Skip to main content
TrustRadius
Endpoint Protector by CoSoSys

Endpoint Protector by CoSoSys

Overview

What is Endpoint Protector by CoSoSys?

Endpoint Protector by CoSoSys is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, and Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) platforms. The solution protects from data leaks, theft, and exfiltration, it minimizes the risk of insider threats…

Read more
Recent Reviews

TrustRadius Insights

Intuitive User Interface: Users have consistently found the user interface of Endpoint Protector to be intuitive and easy to use, allowing …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Endpoint Protector by CoSoSys?

Endpoint Protector by CoSoSys is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, and Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) platforms. The solution protects from data leaks, theft, and exfiltration, it minimizes the risk of insider threats and helps…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

80 people also want pricing

Alternatives Pricing

What is Veeam Backup for Microsoft 365?

Veeam® Backup for Microsoft Office 365 eliminates the risk of losing access and control over Office 365 data including Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams — so that data is always protected and accessible.

What is Kaspersky Endpoint Security Cloud?

Kaspersky Endpoint Security Cloud provides a solution for organizations' IT security needs, blocking ransomware, file-less malware, zero-day attacks and other emerging threats. Kaspersky’s cloud-based approach helps users to work securely on any device, and collaborate safely online, at work or at…

Return to navigation

Product Demos

HS webinar: How to secure your company’s sensitive and personal data – a live demo by CoSoSys

YouTube
Return to navigation

Product Details

What is Endpoint Protector by CoSoSys?

Endpoint Protector by CoSoSys is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, and Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) platforms. The solution protects from data leaks, theft, and exfiltration, it minimizes the risk of insider threats and helps companies to reach compliance with data protection regulations such as the GDPR, CCPA, PCI DSS, HIPAA, and more. It features specialized modules that clients can pick and choose from based on their needs: Device Control (USB and peripheral port control), Content Aware Protection (safeguards data in motion), eDiscovery (scans data at rest), and Enforced Encryption (secures USB storage devices).

The mission of Endpoint Protector by CoSoSys is to enable end-users and businesses worldwide to take full advantage of the performance benefits of portability, mobility, and communications solutions, without compromising security. The company distributes its products globally through partners and resellers.


Endpoint Protector by CoSoSys Features

  • Supported: Cross-platform solution (Windows, macOS and Linux)
  • Supported: Lockdown, control, and monitor USB and peripheral ports to stop data theft and data loss
  • Supported: Monitor and Control data in motion, deciding what confidential files can or cannot leave the company
  • Supported: Automatically secure data copied on USB storage devices with AES 256bit encryption
  • Supported: Scan data at rest on network’s endpoints and apply remediation actions such as encrypt or delete in case confidential data is identified on unauthorized computers

Endpoint Protector by CoSoSys Video

In this Security Briefing, Tim Deluca-Smith is joined by CoSoSys Founder and CEO, Roman Foeckl, and CoSoSys Enterprise Specialist, Zoran Cocoara. The team discuss the implications of hybrid working on data security, and how a DLP solution can protect an organization from insid...
 Show More

Endpoint Protector by CoSoSys Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo
Supported CountriesGlobal
Supported LanguagesCzech, German, English, Persian, French, Hungarian, Italian, Japanese, Korean, Polish, Portuguese, Romanian, Russian, Spanish, Thai, Turkish, Vietnamese, Chinese (Simplified), Chinese (Traditional)
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(4)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Based on user feedback, there are three common recommendations for improving the software. Users suggest increasing the knowledge base, providing more instructional videos for configuration and implementation, and ensuring easy accessibility to resources. Expanding the knowledge base would enhance troubleshoot and problem-solving capabilities. Additional instructional videos would be helpful in understanding how to configure and implement the software effectively. Users appreciate the software's easy accessibility, allowing them to quickly access information and resources as needed.

Reviews

(1-3 of 3)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using this Endpoint Protector by CoSoSys as a data loss prevention solution. This was implemented as our users have started to work from home and it was very much required to extend control and protection even when the users were working from home or when connected through any open WIFI terminals.
  • Data loss prevention.
  • USB control.
  • Application control.
  • Schedule based policies.
  • App integration - CoSoSys supports a lot of industry standard apps but fails to provide protection on 3rd party applications.
  • Complete disk encryption.
  • Web filtering features.
With CoSoSys Endpoint Protector, we are able to control whatever the users are trying to connect to their system, be it a mobile phone, ptp/mtp device, printer, CD/DVD, or any other peripheral, and based on the user level/category, we have even allowed them access to organization's storage drive, which we whitelisted, and rest all other devices were blacklisted.
  • Positive - complete control on user's access medium.
  • Positive - single platform for controlling external devices as well as applications on a user system.
Score 5 out of 10
Vetted Review
Verified User
Incentivized
We purchased it, specifically for source code protection, but it didn’t work for us. Code is being incorrectly identified, lots of false positives. For example, many Visual Studio projects fail to compile, and according to EPP Logs, it says code have tried to leak, via Teams, or Slack, and that doesn’t make sense.
The other problem we have is that all the software is built around a device control module, so for example you can not create dlp rules for external devices, you can just permit or deny the device use.
  • Can be used remotely via public IP or VPN
  • Integrates well with Active Directory
  • Easy to deploy
  • Source code detection is their selling point, they should fix all the problems
  • Copy/Paste, when you copy paste text, the control applies over the paste, this is correct, but when you copy files, the control is on the copy, not in the paste, so Incan not move protected content not even in a sub folder
  • Device protection shouldn’t be the main module, there are other software that handle devices, you should focus on DLP
I think EPP will server well to any company try to protect data leaks of any type. Source code is something hard to control, I get that, but it you search on Google for source code protection DLP and the first result is COCoSys, then it should work flawlessly, and it is still like in alpha
  • Didn’t work as expected
  • Not sure yet if we are going to renew it, thankfully we didn’t make a 3 year contract required by them.
  • The are not many options in the market for source code detection, so we may have to stick with it
It’s pretty much the same, the source code detection is the main difference
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Endpoint Protector [by CoSoSys] is being used by our entire organization as a data loss prevention solution. We needed a unified solution across the organization to monitor possible data loss events. Endpoint Protector is currently deployed to Windows, Mac, and Linux type endpoints. Endpoint Protector is being deployed and used by specific teams for specific use cases.
  • Compatibility with major operating systems
  • Great support by CoSoSys with issues we come across.
  • Granular controls and application of policies.
  • User interface could use some work to unify across the whole product.
  • Some initial bugs needed to be worked out.
  • Non standard syslog format caused headaches for a few months while we waited for them to fix the issue.
Endpoint Protector [by CoSoSys] is well suited for an environment where a data loss prevention solution is required and many different operating system types are used. It is also well suited for an organization that has a need to deploy a solution quickly. Endpoint Protector is not well suited for companies that need to have an API or other integrations with other IT tools.
  • We've already seen some great return on investments. Endpoint Protector has caught, in it's short time being deployed, a data loss incident we would not have caught otherwise.
  • Endpoint Protector has given the team leads comfort that the data loss events is being monitored and acted upon.
  • Endpoint Protector has fulfilled a business objective of protecting intellectual property from leaving the organization through an unauthorized channel.
Endpoint Protector [by CoSoSys] was able to be installed on all major operating systems. Endpoint Protector was also able to perform block actions and do it at a granular level among the endpoints. Business needs required a traditional data loss prevention and Endpoint Protector met those needs. We had a need to block some USB storage events and Endpoint Protector met those needs.
Return to navigation