Endpoint Protector Primary Use Case

Rene Wenger
Core Facilities & ICT Manager at MJB International LLC/ Al Masaood John Brown LLC
We use it to block USB and any external devices for read-write. We only allow people to read an external device, not to write to an external device, unless we approve it. Our main reason is that we have 30 percent of our workforce working globally around the world. In addition, a lot of them do not have WiFi access, as they are working in the desert. We needed an application that allows us to unblock or block something by giving a code and could be sent by WhatsApp or SMS. It's hosted on the cloud, then deployed to workstations. This is a portal from the vendor that we have access to where we can see and remove the agent. View full review »
Sanjeev Goyal
Head IT at Trantor
We primarily use the solution for DLP. View full review »
Alex Alexandre
System Administrator at Insight Financial Credit Union, Inc.
I was looking for a DLP solution and Endpoint Protector happened not only to help with that, but also with the USB management piece. As a credit union we have a lot of sensitive data, so we need to be able to see it at rest and block it, and not only on-premises, by off-premises as well. A lot of people work remotely now and this solution is really working for me because once the endpoint is on there, I'm still in control. View full review »
Learn what your peers think about Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
457,459 professionals have used our research since 2012.
reviewer1468050
Manager of IT Infrastructure at a comms service provider with 10,001+ employees
We have a multi-platform environment, mainly Linux and Mac. We installed a client in our client PCs and we have a management server in the same network. So we control the workstation through that management control, we mainly enable the Endpoint Protector function for blocking USBS and other physical ports, and we have some policies to restrict data passing from one PC to another PC. Those are the main features we are using. View full review »
Mahesh Chenchalapu
IT Manager of Information Technology Operations Manager at Astra Rafael Comsys Pvt. Ltd.
I use the Endpoint Protector to monitor what the users or employees are doing. I monitor employee data like what they are sending, who they are sending it to, and what kind of data they're sending. If I want to check that data, I can download it. I am checking the backup of the Endpoint Protector data weekly. If I want to monitor previous things, I can do that with the backup of the software. It's important to create policies to protect my company data. If I create a policy that only our attachments go through our domain, only our attachments get through and not from Google, Yahoo, and others. It's blocking attachments effectively while providing me with an alert if I included an alert policy. View full review »
Darshil Sanghvi
Technology Consultant at a tech services company with 501-1,000 employees
We have been implementing and designing solutions with CoSoSys as a part of the Host level DLP (Data leak prevention) solution. Our major cause is to provide a solution to protect data being leaked by their users, knowingly, via any application or software like web browsers, email, SaaS applications, drive, etc., or any hardware devices through MTP/PTP (mobile phones, wifi, USB, cd/floppy, printer, or ay such devices We have successfully implemented this solution in multiple customer environments, PAN India. View full review »
Learn what your peers think about Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
457,459 professionals have used our research since 2012.