Data Loss Prevention (DLP) features Reviews

Showing reviews of the top ranking products in Data Loss Prevention (DLP), containing the term features
Trend Micro Integrated Data Loss Prevention: features
TA
Information Security Annalists at a consultancy with 10,001+ employees

The most valuable features of this solution are the micro DLP features. There are policies in place if I want to restrict the copying of records to, for example, a USB drive.

View full review »
IT Support Manager at Loanme sp. z o.o.

The interface and dashboard are okay.

View full review »
JH
Technical Manager at a tech services company with 1,001-5,000 employees

It's easy to set up.

It's priced well.

There are no issues with the interface.

View full review »
Symantec Data Loss Prevention: features
TN
‎Head: Group Legal at Optiflex

I'm able to track everyone who is trying to send information outside the environment and to know if they are not supposed to be sending it. I'm also able to see the people who are accessing or maybe try to access the information they are not supposed to be accessing based on their level of classification.

It gives me overall control of who has got access to what and at what point and who can do what with specific information.

View full review »
Private Security Consultant at a tech services company with 11-50 employees

The most valuable feature of this solution is endpoint security.

The network discovery is very helpful.

View full review »
Cyber Security Engineer at quadra

The data matching features are the most valuable due to the easy policy setup and implementation.

View full review »
BJ
Assistant Manager at AmBank Group

The solution is very easy to use.

We find the product is easy to manage and maintain.

Their dashboard is very good. It allows us to see everything on the system and provides a good overview.

Overall, it's a very good product.

View full review »
AA
Information Security Consultant at a tech services company with 51-200 employees

I would rate it an eight out of ten. Not a ten because there are certain things that need improvement. 

My advice to someone considering this solution is to look at your needs. Try a few products because there are some features that exist in other solutions like Forcepoint that do not exist in Palo Alto. You should choose a solution based on your needs. 

I would recommend Symantec depending on the needs of the clients, but for me, Symantec is the best on the market.

View full review »
AT
Manager Cyber Forensic at a financial services firm with 51-200 employees

The dashboard, management section, and reporting are good.

View full review »
Sr. Manager - IT at a tech company with 10,001+ employees

I like the software as a whole. It's a good one. The tool's really working well, and the agents are good. It's not heavy, and it's working fine with the clients.

View full review »
Information Security Engineer at a security firm with 11-50 employees

There's only one policy needed to implement for all channels. That's a good point for Symantec. To have one policy for all channels has been great. You don't have a user workload. You can manage everything through a single policy.

View full review »
SK
Associate at a insurance company with 10,001+ employees

The solution is very good at fingerprinting the documents. This means, basically if a user tries to modify the data or change the file extensions, the system will recognize this action. It will offer the DLP images, so it will fingerprint the data. If a user is trying to modify data, they're trying to change the extension to whatever data, it will tune in on the IP, based on the indexing. 

There are a lot of features. We can modify only particular agent configurations. 

A new feature I've seen is a device block, which is very interesting. Previously, we used to create a policy for blocking certain data, which was transferred from our local machine to the mobile media. Now, we found that there'll be one more option called agent configuration device control. Under the device control, there'll be a block device connections option. It will alert us that a USP has been blocked. 

The solution offers very good virtual machine learning. The ML will capture information based on certain policies. We haven't used it yet. We're still learning about it.

The solution offers good data classifications. What we used to do, is we used to create one template and we used to sit with different project team members. We'd collect the information from the project managers, on the management side. We'd put the information into one Excel sheet and collect the information from that. Now, we're using that to review one data classification tool. What it will do now is, whenever you're working in the document, is it will ask you to determine the data. It will ask that if it is internal or confidential.  

We can integrate with some other tools such as Splunk, which is very useful.

View full review »
PG
Senior IT Architect at a tech services company with 201-500 employees

The exfiltration capabilities are great. You can put all of these rules in the product to detect the patterns and text. You can build the rules to detect credit cards and personal information, for example. 

Technical support, by and large, is very helpful.

In general, it's a solid, dependable product.

View full review »
System Engineer at ABM Info. tech

The most valuable feature is the end point encryption and the solution provides good data loss prevention. 

View full review »
Forcepoint Data Loss Prevention: features
BM
Owner at a tech services company with 11-50 employees

One of the features I find most valuable is that it is very easy to install. Secondly, it has a very deep reporting mechanism, so it can give you a very detailed report. Then, thirdly, it gives you protection, either at the endpoint, at the network level, and also at the server level. Which also includes the endpoint.

It can also easily be integrated into the data cloud protection and be integrated with cloud protection software or application. This gives us wide visibility and control over our network, for both inbound and outbound data.

Another valuable feature is that it provides integration to things like Cloud Access Security Broker, which provides security around cloud applications. 

It also gives integration with SIEM solution, which means that from a SIEM, you'll be able to actually see what is happening around your data. It has some very unique capabilities, such as optical character recognition and custom encryption identification. It has an out of the box library of templates, which enables you to easily set it up and deploy, making it possible for you to identify and stop data theft. You can even integrate it to your email if you want to extend it, where you can actually have DLP around the email and not just around the web and network.

View full review »
Head of security solutions at Infodata Professional Services

The fingerprinting technology is the solution's most valuable feature. It's unique to Forcepoint.

View full review »
Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees

Some of the features that I find to be valuable are the data loss features, such as CASB, Network, and Email.

View full review »
YU
Finance and Engineer at a non-tech company with 1,001-5,000 employees

What I like most is that it's quick. 

It's fast and it prepares loss reports.

View full review »
DB
Co-Founder at Critical Technologies

I do not think I should name a specific feature that is the most valuable because it is a product we are using as a unified solution and that is very important because it is one of the leaders in the Gartner Magic Quadrant. So there is not a specific feature that is more important than the whole of it together.  

View full review »
HM
Chief Information Security Officer and Founder at a insurance company with 201-500 employees

The product is interesting. It meets our needs very well. It's the best solution when compared to Symantec, for example. We have both ForcePoint and Gartner as well and it's a leader among similar solutions.

The solution offers very good sensitive data protection.

The solution is excellent at protecting strategic information. I deployed it when I was working in the petrol industry for an oil and gas group. It was the biggest one in Morocco. We held important information about critical activities, including providing gas and oxygen for the hospital. We were considered critical IT and we had to comply with the operative elective and the law. DLP helped us to protect our data and we improved our safety in order to comply with the law and existing regulations.

View full review »
GN
Product Manager with 201-500 employees

The GUI is very intuitive. That is the way I would explain its ease of use. It is straightforward.

View full review »
DN
General Manager - Presales Cloud & Security at a tech vendor with 1,001-5,000 employees

Forcepoint has been the leader in the space for many years and they are very well established, and mature. This is why customers choose Forcepoint DLP.

It's quite scalable.

View full review »
TA
Cyber Security Consultant and Technical Manager at a tech services company with 11-50 employees

The data loss prevention is great. Forcepoint Data Loss Prevention provides the user with plenty of control. 

View full review »
Senior Lead- Technical at a computer software company with 51-200 employees

The most valuable feature is the endpoint DLP. It's specific to copying to the USB or copying to the internal storage in our office.

It's user-friendly and the interface is good.

View full review »
MS
Presales Network & Security Engineer at a tech services company with 51-200 employees

I like the SaaS solution they're offering now a little bit more. It's a new product but it's easy to install and configure.

View full review »
AM
Enterprise Information Security Analyst at a retailer with 5,001-10,000 employees

Some of the built-in rules, templates, and content classifiers are among the most valuable features. Some of the built-in patterns are good places to get started with. Along with the phrases, they are helpful in putting together policies and fine-tuning our policies. A good example of that would be certain kinds of credit card data. They have a lot of algorithms available to fine-tune what exactly you're looking for, whether it be credit cards from Mexico, or US credit cards, et cetera. They have a good database of those types of predefined algorithms, ways to detect things, and the specific information you're looking for.

These features are valuable because they work and seem to be picking up the right data. They seem accurate. It's also convenient to be able to choose them and not have to figure it out myself or create my own. That goes a long way toward fine-tuning our policies.

View full review »
Digital Guardian: features
Presales Specialist at bc solutions

Digital Guardian can be also used as device control, application whitelisting, EDR, and user behavior analysis. There are a lot of good features in Digital Guardian.

View full review »
MQ
Practice Manager at a tech services company with 51-200 employees

There are a lot of issues with the current version of the Endpoint agent. It's not stable, it's resource-consuming, and there are some performance issues. If they could improve the stability of the agent it would be great.

They need to improve their product. If they keep just adding the features, it's not going to help them to sell the solution in the market. First of all, they need to improve their existing features, rather than onboarding new features.

View full review »
SW
Sr. SE Manager at a tech vendor with 51-200 employees

The feature we call desktop recording is the most valuable aspect of the solution. Not only can we collect data from the user's usage, but we also capture his screenshots when he is trying to steal the data. 

We can go back seconds to minutes before the action happened using a buffer technology. When the user is trying to steal the data, we can go back to maybe one minute before and do this action. We can collect the visual evidence so we not only have the log that we collected, we only have the action that he is doing on his desktop. The evidence can help our customers when they try to go to the court to pursue their ex-employee for this kind of action.

View full review »
GTB Technologies Inspector: features
Assistant at Taras Shevchenko National University of Kyiv

The most valuable feature is the Endpoint Protector. It is the most lightweight in comparison to other competitors. The more documents fingerprinted - the bigger database storage is needed. It's OK for GTB Inspector itself. On the other hand Endpoint Protector has to load this database into memory and it could slow endpoint performance in case of low memory. To avoid such impact GTB applies on endpoints additional hash algorithm for database with fingerprints to make it smaller ten times and keep detection by fingerprints with high level.

Another feature is that Endpoint Protector can stop everything, even if it's not connected to the management console.

View full review »
EW
Head of Pre-Sales at a tech services company with 51-200 employees

The main thing that I like about GTB is that it has a single agent for DLP and data classification. You can use the same agent. In terms of licensing too, it has a single license.

When it comes to data classification, it supports open-source document platforms such as ChainSoft and OpenOffice.

View full review »
Director at IP Infotech Pvt. Ltd.

All features in GTB are very valuable and effective. They have a fingerprint feature that is very awesome. OCR is very awesome to have too.

Also, the clients don't need to buy extra software to deploy OCR as in the case of other solutions. For example, if you want OCR in some solutions, they ask you to buy an Oracle license.

GTB Technologies Inspector supports platforms such as Windows, Mac, Linux, and so forth. The most important part is that you have to buy only one agent, and all three things will be covered in the single agent.

View full review »
Assistant Manager - Information Systems SecuritySecurity at a financial services firm with 1,001-5,000 employees

The most valuable feature is we can develop what we want. If we have an old or new requirement, they are able to support us to develop it all within one month. They are matching our all requirements for the Cloud and on-premise by providing customization. Additionally, there is an encryption method in the main endpoint where it can encrypt and decrypt in the flow. When the industry changes they are able to adapt and stay current with the features requeired.

View full review »
Code42 Next-Gen DLP: features
DP
Owner

The ease of use is excellent.

The product just always has a continuous backup going, which is quite useful for us.

View full review »
BC
Chief Architect - Ethical Hacker at a tech services company with 1-10 employees

It's on my radar to re-evaluate our endpoint in 2021. Right now, from a cost perspective, I don't see the ROI at the moment. For this reason, I can't really state equivocally what I think is a good feature. Presently, we have so many files that I don't have the time to really dig into the solution as a whole. 

View full review »
WatchGuard Data Loss Prevention: features
AS
IT Audit Group Head at a tech services company with 1,001-5,000 employees

One of the most valuable features is that when we send emails and it gives a warning, you can configure those email addresses so that they can only send outside the email.

View full review »
President at Precision Solution Group, LLC

It is something that we need for compliance, and it has been useful. Their support staff is also amazing.

View full review »
Zscaler Cloud DLP: features
RK
Sr. Product Management Specialist at a comms service provider with 10,001+ employees

As a cloud-based service, it is very easily implemented. This is one of the biggest advantages to choosing it.

View full review »
ON
Sr. Security Architect Major Accounts at Claro Enterprise Solutions

Their technology can monitor and inspect data on the corporate level. It protects all the sensitive data from within the organization. You could definitely review anything that is on the network and verify the DLP tools by setting alerts and rules in order to mitigate risks such as losing your customers' PAI.

It's a pretty solid solution.

It connects to the cloud, so it's really fast. It obviously is going to bypass the gateway, give you security controls, and also allows SSL traffic to be hidden.

You can close your data protection gaps with Zscaler. You can quickly find all the classified, sensitive data across the cloud. You can also have protection using advanced features like Exact Data Match, and that's document matching as well as machine learning.

The pricing of the solution is very good.

The solution is very stable.

The initial setup is pretty straightforward.

The product scales well.

Zscaler is an integrated platform, so it's fully integrated with zero-day protection to all the users working from home or in our offsite network, and it's going to make customers close that security gap.

View full review »
Endpoint Protector: features
Consultant at a tech services company with 501-1,000 employees

The most valuable features are Device Control, Content-Aware Protection, Enforced Encryption, and eDiscovery.

Device control is a module of CoSoSys EPP where we get granular rights and controls for protection of data getting leaked from any hardware devices like USB drives, Storage media, Wi-Fi, printers, etc.

Content-Aware Protection prevents users from uploading or sharing the data or files/documents with others through any application or software like web-browsers, email, file-sharing, or remote application software. It can even prevent users from taking and/or sharing screenshots or clipboard data.

Enforced Encryption is used when you want to have only permitted or restrictive devices connecting to user systems.

eDiscovery is another module where an IT admin can find a file/resource/path/folder present in a user's system.

View full review »
MC
IT Manager of Information Technology Operations Manager at Astra Rafael Comsys Pvt. Ltd.

Endpoint Protector by CoSoSys has some valuable features. The role-based access features for the teams that administer it is good.

The granularity of the policies is good. The versatility of exit points is good. It also supports both macOS and Windows.

View full review »
MH
Manager of IT Infrastructure at a comms service provider with 10,001+ employees

We have a multi-platform environment, mainly Linux and Mac.

We installed a client in our client PCs and we have a management server in the same network. So we control the workstation through that management control, we mainly enable the Endpoint Protector function for blocking USBS and other physical ports, and we have some policies to restrict data passing from one PC to another PC. Those are the main features we are using.

View full review »
Head IT at Trantor

I have not found any valuable features.

View full review »
Core Facilities & ICT Manager at MJB International LLC/ Al Masaood John Brown LLC

There are a lot of features, but the main feature is that I can use a device serial number to unlock any particular machine or for all machines. If I have a phone, like a Samsung phone, I can whitelist that specific phone for full access wherever it is plugged into any of our devices. This is the same with a USB, because most USBs come in bulk and have the same serial number. I can then whitelist that particular USB to be read-write with full access.

View full review »
system administrator at INSIGHT CREDIT UNION

I don't have a single most valuable feature. Every feature is really working for me. One of the reasons I bought it was for the USB block, but that's not as much a use case anymore since I have a lot of people working remotely. It's the DLP part that is more important to me right now, to pinpoint the data that's getting moved.

The granularity enables me to not only see a file, but to read inside the file and pull out the data inside it. The granularity is really pretty good on that. It's very important. Let's say somebody just exported a file or emailed a file or uploaded a file on the internet. Seeing the inside of the file is really important to me. Whether it's encrypted or not, I still can see inside the file.

I'm the only admin on it, but the role-based access is fine. I have one user that I give access to so he can just see device control and that's it. That's all I need him to see. I was able to do that, so I'm pretty happy with the role-based access.

I use the solution's clipboard granularity feature to monitor copying and pasting to specific exit points, and it works great. People are trying to get the data any way they can, from the clipboard and things like that. I'm able to see it, report on it, and block it.

View full review »
PB
People Operations Manager at a tech services company with 11-50 employees

I like the main dashboard. It's very intuitive. 

The offline temporary passcode solution is really easy to use for both the backend administrator and the users.

The granularity of the policies that you can create is pretty sufficient. We haven't had to make any super-granular policies. I understand what its capabilities are, and it is really nice to know that if we have to crack down and be a little more strict on our policies, Endpoint Protector provides those features.

It also provides us with the ability to lock down a wide variety of USB devices, which is pretty important because we don't want certain data accessed. It does a really good job when it comes to the versatility of the exit points it supports, making sure that important data does not leave our organization.

Endpoint Protector also provides a single platform to support Windows, macOS, and Linux, although we don't use Linux, we just use Windows and Mac. It makes it pretty easy for me to manage DLP in such a hybrid environment. I find it intuitive. It's pretty vital that it supports Windows and macOS because we use both types of computers in our company. It provides Zero day protection for macOS.

View full review »
BL
Security Architect at a tech services company with 11-50 employees

There are effectively two areas of DLP to look at from a technical perspective. One is how it performs the pickup of information traversing the system and the other is how the policy engine, which analyzes the data, works. On the first aspect, CoSoSys is probably best of breed for macOS because they're reasonably well-integrated into the operating system. They're looking at the file system operations level, not at the execution level. Whereas things like Forcepoint are looking at the applications being run and they try to apply policy to that. The pickup paradigm is a lot better than their competitors.

The search for keywords, in our security operations, is critical and we use Endpoint Protector for that. We're a HITRUST-certified organization, and one of the things we need to do is be aware of the movement of personally identifiable health information. Since we work multi-nationally, we have to be able to identify PHI from across different countries and their different medical coding standards.

Another valuable feature is the  Content Aware Protection. We use the device thing to some degree, but it's the Content Aware Protection that's critical for us. That's the aspect of it which is DLP. The content protection engine is what detects the data when it's traversing, and the rest of it is other ways to lock down the system from being able to move data in and out. But the detection aspect of it, that's the really key part for us, because we have to be able to record that, even if it's completely legitimate.

It's quite easy to manage DLP in a hybrid environment because you have the centralized server that receives telemetry from all of the agents. And because that's what's forwarding the telemetry on to subsequent log ingests, you get a single data stream across all of the agents. We also have host intrusion detection, which is backing a lot of this stuff for us. We have full command execution logging in every machine. Every command that is run is recorded. We can cross-correlate very tightly between the DLP and what's being done on the machine itself. That way, we know execution and data movement.

We use the role-based access features, for the teams that administer it, to some degree, because we have an auditing agency that reviews our policy compliance. It's satisfactory. We don't have complex requirements for it. We've got a couple of internal admins with equal privileges and then we have an auditor role. It seems to work fine.

View full review »
MP
IT Specialist at TresVista Financial Services Pvt. Ltd.

The Device Control feature and tools are very nice. It can also be used for containers. We have blocked multiple financial components using these features and rely on the upload and block policies. For example, we have blocked Google Drive uploads, as well as the upload functionality for other cloud spaces.

The interface is pretty user-friendly, neatly explained, and simple to use.

We are able to lock down a wide variety of USB devices, which is important to us because none of our users can connect a USB drive or other device to the machine. By preventing this, there won't be data leakage. We have experienced this in the past and we are now able to control it through the use of device policies. 

The technical support that they provide works well.

We use the RDP remote desktop option to prevent copy and paste operations to remote systems. If anyone tries to copy and paste between a remote system and a local system then they will not be able to do it. This works well and it makes our operations more secure.

View full review »
VS
IT Manager at a tech vendor with 11-50 employees

There are many benefits to using this solution.

In terms of the granularity of policies that we can create, this is a good product. We have created two policies that are used on Windows, Linux, and our Mac machines. The first is related to screen sharing, and the second is responsible for blocking files in email attachments.

This functionality is important to us. At the end of the day, we get reports about files, the users, and what they are doing. Preventing screen sharing with unknown people, or accepting files from somebody who is not known, are both things that I want to prevent.

We get detailed reports that identify our clients and we can see how each of them is spending their day at the office. Essentially, we have good visibility of the traffic on our endpoints.

To this point, I have not needed to lock down a variety of different USB devices. I have not used, for example, a card reader. I have only used it to lock down USB storage devices. In the future, I may use more of these features.

I have had no difficulty with using this solution in our hybrid environment that includes Windows, Linux, and Mac machines. There is no difference in features between the different platforms. There are differences such as the web browser that is used. For example, in Windows, we use Chrome, whereas, with Mac, we use Safari. Certain things are different based on the software but otherwise, everything is the same.

View full review »
Interactive Developer at Customer Communications Group, Inc.

The most valuable features are the ability to prevent access to external devices, and also site blocking. We have two of the main features that we enjoy the most, which are device control and then Content-Aware Protection (CAP).

In terms of policy creation, you can get extremely granular. The ability to have multiple departments and having the ability to assign computers on top of specific users is fantastic. We don't utilize that section, but if we had a centralized computer that multiple people would use, I really enjoy that I could specify which user gets which policy. It's the same computer, but it's based on a user-level granularity. It's not just global rights on the computer. I really do enjoy that, although I don't use it.

We are not currently using the functionality for the automatic encryption of confidential data transferred to USB storage devices, although it is on our to-do list. This is something that we need to test in the future.

Endpoint Protection provides a single platform to support Windows, macOS, and Linux, and so far, managing DLP in our hybrid environment has been seamless. I don't see much of a difference between the operating systems in terms of what can and cannot be done. This is extremely important to us because we are 95% Mac-based, with just a few Windows machines. Our Linux machines have just been retired since we've gone 100% remote.

With respect to the feature parity between Windows and Mac, they're identical. On the user side, I don't see a difference between Windows and Mac because what you can do on the client-side is quite limited. On the backend, or server-side, they're identical.

View full review »
BH
Information Technology Security Engineer at a comms service provider with 10,001+ employees

The most valuable features are:

  • The OS platforms that it is capable of running on.
  • The ability to detect source code as well as file types for the policies. 
  • The SIM integration. 

These were identified previously as key features in a DLP program and Endpoint Protector had them. They are a business need.

The granularity of the policies that you can create is pretty good. I would give it an eight out of ten. It's very granular, but there are still more possibilities for granularity. There's still work to be done, but it's very granular.

Endpoint Protector offers the ability to lock down a wide variety of USB devices. That is a key feature. It was one of the main features we were looking for.

We plan to use the EasyLock USB-enforced encryption app to automatically encrypt confidential data transferred to USB storage devices. 

I would rate the versatility regarding the exit points an eight out of ten. The exit points are pretty diverse, cover the majority, and are constantly updated, but there are still some application types and categories that we would like to see in there. They are responsive to our feature requests and are quick to add applications to the list and categories to the list of exit points.

The cross-platform management is good. I understand that there are some features that won't exist because of the technical limitations that are presented based on Linux, for instance, versus Windows. There are some things you can't do in Linux that you can do in Windows. EasyLock, for example, is a technical limitation that they have because of the nature of Linux. There's work to be done there but I understand why there are technical limitations.

We use the clipboard granularity feature to monitor copying and pasting to specific exit points in a limited capacity. It wasn't one of the main use cases, so it hasn't affected our DLP implementation too much.

The search for keywords is very important in our security operations because one of the key use cases we had was for the ability to search keyword-based on an internal database of keywords that have been submitted by other project managers within the company that's around intellectual property. The ability to search on keywords was part of that.

View full review »
SE
IT Manager at a marketing services firm with 51-200 employees

We only have two policies. The first is to block everything and the second one allows for Wi-Fi and Bluetooth connections.

This product does give us multiple choices for blocking data exit points. Without giving specifics, I can say that I know we have better security because of it.

We have Mac and PC machines, and it is very easy to manage both types. There is no noticeable difference in features between Mac and Windows machines.

We use role-based access for administering this solution, but as we are a small company, it is only insofar as having an administrative role that can perform any of the functions when needed. Some people can unblock certain policies, but we have a single administrator that can do everything.

View full review »
CM
CTO at a aerospace/defense firm with 201-500 employees

The device control is a big deal for us because we can actually lock out removable drives and different types of hardware. It allows us to have better control over what end-users plug into their computers, and we can have deny lists and tighten our security posture.

In terms of the granularity of the policies, it is fine. It does exactly what we need. It is granular enough, but it is not too much where it is impossible to tune. It has a nice balance.

In terms of ease of managing DLP in a hybrid environment, it has been very easy to use. It's a very intuitive product. There were no issues trying to figure stuff out.

View full review »
TB
Information Security Manager at a financial services firm with 5,001-10,000 employees

I work for a financial services company. As a consequence, we work with multiple lenders and lender clients; essentially banks and building societies. There's a requirement in this industry for tight controls from an information security point of view. For many years we've had industry requirements to deploy a number of technical controls to secure things like device control.

Prior to using Endpoint Protector, we used Ivanti Device Control. However, from the UI point of view, it was a bit of a dated product, and some of the functionality wasn't brilliant. We also took a recommendation from our service provider, who had been using this product with other customers, and as such we deployed CoSoSys Endpoint Protector. We primarily have one single purpose, which is to secure all of our endpoints, mostly laptops. We have a very small number of client computers as well, but we primarily use it to block all removable media and all USB points on the laptops.

As a business, we don't enable and support the use of removable media. We do have a small number of use cases where that is allowed, primarily within our IT team, but they are the exception. As such, every single USB port is blocked across the business with Endpoint Protector to mitigate the risk of somebody intentionally, accidentally, or for whatever reason being tricked into inputting their USB drive into our network which would then cause potentially a risk to the confidentiality, integrity, and availability of our data.

We have a contractual requirement for us to have a tool like CoSoSys. It mitigates risk for us as a business by enabling us to be sure that no one can exfiltrate data from our company via USB media or be infected by malware by plugging a device into an endpoint.

We only use that one particular feature. I believe there are other features available but I don't believe we pay for the other elements of functionality of the software. There are other features like DLP within the software, however, we have a suite of additional tools within our business to control those other elements so we use CoSoSys exclusively for device control.

We only use it for a very small use case. It certainly has a wide range of functionality, although, we don't use the vast majority of the functionality because we don't pay for it or because we have other tools in place that are specific for a certain purpose.

View full review »
Senior Engineer at GIG kuwait

All of the features are good if somebody has the budget. Our budget is limited and our purpose is just for media access. That's why we went only for this feature, but it has other features such as DLP or reporting.

It is fantastic in terms of the granularity of the policies. It has many built-in policies, and we can add or create more policies as well. It is perfect, and it gives us more options. We have some users who go outside and then come inside. With EPP, we can even control those users who are outside. If they need to access the media that we are using right now, we can provide OTP messages so that they can access the media even when they are outside of their organization. With our previous solution, we were facing some issues in doing this.

It provides us with the ability to lock down a wide variety of USB devices. It is better to have more options than having no options.

View full review »
McAfee Total Protection for Data Loss Prevention: features
Information Technology Solutions Manager at UBG

The interface is really the most valuable feature. The administration part is also nice because it is pretty user-friendly as it is. The interface and administration are important because the data protection capabilities are already there. The administration and the interface make it accessible and easy to use. 

View full review »
CEO/IT Manager at rahaco

One of the most valuable things for us about this product is that we needed some solution that can be used in desktop virtualization. We are not using the antivirus program in common ways. We use antivirus in desktop virtualization.  

The most important solution for us is protecting the virtual machines that we host on our servers. We need security protection for our clients and server solutions, security protection for virtual desktop solutions and security for the cloud-based system solutions. We work in all of these fields.  

View full review »
TH
Cyber Security at a tech services company with 11-50 employees

The whitelisting works well.

View full review »
BK
Owner at xconsult

The most valuable feature is the ability to control access to USB drives and other external devices.

View full review »
PN
Chief Information Security Officer at Romsons

The ability to block all USBs from the McAfee portal has been great. 

There aren't too many good things I could say about the solution at this point, however. It really hasn't been working the way it should for us.

View full review »
AS
Information Security Engineer at a tech services company with 11-50 employees

The solution is very easy to manage.

Overall, it's an easy to use product. It has a great end-user experience. The solution is quite powerful.

It offers good monitoring of your endpoints and provides excellent reporting.

The interface showcases threat incidents very well.

View full review »
PP
Management Executive at a security firm with 11-50 employees

If a DLP is implemented correctly, the value is that you can address the human error issues. You can manage your compliance in line with legislation such as GDPR and POPIA. 

The value proposition is great if it is implemented correctly.

View full review »
NT
IT Manager at a financial services firm with 1,001-5,000 employees

I don't have any issues with this product. It satisfies my requirements.

View full review »
Microsoft Data Loss Prevention: features
Sr. Lead Consultant at a computer software company with 201-500 employees

The auto-labeling feature is definitely the most valuable feature. It goes in and labels the documents for you in different repositories. It covers the Outlook and Exchange repositories along with SharePoint and OneDrive. It is really helpful in those areas.

View full review »