid and requires little maintenance but is not super user friendly when trying to find devices or data you want.

Pros

  • Effective Service
  • Unique Features
  • Acts with Integrity
  • Generous Negotitation

Cons

  • Slower Product Innovation
  • Less Inspiring

Most Popular Endpoint Protector Comparisons