We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable features are Device Control, Content-Aware Protection, Enforced Encryption, and eDiscovery."
"It is easy to manage the DLP between MacOS and Linux."
"The role-based access features for the teams that administer it is good."
"The product is forward-looking, in my opinion, which is a requirement nowadays."
"There are a lot of features, but the main feature is that I can use a device serial number to unlock any particular machine or for all machines. If I have a phone, like a Samsung phone, I can whitelist that specific phone for full access wherever it is plugged into any of our devices. This is the same with a USB, because most USBs come in bulk and have the same serial number. I can then whitelist that particular USB to be read-write with full access."
"Compared to a lot of the USB management systems out there, Endpoint Protector is the only one that comes with true USB management and the DLP side of it. I'm pretty impressed because I've used several solutions with DLP and USB management, and I've never seen granularity like this solution has."
"It also provides us with the ability to lock down a wide variety of USB devices, which is pretty important because we don't want certain data accessed. It does a really good job when it comes to the versatility of the exit points it supports, making sure that important data does not leave our organization."
"There are effectively two areas of DLP to look at from a technical perspective. One is how it performs the pickup of information traversing the system and the other is how the policy engine, which analyzes the data, works. On the first aspect, CoSoSys is probably best of breed for macOS because they're reasonably well-integrated into the operating system. They're looking at the file system operations level, not at the execution level."
"The data matching features are the most valuable due to the easy policy setup and implementation."
"We find the product is easy to manage and maintain."
"We work in the banking field. We deploy data loss prevention. Our branch protects our clients' data, credit card numbers, account numbers, and other confidential and sensitive data."
"The dashboard, management section, and reporting are good."
"The dashboard, management section, and reporting are good."
"The tool's really working well, and the agents are good."
"There's only one policy needed to implement for all channels."
"We can integrate with some other tools such as Splunk, which is very useful."
"If CoSoSys comes up with a suite of Host DLP, along with Network DLP and SaaS DLP, it will cover all of the aspects of a DLP solution."
"In Linux a user can remove a getent anytime. There is no control there on the file structure in Linux. So if this solution could give us information on what users removed in the dashboard, it would help us."
"Customization could be a lot better."
"I have faced issues which shouldn't be related to this product. This product is purely a DLP, so it should only protect my data. I don't know what is happening with their agent or what is happening with the software, but it messes up my endpoint. For example, people are facing bandwidth issues. Before I deployed this on an endpoint, people were getting internet speeds of 40 or 50 Mbps. After deploying it, that would come down to 10 Mbps. And if I uninstalled the agent, it would go back to 50 Mbps."
"When you want to uninstall and reinstall, there are a lot of issues. You have to do a lot of workarounds to reinstall Endpoint Protector. This is a major issue that we have constantly because we still have old systems with XP. While there are only very few, we need to run them because there are machines attached that only run on XP. When we need to uninstall and reinstall on XP or Windows 10, we have serious issues left in the Registry Editor everywhere. There is a lot of manual interference to get the reinstallation to work. For the uninstallation of Endpoint Protector, they need to work on this so it doesn't leave any leftovers behind."
"One of the areas where there is room for improvement is support. It takes time for them to respond. They need to respond on time. Instead of sending an email, I think it would be very helpful to say, 'Let's set up a WebEx to see what's really going on,' instead of the back and forth of email."
"There are times when the server needs to be updated, and it would help if I got a notification for when the newest version comes out, because at the moment, I'm going in every now and then and checking. Sometimes it comes out and I didn't know it had come out."
"The policy engine could use a bit of work. They're definitely going in the right direction. We've been working with them over the last few weeks to try and optimize that. But it's reasonably clear that they're just not putting as much effort into the policy engine as into other things, like content discovery."
"The enforce service is difficult to understand, and free courses made available on the internet would be useful."
"We're not sure if there was an issue or a bug on the system recently because as of right now if someone sends out a compressed encrypted file, the DLP won't scan it."
"I would like for the administrator management interface to improve. It's kind of old and slow. Updating it would make this solution better."
"There are some features that are not available which are required by every data loss prevention solution."
"It is very difficult to log in to create a support ticket because no one is available to support our queries."
"Technical support is pathetic."
"The solution is not user-friendly."
"In the object capture recognition, which we implemented recently, there are a lot of false positives that have been happening."
"This is a budget-friendly solution that covers all the aspects of host-level DLP."
"The price of Endpoint Protector by CoSoSys is more or less the same as other competing solutions."
"It has a fair price. They just changed recently from perpetual licensing. When I bought it, I bought it on perpetual license, then they changed the whole company policy to go to subscription. It was a bit of a shock to us because we haven't upgraded it that many times. However, after speaking to CoSoSys directly, they gave us a very good renewal price."
"I don't have any issue with the licensing and pricing. I would love for it to be cheaper, but at the same time I'm getting a lot from it."
"[The pricing] is reasonable compared to what's out there."
"Pricing is quite reasonable. For smaller organizations, it lets them get into the product domain, whereas a lot of vendors won't even talk to them. CoSoSys is just about at that sweet spot of being serious enough that you have to budget for it, but at the same time, affordable enough that the value is well worth it."
"The minimum number of licenses they sell is 50 or 150 users."
"For what it's doing, the cost is somewhat high for us, but it's the cost of doing business with the clients that we have."
"Pricing is reasonable."
"The pricing is reasonable."
"The price is competitive."
"The price of the solution is expensive."
"The solution should be less expensive to allow more people the opportunity to use it. Some of their competitors are less expensive. There is a license required to use the solution and we purchased an annual license."
Content Aware Protection
Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.
USB & peripheral port control
Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.
Automatic USB encryption
Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.
Scanning data at rest
Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans
Keeping sensitive corporate information safe and compliant has never been easy. But today, you’re faced with a totally new set of data protection challenges. Sensitive information is leaving the safety of your corporate network as more employees share files over consumer cloud storage services and access those files on their own mobile devices. The number of targeted cyber attacks continues to grow, as cybercriminals develop effective new methods for defeating traditional security measures and stealing corporate information. And as all of these factors converge, it becomes increasingly difficult to manage corporate information and protect it against loss and theft.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces today’s cloud- and mobile-centered realities. With DLP, you can:
• Discover where data is stored across all of your cloud, mobile, network, endpoint, and storage systems
• Monitor how data is being used, whether your employees are on or off the network
• Protect data from being leaked or stolen—no matter where it’s stored or how it’s used
Endpoint Protector is ranked 1st in Data Loss Prevention (DLP) with 16 reviews while Symantec Data Loss Prevention is ranked 2nd in Data Loss Prevention (DLP) with 14 reviews. Endpoint Protector is rated 8.4, while Symantec Data Loss Prevention is rated 7.6. The top reviewer of Endpoint Protector writes "Enables us to search for keywords, a process which is a critical part of our security operations". On the other hand, the top reviewer of Symantec Data Loss Prevention writes "Great Data Loss Prevention technology with impressive granularity and good stability". Endpoint Protector is most compared with ESET Safetica, Forcepoint Data Loss Prevention, Zscaler Cloud DLP and Digital Guardian, whereas Symantec Data Loss Prevention is most compared with Forcepoint Data Loss Prevention, Microsoft Data Loss Prevention, Digital Guardian, Trend Micro Integrated Data Loss Prevention and Zscaler Cloud DLP. See our Endpoint Protector vs. Symantec Data Loss Prevention report.
See our list of best Data Loss Prevention (DLP) vendors.
We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.