We performed a comparison between CoSoSys Endpoint Protector and Trellix DLP based on real PeerSpot user reviews.
Find out in this report how the two Data Loss Prevention (DLP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is fantastic in terms of the granularity of the policies. It has many built-in policies, and we can add or create more policies as well. It is perfect, and it gives us more options. We have some users who go outside and then come inside. With EPP, we can even control those users who are outside. If they need to access the media that we are using right now, we can provide OTP messages so that they can access the media even when they are outside of their organization. With our previous solution, we were facing some issues in doing this."
"The interface is pretty user-friendly, neatly explained, and simple to use."
"The most valuable features are the ability to prevent access to external devices, and also site blocking."
"The software is easy to use and the dashboard is intuitive."
"The core of its value lies in obtaining logs remotely and exercising control over what employees can or cannot use."
"All of the features are effective, but the highlight feature of the product was the data layer inspection. When we talk about a DLP product, data packet inspection is very important. Securing data at rest is easy, but securing data in transit is challenging. We used it comprehensively to secure end drives, data transfers, secure hard drives, and end-user machines. It proved monumental in our operations."
"The console is friendly and it supports Mac."
"I like the data protection feature. Our users were working on a client's CRM application with a lot of client-related EIA information. We did not want the users to be able to send any of this data outside. I also like its ability to protect against data leaks via emails and social media. I like that you can deploy it quickly, and it requires no training."
"Trellix can transfer the data through the cloud. The storage device control is an important feature."
"Scalability is feasible since it's on-premises. It's easy to scale there."
"The tool has prebuilt templates for data classification. It is easier for customers to get started."
"It prevents enterprises from installing external software and devices and can block specific network pathways."
"It is a very stable solution."
"In Linux a user can remove a getent anytime. There is no control there on the file structure in Linux. So if this solution could give us information on what users removed in the dashboard, it would help us."
"Sometimes, it should try to focus on one thing rather than multiple things. Endpoint Protector does device control very well, which is why we use that particular function."
"This product provides zero-day protection for macOS, although I'm currently dealing with an issue on the most recent rollout of the Endpoint client that doesn't seem to be fully functioning."
"I have faced issues which shouldn't be related to this product. This product is purely a DLP, so it should only protect my data. I don't know what is happening with their agent or what is happening with the software, but it messes up my endpoint. For example, people are facing bandwidth issues. Before I deployed this on an endpoint, people were getting internet speeds of 40 or 50 Mbps. After deploying it, that would come down to 10 Mbps. And if I uninstalled the agent, it would go back to 50 Mbps."
"CoSoSys Endpoint Protector's network-level DLP and integration with mail servers need improvement."
"I would like to see an alert feature that when a system is started, it checks to make sure that the client has the most up-to-date policies."
"When you want to uninstall and reinstall, there are a lot of issues. You have to do a lot of workarounds to reinstall Endpoint Protector. This is a major issue that we have constantly because we still have old systems with XP. While there are only very few, we need to run them because there are machines attached that only run on XP. When we need to uninstall and reinstall on XP or Windows 10, we have serious issues left in the Registry Editor everywhere. There is a lot of manual interference to get the reinstallation to work. For the uninstallation of Endpoint Protector, they need to work on this so it doesn't leave any leftovers behind."
"It needs to improve in terms of policy customization."
"The support team's response time during the night is an area of concern where improvements are required."
"The whole UI of the server console installed on the standalone computers is hefty."
"Trellix needs to improve customer support."
"In future releases, I would like to see like to see encryption available on the cloud-based version."
"Trellix is incompatible with Linux, and its DLP part is incompatible with Mac. Sometimes, it does not work on Windows, either."
CoSoSys Endpoint Protector is ranked 8th in Data Loss Prevention (DLP) with 25 reviews while Trellix DLP is ranked 18th in Data Loss Prevention (DLP) with 5 reviews. CoSoSys Endpoint Protector is rated 8.4, while Trellix DLP is rated 8.0. The top reviewer of CoSoSys Endpoint Protector writes "Makes management and upgrades easier and provides better control". On the other hand, the top reviewer of Trellix DLP writes "Useful in the area of data security and is easy to deploy". CoSoSys Endpoint Protector is most compared with Forcepoint Data Loss Prevention, Microsoft Purview Data Loss Prevention, Safetica ONE, Symantec Data Loss Prevention and GTB Technologies Inspector, whereas Trellix DLP is most compared with Microsoft Purview Data Loss Prevention, Symantec Data Loss Prevention, Varonis Platform, Forcepoint Data Loss Prevention and Netskope Data Loss Prevention (DLP). See our CoSoSys Endpoint Protector vs. Trellix DLP report.
See our list of best Data Loss Prevention (DLP) vendors.
We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.