We performed a comparison between CoSoSys Endpoint Protector and Trend Micro Integrated Data Loss Prevention based on real PeerSpot user reviews.
Find out in this report how the two Data Loss Prevention (DLP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Its robust security audit and compliance functionalities prove especially beneficial for businesses in sectors like BFSI (Banking, Financial Services, and Insurance) and Information Technology."
"The core of its value lies in obtaining logs remotely and exercising control over what employees can or cannot use."
"The most valuable feature is device control."
"It is easy to manage the DLP between MacOS and Linux."
"One unique feature is drive encryption. We have portable devices, and they have a password vault. If you transfer any data to your device, you can use the password vault to protect it."
"The search for keywords is very important in our security operations because one of the key use cases we had was for the ability to search keyword-based on an internal database of keywords that have been submitted by other project managers within the company that's around intellectual property. The ability to search on keywords was part of that."
"The product's most valuable feature is its ability to support Linux operating systems."
"Endpoint Protector's best features are its protection and user-friendliness."
"The product's initial setup phase was easy."
"We are able to check the log and keep records."
"The most values feature of this solution are the micro DLP features."
"We find the initial setup to be very easy."
"I'm not an administrator of Trend Micro Integrated Data Loss Prevention, but an end-user, and what I like about it is that it can detect events that could cause data loss. It's a good solution."
"Trend Micro has improved my client's organization by recovering malware disabled network adaptors from servers."
"We use Trend Micro mainly to monitor user activities, such as tracking the websites they visit and purchase items. Additionally, we focus on identifying and addressing antivirus threats. We used to explore a feature related to proxy but decided against it as an enterprise solution wasn't readily available for us. Our primary use of Trend Micro revolves around end-user security. Integration with Active Directory has proven beneficial, allowing us to easily push updates or changes directly from the console."
"Trend Micro Integrated Data Loss Prevention is a reliable product."
"They have many predefined classifiers in terms of data identifiers, and they should improve this."
"Customization could be a lot better."
"Sometimes, it should try to focus on one thing rather than multiple things. Endpoint Protector does device control very well, which is why we use that particular function."
"There are times when the server needs to be updated, and it would help if I got a notification for when the newest version comes out, because at the moment, I'm going in every now and then and checking. Sometimes it comes out and I didn't know it had come out."
"CoSoSys Endpoint Protector's network-level DLP and integration with mail servers need improvement."
"Endpoint Protector, in particular, had some features to be desired for the Mac operating system."
"This product provides zero-day protection for macOS, although I'm currently dealing with an issue on the most recent rollout of the Endpoint client that doesn't seem to be fully functioning."
"I would like to see an alert feature that when a system is started, it checks to make sure that the client has the most up-to-date policies."
"I would like to provide improved network direction in order to regulate all of the user agents. We only use Trend Micro Data Loss Prevention to manage various threats and malicious user agents currently."
"It's hard for me to answer any questions about missing features. It's the outside companies who support us that manage this DLP solution at this moment."
"Within the solution, many of the functions do not perform as intended...It is not a stable solution...It is not a scalable solution."
"Needs a remote login option."
"They could improve the product's data loss policies."
"Typically, DLP solutions do not cover emails without an additional component, which necessitates a dual-service proposal. Comparatively, on-premises deployments offer more features locally than online or remote deployments, which sometimes face challenges with feature support. This is a common issue with Trend."
"The solution could use better logging in the future."
"In Trend Micro Integrated Data Loss Prevention, there is a need to improve the plug-in manager, as it is an area with shortcomings."
More Trend Micro Integrated Data Loss Prevention Pricing and Cost Advice →
CoSoSys Endpoint Protector is ranked 8th in Data Loss Prevention (DLP) with 25 reviews while Trend Micro Integrated Data Loss Prevention is ranked 13th in Data Loss Prevention (DLP) with 15 reviews. CoSoSys Endpoint Protector is rated 8.4, while Trend Micro Integrated Data Loss Prevention is rated 6.2. The top reviewer of CoSoSys Endpoint Protector writes "Makes management and upgrades easier and provides better control". On the other hand, the top reviewer of Trend Micro Integrated Data Loss Prevention writes "Good for data blocking and security, content categorization, and generating accessibility reports ". CoSoSys Endpoint Protector is most compared with Forcepoint Data Loss Prevention, Safetica ONE, Symantec Data Loss Prevention, Microsoft Purview Data Loss Prevention and Zscaler DLP, whereas Trend Micro Integrated Data Loss Prevention is most compared with Forcepoint Data Loss Prevention, Symantec Data Loss Prevention, McAfee Total Protection for Data Loss Prevention, Digital Guardian and McAfee ePolicy Orchestrator. See our CoSoSys Endpoint Protector vs. Trend Micro Integrated Data Loss Prevention report.
See our list of best Data Loss Prevention (DLP) vendors.
We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.