Shiv Ram - PeerSpot reviewer
Assistant Manager at Bharti Airtel Limited
Real User
Top 5Leaderboard
A stable solution that scans all documents residing on desktops, laptops, and servers, identifying and localizing IPs
Pros and Cons
  • "The console is friendly and it supports Mac."
  • "They have many predefined classifiers in terms of data identifiers, and they should improve this."

What is our primary use case?

It was the unique seventy-point I used for Linux devices. 

What is most valuable?

The console is friendly and it supports Mac.

What needs improvement?

They have many predefined classifiers in terms of data identifiers, and they should improve this. 

As per the market perspectives, the data is driven and the usage is totally modernized. Digitally, there are lots of inventions and the data usage depends on the cloud.

For how long have I used the solution?

I have been using CoSoSys Endpoint Protector for six months. 

Buyer's Guide
CoSoSys Endpoint Protector
April 2024
Learn what your peers think about CoSoSys Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,578 professionals have used our research since 2012.

What do I think about the stability of the solution?

The solution is stable. 

What do I think about the scalability of the solution?

The solution is scalable. 

How was the initial setup?

The initial setup is easy. 

What's my experience with pricing, setup cost, and licensing?

The pricing depends on the customers. 

What other advice do I have?

I rate the overall solution a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
IT Specialist at TresVista Financial Services Pvt. Ltd.
Real User
User-friendly, simple-to-use interface, good support, and protects us from data leakage
Pros and Cons
  • "The interface is pretty user-friendly, neatly explained, and simple to use."
  • "We are currently facing an issue where it is blocking the Winman software, which is something that we don't want to happen because we use it in our accounts department to pay taxes."

What is our primary use case?

We use this product to protect our Mac and Windows 10 endpoints.

Our main purpose is to block the uploading of Excel and PowerPoint files. We also use it to block USB devices and other peripherals that users connect to the system. 

How has it helped my organization?

This product performs well and multiple things have been blocked by it.

By raising discovered issues with our team members, they are doing their part in terms of resolving them.

Endpoint Protector provides a single platform to support our Windows and Mac machines. We do not have any Linux machines in our environment. Managing DLP for our machines in this hybrid environment is pretty simple, as the product is user-friendly and we can easily find what we need.

The fact that this solution supports different operating systems is very important to us because we want to ensure that there is no data leakage.

We have one or two Macs in our organization, with the majority of people using Windows 10 machines. We haven't seen any difference in the support that this product offers for either operating system.

What is most valuable?

The Device Control feature and tools are very nice. It can also be used for containers. We have blocked multiple financial components using these features and rely on the upload and block policies. For example, we have blocked Google Drive uploads, as well as the upload functionality for other cloud spaces.

The interface is pretty user-friendly, neatly explained, and simple to use.

We are able to lock down a wide variety of USB devices, which is important to us because none of our users can connect a USB drive or other device to the machine. By preventing this, there won't be data leakage. We have experienced this in the past and we are now able to control it through the use of device policies. 

The technical support that they provide works well.

We use the RDP remote desktop option to prevent copy and paste operations to remote systems. If anyone tries to copy and paste between a remote system and a local system then they will not be able to do it. This works well and it makes our operations more secure.

What needs improvement?

We are currently facing an issue where it is blocking the Winman software, which is something that we don't want to happen because we use it in our accounts department to pay taxes.

There is no option or support available for DriveHQ. 

For how long have I used the solution?

We have been using Endpoint Protector for between seven and eight years.

What do I think about the stability of the solution?

This product is pretty stable.

What do I think about the scalability of the solution?

It is easy to scale. Across the organization, we have more than 900 users with Endpoint Protector deployed on their machines.

We plan to soon increase the number of licenses that we have. Our intention is to start deploying on our laptops, which will bring us to a total of approximately 1,500 licenses.

How are customer service and technical support?

We have been in touch with technical support and our experience has been pretty nice.

How was the initial setup?

This solution was easy to deploy but it was implemented before I joined the company so I don't know how long the process took.

No major upgrades have been required since I have been working with it.

What about the implementation team?

We have an in-house person who is responsible for servers, and he deployed Endpoint Protector. The process is not complex and only one person is required.

We have three system engineers, three senior system engineers, and one assistant manager in charge of maintenance.

Which other solutions did I evaluate?

We looked at a DLP product by Forcepoint but our current solution was working pretty well, so we opted not to switch.

What other advice do I have?

This is a product that has improved over time. For example, in the past, there was no option to view the ports that were not added to your list. This is now supported and some of the problems we were facing have been stopped. Another example is that we are now able to block Teams and it works pretty well, whereas, in the past, we could not block uploads or downloads with Teams.

Endpoint Protector has other features that we do not use, such as encryption. Instead, we deployed Sophos Encryption approximately six months ago for this purpose.

The biggest lesson that I have learned from using this product is how to block uploads and downloads, as well as how to lock devices on users' machines. My advice for anybody who is considering it is that it is pretty simple to use. It's a friendly environment and it's easy to block devices, uploads, and other security issues.

In summary, we have not faced many issues with Endpoint Protector and it is fulfilling our requirements, as we wanted.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
CoSoSys Endpoint Protector
April 2024
Learn what your peers think about CoSoSys Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,578 professionals have used our research since 2012.
Core Facilities & ICT Manager at MJB International LLC/ Al Masaood John Brown LLC
Real User
Gives us control of what people can access, especially from external devices
Pros and Cons
  • "There are a lot of features, but the main feature is that I can use a device serial number to unlock any particular machine or for all machines. If I have a phone, like a Samsung phone, I can whitelist that specific phone for full access wherever it is plugged into any of our devices. This is the same with a USB, because most USBs come in bulk and have the same serial number. I can then whitelist that particular USB to be read-write with full access."
  • "When you want to uninstall and reinstall, there are a lot of issues. You have to do a lot of workarounds to reinstall Endpoint Protector. This is a major issue that we have constantly because we still have old systems with XP. While there are only very few, we need to run them because there are machines attached that only run on XP. When we need to uninstall and reinstall on XP or Windows 10, we have serious issues left in the Registry Editor everywhere. There is a lot of manual interference to get the reinstallation to work. For the uninstallation of Endpoint Protector, they need to work on this so it doesn't leave any leftovers behind."

What is our primary use case?

We use it to block USB and any external devices for read-write. We only allow people to read an external device, not to write to an external device, unless we approve it. Our main reason is that we have 30 percent of our workforce working globally around the world. In addition, a lot of them do not have WiFi access, as they are working in the desert. We needed an application that allows us to unblock or block something by giving a code and could be sent by WhatsApp or SMS.

It's hosted on the cloud, then deployed to workstations. This is a portal from the vendor that we have access to where we can see and remove the agent.

How has it helped my organization?

Once you put a policy in place, you can see if somebody is trying to access something, even if it's not allowed and will not go through. In IT, we need to make sure that we think first before applying the rules that we do want. We have different groups levels of access. Once you have done this correctly, then it definitely stops any misuse of data and leaks. However it is not the software. It's you, as the administrator, who has to make sure that the profiles are set up correctly.

Sometimes, we have engineers who are in the desert taking pictures with an external camera, etc., and they need to send these pictures ASAP to our online portal for reporting. These devices are normally blocked. We can then very quickly (within seconds) open up this device for a certain time to be fully accessible. Then, we do not have to worry about it because the policy will kick in after the period that we have given. This helps us a lot when people are onsite doing reviews of company sites and they need to send a report. It also gives us control of what people can access at that moment, because most of our field engineers have zero access to any external devices. They are only given the device once we decide, "Yes, they need it and for how long."

We are a pretty small company. We only have an IT engineer who administers everything along with myself. We don't have a big IT team; it's only one engineer and me. The access is great because we can do it from home. We don't need to be inside the company since all of it is cloud-based.

What is most valuable?

There are a lot of features, but the main feature is that I can use a device serial number to unlock any particular machine or for all machines. If I have a phone, like a Samsung phone, I can whitelist that specific phone for full access wherever it is plugged into any of our devices. This is the same with a USB, because most USBs come in bulk and have the same serial number. I can then whitelist that particular USB to be read-write with full access.

What needs improvement?

When you want to uninstall and reinstall, there are a lot of issues. You have to do a lot of workarounds to reinstall Endpoint Protector. This is a major issue that we have constantly because we still have old systems with XP. While there are only very few, we need to run them because there are machines attached that only run on XP. When we need to uninstall and reinstall on XP or Windows 10, we have serious issues left in the Registry Editor everywhere. There is a lot of manual interference to get the reinstallation to work. For the uninstallation of Endpoint Protector, they need to work on this so it doesn't leave any leftovers behind.

For how long have I used the solution?

We have been using it now for a little bit over one year.

What do I think about the stability of the solution?

The stability is very good. I had no downtime nor any other issues. It doesn't require a lot of maintenance from our side. We don't need to go, and make sure, "Is it running or is it not running?"

Even if people are not in our LAN, it's still protected. We have tested it in various locations.

What do I think about the scalability of the solution?

If you ever need more devices, it would be very easy to get more licenses within 24 to 48 hours.

We are using 162 licenses.

How are customer service and technical support?

If we have an issue, their support is great. They come back normally within the same day with either a solution or remote session to assist us.

We have rarely used Endpoint Protector support directly. We have very good connections with the reseller, who has a technical support that normally responds within the same day, or at least by the next day.

Which solution did I use previously and why did I switch?

We had GFI EndPointSecurity, which was a good solution. I can't say anything bad about it. However, GFI stopped developing the product. For our use of just blocking external devices, it was very good, but Endpoint Protector is quite a bit better and has many more features. Even if GFI would come back, I would not go back to them because I'm extremely happy with the functionality of Endpoint Protector.

How was the initial setup?

The initial setup is very straightforward.

Because our current system is from a different vendor, we needed to have minimum downtime. When we switched the old one off, we needed to switch the new one on instantly. The groundwork was done before the old one was switched off, then deployed over the weekend. Things worked absolutely fine. We had very few systems which didn't take the implementation. They were mostly those which were not online, but the rest of them worked smoothly.

What about the implementation team?

Our reseller assisted us in our initial deployment by setting up some basic rules and helping us to understand how it works. From there, we took over. They were extremely good in their technical knowledge of the system.

It all depends on how the reseller supports this installation. We had a very good overview by our reseller and support during the installation. I found the installation very straightforward and quick, but that all depends on your reseller and how good they are trained. This process was very technical for us. The reseller assisted us in switching over within two days from the old system to the new one.

What was our ROI?

It is a software where I always want it installed, then up and running. The only time that you need to look at or interfere with it is when new agents are coming in, so you can deploy them. 

What's my experience with pricing, setup cost, and licensing?

It has a fair price. They just changed recently from perpetual licensing. When I bought it, I bought it on perpetual license, then they changed the whole company policy to go to subscription. It was a bit of a shock to us because we haven't upgraded it that many times. However, after speaking to CoSoSys directly, they gave us a very good renewal price.

Which other solutions did I evaluate?

There are many vendors out there who do protection access of external devices. However, I haven't found any vendors, other than Endpoint Protector, who let you enable or disable the device without being on a WiFi, Internet, or just by giving a code. That was our main thing because maybe 30 percent of our workforce are around the world or somewhere in the desert with extremely weak Internet connections. This solution is a very good option where you can just send them an SMS code. Then, the code that we create depends on what we say, for example, "Should they have access for the whole day or 10 minutes?" Afterwards, I don't have to double check if the system is blocked. 

What other advice do I have?

Have a look at a good demo. You will see the benefits of the system. We only use it for device blocking, but there are so many other features. It depends what you want out of Endpoint Protector. An overall demo of its capabilities will let you see that it is worthwhile.

There is an application out there that does multiple things in one go. We looked only at blocking off other devices, but we are rethinking that. Next year, we will be looking to buy usage of all the other features. It would be nice to have one application that does multiple things in one go, which normally other people would use several applications and software subscriptions to do the same thing. 

There are so many policies that we have not even had time to explore all of them.

We don't use the EasyLock USB Enforced Encryption app to automatically encrypt confidential data transferred to USB storage devices. Instead, we have a secure online storage called FileShare, similar to Dropbox, but only for us. This way, people don't save it on their USB and actually have to send it directly. They can only then send it from the camera into their desktop or laptop. Then, from the laptop, they send it directly into our cloud system.

I would rate this solution as a nine out of 10.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Alexandru Hagea - PeerSpot reviewer
Network and Security Lead at Accesa
MSP
Top 10
A comprehensive solution with a user-friendly console, making it easy to navigate and create policies
Pros and Cons
  • "One unique feature is drive encryption. We have portable devices, and they have a password vault. If you transfer any data to your device, you can use the password vault to protect it."
  • "It needs to improve in terms of policy customization."

What is our primary use case?

CoSoSys Endpoint Protector is a unique solution for Linux devices. It has a user-friendly console that makes it easy to navigate and create policies.

What is most valuable?

CoSoSys is supported on Mac devices. One unique feature is drive encryption. We have portable devices, and they have a password vault. If you transfer any data to your device, you can use the password vault to protect it.

What needs improvement?

CoSoSys Endpoint Protector has many predefined classifiers for data identifiers. It needs to improve in terms of policy customization. I observed that fewer policies were available, which needs to be improved so that users can modify and view policies based on their requirements and create their templates. The audit part could be added. With our current architecture, we have a lot of alerts, for example, when a user requests access to a policy temporarily for a business requirement. We can make an automatic request mechanism that would work for this type of scenario, which would help us sleep better at night.

For how long have I used the solution?

I have been using CoSoSys Endpoint Protector for no longer than six months. We are using the latest version of the solution.

What do I think about the stability of the solution?

The product is stable apart from the policies because it is limited.

What do I think about the scalability of the solution?

The solution is scalable. Despite the limited resources, customers are looking for some platforms for Mac and Linux, but I have tried many products on the market. For example, Forcepoint and Trend Micro are there.

Which solution did I use previously and why did I switch?

We have Forcepoint for endpoint data leakage protection and this scale and footprint for network protection. It depends on business requirements.

How was the initial setup?

The initial setup is easy and seamless.

What's my experience with pricing, setup cost, and licensing?

The solution’s pricing is a normal industry standard and depends on customers and salespersons.

What other advice do I have?

CoSoSys Endpoint Protector has improved significantly in recent years, with new features and enhancements that make it a leading data loss prevention solution. Data identification is essential for data protection, as CoSoSys Endpoint Protector cannot protect data it cannot identify. Overall, I rate the solution a six out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
IT Manager at a tech vendor with 11-50 employees
Real User
Easy to set up, good reporting, and provides valuable insight into users' activities
Pros and Cons
  • "The most valuable feature is device control."
  • "I would like to see an alert feature that when a system is started, it checks to make sure that the client has the most up-to-date policies."

What is our primary use case?

We use Endpoint Protector as our data loss prevention solution for Windows, Linux, and Mac machines. Our clients work from outside of our building and in different locations, and we need to use this product to keep our data secure.

How has it helped my organization?

There are many benefits to using this solution.

In terms of the granularity of policies that we can create, this is a good product. We have created two policies that are used on Windows, Linux, and our Mac machines. The first is related to screen sharing, and the second is responsible for blocking files in email attachments.

This functionality is important to us. At the end of the day, we get reports about files, the users, and what they are doing. Preventing screen sharing with unknown people, or accepting files from somebody who is not known, are both things that I want to prevent.

We get detailed reports that identify our clients and we can see how each of them is spending their day at the office. Essentially, we have good visibility of the traffic on our endpoints.

To this point, I have not needed to lock down a variety of different USB devices. I have not used, for example, a card reader. I have only used it to lock down USB storage devices. In the future, I may use more of these features.

I have had no difficulty with using this solution in our hybrid environment that includes Windows, Linux, and Mac machines. There is no difference in features between the different platforms. There are differences such as the web browser that is used. For example, in Windows, we use Chrome, whereas, with Mac, we use Safari. Certain things are different based on the software but otherwise, everything is the same.

What is most valuable?

The most valuable feature is device control. If you have the wrong devices connected to the network then it may cost you, and this product allows you to control them. For example, you can prevent users from using an external hard disk, which is something that I like.

There is a clipboard feature to ensure that a user cannot print their screen or take a screenshot. This is one of the reasons that we feel secure when using this product.

The users are happy with using this solution on a daily basis. 

What needs improvement?

I would like to see an alert feature that when a system is started, it checks to make sure that the client has the most up-to-date policies. Before the policies are updated, nothing can be done on the system.

For how long have I used the solution?

We have been using Endpoint Protector for one year.

What do I think about the stability of the solution?

This is a stable product and we haven't had any problems with it.

What do I think about the scalability of the solution?

We have between 50 and 60 people in our organization.

How are customer service and technical support?

Within the past month or two, I have experienced problems and contacted technical support by email. They immediately responded and gave me suggestions on how to improve our security.

Normally, I send the support team an email and they answer within 24 hours. They analyze the problem and try to determine why it has occurred. They ask end-to-end questions such as what I was doing at the time, which allows them to assess and analyze all of the relevant points.

Which solution did I use previously and why did I switch?

This is the first DLP solution that we have used.

How was the initial setup?

The initial setup is very easy and there is nothing difficult about it.

Our deployment took one month and we didn't know anything about the product in advance. We didn't know exactly how it would work or which features would be added. The vendor explained everything to us after that.

What's my experience with pricing, setup cost, and licensing?

The minimum number of licenses they sell is 50 or 150 users. They do not sell, for example, a package of 10 licenses. It would be helpful if you could purchase a smaller number of licenses at one time.

Which other solutions did I evaluate?

We did not evaluate other such solutions before selecting this one.

What other advice do I have?

My advice for anybody who is considering this product is that it's user-friendly, and everyone can easily understand the details about how it works.

I am 100% confident in the security that I get from this product.

Overall, I think that our requirements for basic control, including application control, have been met. I'm happy with the current product and I like the feature set. That said, if they provide additional features in the future then we will use them.

I would rate this solution a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Director /Founder at a energy/utilities company with 51-200 employees
Real User
Top 20
A robust data loss prevention offering effective internal data leakage prevention, simplified compliance management and user-friendly customization options
Pros and Cons
  • "Its robust security audit and compliance functionalities prove especially beneficial for businesses in sectors like BFSI (Banking, Financial Services, and Insurance) and Information Technology."
  • "The only aspect that prevents it from being a perfect solution is the occasional slower response time."

What is our primary use case?

It serves as a tool for ensuring compliance and facilitating security audits and it functions as a protective measure against unauthorized data transfers, whether through email or USB devices. The primary focus revolves around maintaining compliance with regulations and safeguarding sensitive information from unauthorized transfers.

How has it helped my organization?

The primary advantage lies in preventing internal data leakage, effectively thwarting any unauthorized data transfer within the organization. Additionally, the audit functionality is invaluable, particularly given the mandatory compliance with data security laws, a requisite for every company, especially in India.

What is most valuable?

Its robust security audit and compliance functionalities prove especially beneficial for businesses in sectors like BFSI (Banking, Financial Services, and Insurance) and Information Technology. Also, the flexibility to independently set, modify, and adapt data security policies is a crucial feature, allowing users to tailor the protection measures according to their specific needs.

What needs improvement?

The only aspect that prevents it from being a perfect solution is the occasional slower response time.

For how long have I used the solution?

I have been working with it for eight months now.

What do I think about the stability of the solution?

The product is highly stable, with no reported issues.

What do I think about the scalability of the solution?

It provides excellent scalability capabilities.

How was the initial setup?

The initial setup is neither overly simplistic nor excessively complex. While it may not be effortlessly intuitive, it doesn't fall into the category of being highly intricate either. The process requires some time, patience, and a basic understanding, as individuals may find it initially challenging. This is often attributed to the unfamiliarity of information technology teams in various companies with data loss prevention solutions.

What about the implementation team?

The deployment process typically begins with a two-way proof of concept on five or six endpoints within the company. Once the POC is completed, addressing most bugs, difficulties, and fine-tuning keywords for Content Aware, the stage is set. The continuous refinement of keywords is crucial during this phase. Following the POC, any remaining issues or customizations are ironed out. Actual deployment, which usually spans about four to five days within a week, is not overly time-consuming. Larger companies may require more time and a larger team for deployment. However, in the case of smaller-sized companies, specifically those with user counts ranging from five hundred to one thousand, a two-member team is generally sufficient. The training process requires an investment of approximately three to four months for the client or customer team to familiarize themselves with the solution. Although it tends to become more straightforward with practice, the initial learning period spans around three months.

What's my experience with pricing, setup cost, and licensing?

The pricing is reasonable for this particular market.

What other advice do I have?

My recommendation for Kaspersky is highly positive. It supports all platforms, including Windows, Linux, and Mac. This broad compatibility across three different operating systems is a significant advantage. If you're someone using multiple platforms, Kaspersky proves to be an excellent and versatile option. Overall, I would rate it eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
Flag as inappropriate
PeerSpot user
system administrator at INSIGHT CREDIT UNION
Real User
Clipboard granularity works great, enabling me to see copying and pasting to specific exit points, and report on it and block it
Pros and Cons
  • "Compared to a lot of the USB management systems out there, Endpoint Protector is the only one that comes with true USB management and the DLP side of it. I'm pretty impressed because I've used several solutions with DLP and USB management, and I've never seen granularity like this solution has."
  • "One of the areas where there is room for improvement is support. It takes time for them to respond. They need to respond on time. Instead of sending an email, I think it would be very helpful to say, 'Let's set up a WebEx to see what's really going on,' instead of the back and forth of email."

What is our primary use case?

I was looking for a DLP solution and Endpoint Protector happened not only to help with that, but also with the USB management piece. As a credit union we have a lot of sensitive data, so we need to be able to see it at rest and block it, and not only on-premises, but off-premises as well. A lot of people work remotely now and this solution is really working for me because once the endpoint is on there, I'm still in control.

How has it helped my organization?

I've seen, through all my policies, how exit points get blocked. The eDiscovery is one of the important things in Endpoint Protector. That's been working a lot for me, especially with the remote users. The eDiscovery allows me to see data outside of the network.

I have policies right now with eDiscovery for social security number, credit card, member number, and I created a duplicate SSN. So it's finding anything where that agent is installed, anything from the computer. It's finding all that data and it's reported to me.

What is most valuable?

I don't have a single most valuable feature. Every feature is really working for me. One of the reasons I bought it was for the USB block, but that's not as much a use case anymore since I have a lot of people working remotely. It's the DLP part that is more important to me right now, to pinpoint the data that's getting moved.

The granularity enables me to not only see a file, but to read inside the file and pull out the data inside it. The granularity is really pretty good on that. It's very important. Let's say somebody just exported a file or emailed a file or uploaded a file on the internet. Seeing the inside of the file is really important to me. Whether it's encrypted or not, I still can see inside the file.

I'm the only admin on it, but the role-based access is fine. I have one user that I give access to so he can just see device control and that's it. That's all I need him to see. I was able to do that, so I'm pretty happy with the role-based access.

I use the solution's clipboard granularity feature to monitor copying and pasting to specific exit points, and it works great. People are trying to get the data any way they can, from the clipboard and things like that. I'm able to see it, report on it, and block it.

For how long have I used the solution?

I've been using Endpoint Protector for going on two years now.

What do I think about the stability of the solution?

I'm pretty impressed with its stability.

What do I think about the scalability of the solution?

I don't see any issues or limitations with scalability. As long as you have the license, everything should be fine.

I'm managing about 300 devices right now.

How are customer service and technical support?

One of the areas where there is room for improvement is support. It takes time for them to respond. They need to respond on time. Instead of sending an email, I think it would be very helpful to say, "Let's set up a WebEx to see what's really going on," instead of the back and forth of email.

Which solution did I use previously and why did I switch?

I didn't replace any solution with this one. I was looking for a USB management solution. I have competitors like ManageEngine, but when I happened to find Endpoint Protector, with the USB and the DLP side of it in one solution, it was good to have that in one platform. I was going to have to find another DLP solution to be able to manage all this.

How was the initial setup?

The initial setup was straightforward for me. They have good documentation, so if you follow everything it should be fine.

My deployment took a month. The implementation strategy for the solution was to set it up, deploy it to a couple of test machines, and see how it was behaving. Once that was done, I deployed it to everybody.

It doesn't require any maintenance on my side, other than when the updates come available. I get them installed and that's it.

What about the implementation team?

I deployed myself.

What was our ROI?

I have definitely seen return on the investment when it comes to satisfying my auditors. I can show them I'm looking at all these things. And I'm protecting the credit union at the same time. It's really all worth it.

What's my experience with pricing, setup cost, and licensing?

I don't have any issue with the licensing and pricing. I would love for it to be cheaper, but at the same time I'm getting a lot from it.

Which other solutions did I evaluate?

Compared to a lot of the USB management systems out there, Endpoint Protector is the only one that comes with true USB management and the DLP side of it. I'm pretty impressed because I've used several solutions with DLP and USB management, and I've never seen granularity like this solution has.

I haven't seen any solution like Endpoint Protector. Everybody says, "USB management: We can control, we can block, etc." And you have other solutions that are DLP only. Having it all in one place is really helpful. Not only do I have the USB management side, but I can come back and say, "All right, what's in that USB? What sensitive data is in there?"

What other advice do I have?

I'm in a Windows environment, but I see it does MacOS, Windows, open sources. It has all of that on the platform.

I'm not using the EasyLock USB Enforced Encryption app to automatically encrypt confidential data transferred to USB storage devices. I'm more monitoring it. But I have the option of force it to encrypt.

Overall, I've never seen a solution with this much granularity. I didn't expect that. I did the demo, but it was only when I actually put in my environment and saw things and said, "Oh, wow." The reporting and the analysis have provided a lot of lessons learned. I didn't think I could get that much information.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Dan Pham Ich - PeerSpot reviewer
Assistant It Manager at New system vietnam
Real User
Top 20
Prevents 99% of ransomware
Pros and Cons
  • "Endpoint Protector's best features are its protection and user-friendliness."
  • "Endpoint Protector would be improved with more DLP templates."

What is our primary use case?

I use Endpoint Protector to protect our end server.

What is most valuable?

Endpoint Protector's best features are its protection and user-friendliness.

What needs improvement?

Endpoint Protector would be improved with more DLP templates.

For how long have I used the solution?

I've been using Endpoint Protector for two to three months.

What do I think about the stability of the solution?

Endpoint Protector works perfectly.

What do I think about the scalability of the solution?

Endpoint Protector is scalable.

How was the initial setup?

The initial setup is easy with a private cloud.

What other advice do I have?

Endpoint Protector has machine learning and AI, and it prevents 99% of ransomware. I would give Endpoint Protector a rating of nine out of ten.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Buyer's Guide
Download our free CoSoSys Endpoint Protector Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Product Categories
Data Loss Prevention (DLP)
Buyer's Guide
Download our free CoSoSys Endpoint Protector Report and get advice and tips from experienced pros sharing their opinions.