Endpoint Protector by CoSoSys vs. OpenText EnCase Endpoint Security

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Endpoint Protector by CoSoSys
Score 10.0 out of 10
N/A
Endpoint Protector by CoSoSys is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, and Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) platforms. The solution protects from data leaks, theft, and exfiltration, it minimizes the risk of insider threats and helps companies to reach compliance with data protection regulations such as the GDPR, CCPA, PCI DSS, HIPAA, and more. It features specialized modules that clients can pick and choose from based on their…N/A
OpenText EnCase Endpoint Security
Score 1.0 out of 10
N/A
OpenText EnCase Endpoint Security, is an endpoint security solution designed to provide 360-degree visibility across laptops, desktops and servers for proactive discovery of sensitive data, identification and remediation of threats and discreet, forensically-sound data collection and investigation. The application was developed and sold by Guardian Software as EnCase Endpoint Security, and is now part of the Security Suite from OpenText, since the acquisition in summer 2017.N/A
Pricing
Endpoint Protector by CoSoSysOpenText EnCase Endpoint Security
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Endpoint Protector by CoSoSysOpenText EnCase Endpoint Security
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Endpoint Protector by CoSoSysOpenText EnCase Endpoint Security
Top Pros

No answers on this topic

Top Cons
Best Alternatives
Endpoint Protector by CoSoSysOpenText EnCase Endpoint Security
Small Businesses
Paubox Email Suite
Paubox Email Suite
Score 10.0 out of 10
ESET PROTECT
ESET PROTECT
Score 9.1 out of 10
Medium-sized Companies
Druva Security Cloud
Druva Security Cloud
Score 9.7 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.2 out of 10
Enterprises
Druva Security Cloud
Druva Security Cloud
Score 9.7 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 9.6 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Endpoint Protector by CoSoSysOpenText EnCase Endpoint Security
Likelihood to Recommend
8.0
(3 ratings)
1.0
(1 ratings)
Support Rating
-
(0 ratings)
1.0
(1 ratings)
User Testimonials
Endpoint Protector by CoSoSysOpenText EnCase Endpoint Security
Likelihood to Recommend
CoSoSys
Endpoint Protector [by CoSoSys] is well suited for an environment where a data loss prevention solution is required and many different operating system types are used. It is also well suited for an organization that has a need to deploy a solution quickly. Endpoint Protector is not well suited for companies that need to have an API or other integrations with other IT tools.
Read full review
OpenText
It is more suited to environments that have a large internal user base since there will be more incidents that require forensic analysis. It will be less suited for environments that have a small internal user base due to the fact that there would be fewer incidents that require forensic analysis, but it really depends on the industry that a small internal user base is a part of.
Read full review
Pros
CoSoSys
  • Can be used remotely via public IP or VPN
  • Integrates well with Active Directory
  • Easy to deploy
Read full review
OpenText
  • Functionality meets minimal requirements, since it performs forensic investigations as advertised.
Read full review
Cons
CoSoSys
  • App integration - CoSoSys supports a lot of industry standard apps but fails to provide protection on 3rd party applications.
  • Complete disk encryption.
  • Web filtering features.
Read full review
OpenText
  • Their UI definitely needs to be more user-friendly, right now it is very cumbersome to run and view investigations.
  • Authentication mechanism should be a simple username/password, not certificate-based which is difficult to manage.
  • Needs better support documentation for the product, it is difficult to find solutions to issues that we run into.
Read full review
Support Rating
CoSoSys
No answers on this topic
OpenText
Because support is non-existent whenever you have a functionality issue using the product. Also since the UI is so cumbersome to use we could use as much support as possible. Whenever we ask for support we are told to take the training which costs us more money. I believe that support should be easily accessible and affordable for the client
Read full review
Alternatives Considered
CoSoSys
Endpoint Protector [by CoSoSys] was able to be installed on all major operating systems. Endpoint Protector was also able to perform block actions and do it at a granular level among the endpoints. Business needs required a traditional data loss prevention and Endpoint Protector met those needs. We had a need to block some USB storage events and Endpoint Protector met those needs.
Read full review
OpenText
The other forensic tool that is a direct competitor to EnCase and wasn't listed above is the Forensic Toolkit or FTK. I believe that FTK is a better tool overall simply because it is easier to manage and use when it comes to investigations. Unfortunately, I wasn't part of the decision process and EnCase was the tool selected, otherwise, I would have recommended FTK.
Read full review
Return on Investment
CoSoSys
  • Didn’t work as expected
  • Not sure yet if we are going to renew it, thankfully we didn’t make a 3 year contract required by them.
  • The are not many options in the market for source code detection, so we may have to stick with it
Read full review
OpenText
  • One negative impact would be that since the UI is cumbersome to use we would need to spend more money on training which is not always feasible.
  • Another negative impact would be that since there is not much support available this slows down investigations due to finding out how to troubleshoot and fix functionality issues.
  • One positive impact would be that since it meets minimal requirements when it comes to forensic analysis it gives us visibility on any malicious activity occurring on a user's endpoint.
Read full review
ScreenShots