Endpoint Protector by CoSoSys is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, and Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) platforms. The solution protects from data leaks, theft, and exfiltration, it minimizes the risk of insider threats and helps companies to reach compliance with data protection regulations such as the GDPR, CCPA, PCI DSS, HIPAA, and more. It features specialized modules that clients can pick and choose from based on their needs: Device Control (USB and peripheral port control), Content Aware Protection (safeguards data in motion), eDiscovery (scans data at rest), and Enforced Encryption (secures USB storage devices).
The mission of Endpoint Protector by CoSoSys is to enable end-users and businesses worldwide to take full advantage of the performance benefits of portability, mobility, and communications solutions, without compromising security. The company distributes its products globally through partners and resellers.
A de minimis incentive was given to thank the reviewer for their time. The incentive was not used to bias or drive a particular response, nor was the incentive contingent on a positive endorsement. More Info
Cloud Systems Administrator in Information Technology at Webcreek (51-200 employees employees)
Pros
Can be used remotely via public IP or VPN
Integrates well with Active Directory
Easy to deploy
Cons
Source code detection is their selling point, they should fix all the problems
Copy/Paste, when you copy paste text, the control applies over the paste, this is correct, but when you copy files, the control is on the copy, not in the paste, so Incan not move protected content not even in a sub folder
Device protection shouldn’t be the main module, there are other software that handle devices, you should focus on DLP
Return on Investment
Didn’t work as expected
Not sure yet if we are going to renew it, thankfully we didn’t make a 3 year contract required by them.
The are not many options in the market for source code detection, so we may have to stick with it
A de minimis incentive was given to thank the reviewer for their time. The incentive was not used to bias or drive a particular response, nor was the incentive contingent on a positive endorsement. More Info
Verified User
Consultant in Information Technology (501-1000 employees employees)
Use Cases and Deployment Scope
We are using this Endpoint Protector by CoSoSys as a data loss prevention solution. This was implemented as our users have started to work from home and it was very much required to extend control and protection even when the users were working from home or when connected through any open WIFI terminals.
Pros
Data loss prevention.
USB control.
Application control.
Schedule based policies.
Cons
App integration - CoSoSys supports a lot of industry standard apps but fails to provide protection on 3rd party applications.
Complete disk encryption.
Web filtering features.
Return on Investment
Positive - complete control on user's access medium.
Positive - single platform for controlling external devices as well as applications on a user system.
Alternatives Considered
Digital Guardian, by HelpSystems, Forcepoint Data Loss Prevention and Sophos Intercept X
Other Software Used
Forcepoint Data Loss Prevention, Palo Alto Networks Advanced URL Filtering, Palo Alto Networks WildFire
A de minimis incentive was given to thank the reviewer for their time. The incentive was not used to bias or drive a particular response, nor was the incentive contingent on a positive endorsement. More Info
Verified User
Analyst in Information Technology (10,001+ employees employees)
Pros
Compatibility with major operating systems
Great support by CoSoSys with issues we come across.
Granular controls and application of policies.
Cons
User interface could use some work to unify across the whole product.
Some initial bugs needed to be worked out.
Non standard syslog format caused headaches for a few months while we waited for them to fix the issue.
Return on Investment
We've already seen some great return on investments. Endpoint Protector has caught, in it's short time being deployed, a data loss incident we would not have caught otherwise.
Endpoint Protector has given the team leads comfort that the data loss events is being monitored and acted upon.
Endpoint Protector has fulfilled a business objective of protecting intellectual property from leaving the organization through an unauthorized channel.