CoSoSys Endpoint Protector Primary Use Case

AJ
Senior Engineer at GIG kuwait

Currently, we are using it only for the media access restriction. We're not like a bank or financial sort of organization, so we're not using EPP for DLP.

We have only Windows clients in our environment. We don't have macOS or Linux in our environment.

View full review »
SunnyKumar - PeerSpot reviewer
Senior IT Engineer at Instawork

I use it to restrict access to USB drives and monitor user activities on laptops to capture log data.

View full review »
Naman Verma. - PeerSpot reviewer
Security Delivery Specialist at a consultancy with 10,001+ employees

We were basically using it as a DLP solution, securing our endpoints for any data leaks. We were one of the contractors for IMS and AMM data, working on healthcare data. We had HIPAA compliance, so we had to abide by.

View full review »
Buyer's Guide
CoSoSys Endpoint Protector
April 2024
Learn what your peers think about CoSoSys Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
BH
Information Technology Security Engineer at a comms service provider with 10,001+ employees

Our primary use case is for data loss prevention. 

View full review »
SomnathMukherjee - PeerSpot reviewer
IT consultant at Independent Consultant

We used Endpoint Protector for the users who were primarily working from home. These workers were contact agents who work on compliant applications, and the potential for client data to be exposed was significant.

View full review »
RG
Interactive Developer at Customer Communications Group, Inc.

The main reason that we brought this solution into our ecosystem is that we work with a number of financial institutions who value all of their data, whether it's marketing material, all the way up to client data, which we don't really handle as data.

Because we do promotional stuff, we need to adhere to what our clients are asking us to do to lock down the ability to lose data. We use Endpoint Protector to limit our employees' access to removing data off of company computers.

We are running the current version of the server, which I updated recently. We are running different versions of the client on different machines because we're currently doing some testing to see whether our software has conflicts with theirs.

View full review »
BL
Security Architect at a tech services company with 11-50 employees

We use it for detecting the traversal of data through endpoints. We keep a multi-tier isolated environment, so we have inner and outer cordons of access control. And over VPN, users could potentially be one of the exfil points, at least the privileged ones with access. Being able to identify when information enters the system and leaves, based on a number of complex criteria, because we work with medical information from all over the world, is the purpose of it in our organization.

The solution is all on-premises. We're a healthcare organization, and that's actually one of the reasons we use it. We can't have a lot of our security functionality in the cloud.

View full review »
SE
IT Manager at a marketing services firm with 51-200 employees

We store graphics files on our computers and they are confidential, so we implemented this product to block all of the computers from being able to send the data outside of our organization.

We use it to block USB ports so that people cannot connect an external hard drive, flash drive, or anything else that people can use to take files off of the system. Essentially, it blocks data transfer.

View full review »
Shiv Ram - PeerSpot reviewer
Assistant Manager at Bharti Airtel Limited

It was the unique seventy-point I used for Linux devices. 

View full review »
MP
IT Specialist at TresVista Financial Services Pvt. Ltd.

We use this product to protect our Mac and Windows 10 endpoints.

Our main purpose is to block the uploading of Excel and PowerPoint files. We also use it to block USB devices and other peripherals that users connect to the system. 

View full review »
RW
Core Facilities & ICT Manager at MJB International LLC/ Al Masaood John Brown LLC

We use it to block USB and any external devices for read-write. We only allow people to read an external device, not to write to an external device, unless we approve it. Our main reason is that we have 30 percent of our workforce working globally around the world. In addition, a lot of them do not have WiFi access, as they are working in the desert. We needed an application that allows us to unblock or block something by giving a code and could be sent by WhatsApp or SMS.

It's hosted on the cloud, then deployed to workstations. This is a portal from the vendor that we have access to where we can see and remove the agent.

View full review »
Alexandru Hagea - PeerSpot reviewer
Network and Security Lead at Accesa

CoSoSys Endpoint Protector is a unique solution for Linux devices. It has a user-friendly console that makes it easy to navigate and create policies.

View full review »
VS
IT Manager at a tech vendor with 11-50 employees

We use Endpoint Protector as our data loss prevention solution for Windows, Linux, and Mac machines. Our clients work from outside of our building and in different locations, and we need to use this product to keep our data secure.

View full review »
SB
Director /Founder at a energy/utilities company with 51-200 employees

It serves as a tool for ensuring compliance and facilitating security audits and it functions as a protective measure against unauthorized data transfers, whether through email or USB devices. The primary focus revolves around maintaining compliance with regulations and safeguarding sensitive information from unauthorized transfers.

View full review »
AA
system administrator at INSIGHT CREDIT UNION

I was looking for a DLP solution and Endpoint Protector happened not only to help with that, but also with the USB management piece. As a credit union we have a lot of sensitive data, so we need to be able to see it at rest and block it, and not only on-premises, but off-premises as well. A lot of people work remotely now and this solution is really working for me because once the endpoint is on there, I'm still in control.

View full review »
Dan Pham Ich - PeerSpot reviewer
Assistant It Manager at New system vietnam

I use Endpoint Protector to protect our end server.

View full review »
Sivakumar Mahathevan - PeerSpot reviewer
Head of MSP Division at Halodata

We are using it for data loss prevention, basically managing all our employees throughout the region. Our servers are installed in our HQ in Singapore. We use device control, content-aware management or content-aware protection, and enforce encryption.

View full review »
TB
Information Security Manager at a financial services firm with 5,001-10,000 employees

I work for a financial services company. As a consequence, we work with multiple lenders and lender clients; essentially banks and building societies. There's a requirement in this industry for tight controls from an information security point of view. For many years we've had industry requirements to deploy a number of technical controls to secure things like device control.

Prior to using Endpoint Protector, we used Ivanti Device Control. However, from the UI point of view, it was a bit of a dated product, and some of the functionality wasn't brilliant. We also took a recommendation from our service provider, who had been using this product with other customers, and as such we deployed CoSoSys Endpoint Protector. We primarily have one single purpose, which is to secure all of our endpoints, mostly laptops. We have a very small number of client computers as well, but we primarily use it to block all removable media and all USB points on the laptops.

As a business, we don't enable and support the use of removable media. We do have a small number of use cases where that is allowed, primarily within our IT team, but they are the exception. As such, every single USB port is blocked across the business with Endpoint Protector to mitigate the risk of somebody intentionally, accidentally, or for whatever reason being tricked into inputting their USB drive into our network which would then cause potentially a risk to the confidentiality, integrity, and availability of our data.

We have a contractual requirement for us to have a tool like CoSoSys. It mitigates risk for us as a business by enabling us to be sure that no one can exfiltrate data from our company via USB media or be infected by malware by plugging a device into an endpoint.

We only use that one particular feature. I believe there are other features available but I don't believe we pay for the other elements of functionality of the software. There are other features like DLP within the software, however, we have a suite of additional tools within our business to control those other elements so we use CoSoSys exclusively for device control.

We only use it for a very small use case. It certainly has a wide range of functionality, although, we don't use the vast majority of the functionality because we don't pay for it or because we have other tools in place that are specific for a certain purpose.

View full review »
MC
IT Manager of Information Technology Operations Manager at astrafaelcomsys.com

I use the Endpoint Protector to monitor what the users or employees are doing. I monitor employee data like what they are sending, who they are sending it to, and what kind of data they're sending.

If I want to check that data, I can download it. I am checking the backup of the Endpoint Protector data weekly. If I want to monitor previous things, I can do that with the backup of the software.

It's important to create policies to protect my company data. If I create a policy that only our attachments go through our domain, only our attachments get through and not from Google, Yahoo, and others. It's blocking attachments effectively while providing me with an alert if I included an alert policy.

View full review »
CM
CTO at a aerospace/defense firm with 201-500 employees

We bought it because we had a specific need for a single Macintosh computer. We're a defense contractor, so we have to meet very rigid compliance requirements, and Macintosh caused a lot of problems for our mainly Windows domain infrastructure. So, we found the Endpoint Protector tool and tested it, and it did what we wanted it to do. 

We bought it for the Macintosh environment, but because we liked it, we rolled it out to our Windows environment as well.

View full review »
PB
People Operations Manager at a tech services company with 11-50 employees

We use it primarily for endpoint protection. We have to be SOC 2 compliant. We have a number of standards that we have to abide by for HIPAA reasons and SOC 2 reasons, which is why we initially put it in place, but we mostly use it for endpoint protection and MDM.

View full review »
SG
Head IT at Trantor

We primarily use the solution for DLP. 

View full review »
MH
Manager of IT Infrastructure at a comms service provider with 10,001+ employees

We have a multi-platform environment, mainly Linux and Mac.

We installed a client in our client PCs and we have a management server in the same network. So we control the workstation through that management control, we mainly enable the Endpoint Protector function for blocking USBS and other physical ports, and we have some policies to restrict data passing from one PC to another PC. Those are the main features we are using.

View full review »
DS
Consultant at a tech services company with 501-1,000 employees

We have been implementing and designing solutions with CoSoSys as a part of the Host level DLP (Data leak prevention) solution. Our major cause is to provide a solution to protect data being leaked by their users, knowingly, via any application or software like web browsers, email, SaaS applications, drive, etc., or any hardware devices through MTP/PTP (mobile phones, wifi, USB, cd/floppy, printer, or ay such devices

We have successfully implemented this solution in multiple customer environments, PAN India.

View full review »
Buyer's Guide
CoSoSys Endpoint Protector
April 2024
Learn what your peers think about CoSoSys Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.