We just raised a $30M Series A: Read our story
CM
CTO at a aerospace/defense firm with 201-500 employees
Real User
Allows us to have better control over what end-users plug into their computers and tighten our security posture

Pros and Cons

  • "The device control is a big deal for us because we can actually lock out removable drives and different types of hardware. It allows us to have better control over what end-users plug into their computers, and we can have deny lists and tighten our security posture."
  • "The reports and analysis could be improved. There could be a little more data, and the logs could be a little more granular, but it's nothing major. It does what it needs to do, and it's fine."

What is our primary use case?

We bought it because we had a specific need for a single Macintosh computer. We're a defense contractor, so we have to meet very rigid compliance requirements, and Macintosh caused a lot of problems for our mainly Windows domain infrastructure. So, we found the Endpoint Protector tool and tested it, and it did what we wanted it to do. 

We bought it for the Macintosh environment, but because we liked it, we rolled it out to our Windows environment as well.

How has it helped my organization?

The key point is that it allowed us to meet a complex cybersecurity requirement mandated by the government, and it was cost-effective. It is critical to our business because if we're not compliant, we can't bid on contracts.

It provides the ability to lock down a wide variety of USB devices. We've actually done it for pretty much everything that could potentially be an issue, such as keyboards, mice, USB devices, and CD-ROMs. This functionality is critical for us.

What is most valuable?

The device control is a big deal for us because we can actually lock out removable drives and different types of hardware. It allows us to have better control over what end-users plug into their computers, and we can have deny lists and tighten our security posture.

In terms of the granularity of the policies, it is fine. It does exactly what we need. It is granular enough, but it is not too much where it is impossible to tune. It has a nice balance.

In terms of ease of managing DLP in a hybrid environment, it has been very easy to use. It's a very intuitive product. There were no issues trying to figure stuff out.

What needs improvement?

The reports and analysis could be improved. There could be a little more data, and the logs could be a little more granular, but it's nothing major. It does what it needs to do, and it's fine. 

The alerts could be a little bit more intuitive, but again, it's not a big deal. It's just if I had to choose something, that's what it would be.

For how long have I used the solution?

We have not been using it for very long. We bought it about four or five months ago.

What do I think about the stability of the solution?

It has been rock solid. It has never crashed or blown up on us.

What do I think about the scalability of the solution?

We haven't gotten that far yet. We're using it for the initial rollout, and then in the future, we do plan to look more into the Content Aware Protection module to see if this is another add-on module in which we would be interested. After we start playing with the Content Aware Protection module and add modules, we'll know more about scalability, but right now, I don't have any input on that.

In terms of its usage, we currently have about a hundred devices.

How are customer service and technical support?

They were excellent. They were very responsive and helpful.

Which solution did I use previously and why did I switch?

We have had other things. One of the solutions that we used to use was GFI, but it got extremely expensive and over-complex, and it wasn't stable.

How was the initial setup?

It was easy. From deployment to config, it wasn't overly involved or overly complex. The lady we talked to at Endpoint helped us very quickly. We had a licensing issue with something, and their support was good.

Its deployment did not take very long. It took less than a day. 

In terms of the deployment plan, it is simple enough where you don't need anything too complex. We just have a process that we follow. To add any new software, we have to try it first on a dirty network and validate it, and if all is good, then we put it in production.

In terms of its maintenance, primarily, our network engineer is responsible for configuring, reviewing, maintaining, and upgrading it. The rest of us look at the reports and the alerts from it.

What was our ROI?

I can't provide a specific return on investment. The return on investment is that this is a lot cheaper than if someone plugs in a USB key with malware and pollutes the whole network.

What's my experience with pricing, setup cost, and licensing?

From what we've seen, their pricing is a lot lower than the other stuff we've looked at. I actually don't have any concerns with their pricing. They were probably the most reasonable company out there for the features that were offered.

It was pretty straightforward in terms of licensing, and you just pay for the license.

Which other solutions did I evaluate?

We looked at some of the other options. I don't remember their names, but the costs were outrageous. They were just unobtainable for a small business like ours. The cost was a big driver for going for Endpoint Protector, and its features worked. 

Some of the other solutions offered more in terms of data leakage protection, but again, they were too much for a small business. The cost was a big factor as well.

What other advice do I have?

It is critical to test it out. I would advise doing the trial first to make sure it absolutely works for what you need it to do. Being able to test it without paying is a big deal, and it lets you really drive it.

We don't use the EasyLock USB Enforced Encryption app to automatically encrypt the confidential data transferred to the USB storage. We don't allow USB storage. We use it purely to lock the device, and our encryption is handled by another tool.

In terms of role-based access features for admins, I don't handle a lot of the technical side of it. My network engineer handles it, so I don't have any input to provide, but I haven't heard any complaints.

For zero-day protection, we have other tools. I don't think we're using this feature.

I would rate Endpoint Protector an eight out of 10. It pretty much did what they stated it did. There were no surprises.

Disclosure: IT Central Station contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
MH
Manager of IT Infrastructure at a comms service provider with 10,001+ employees
Real User
Top 10
Stable and works well across multiple platforms

Pros and Cons

  • "It is easy to manage the DLP between MacOS and Linux."
  • "In Linux a user can remove a getent anytime. There is no control there on the file structure in Linux. So if this solution could give us information on what users removed in the dashboard, it would help us."

What is our primary use case?

We have a multi-platform environment, mainly Linux and Mac.

We installed a client in our client PCs and we have a management server in the same network. So we control the workstation through that management control, we mainly enable the Endpoint Protector function for blocking USBS and other physical ports, and we have some policies to restrict data passing from one PC to another PC. Those are the main features we are using.

How has it helped my organization?

Endpoint Protector almost fulfills our requirements; by 60%. Compared to other solutions we feel better with CoSoSys. 

We are a research center, so control is very important for us. We don't have any in-house solutions for Mac and Linux, so CoSoSys is a very important tool for us to control and ensure our internal security. This is a very important function.

During lockdown time we needed to deploy some new policies and rules. We faced problems all the time. We communicated with CoSoSys'  technical teams and we generated support tickets. They supported us as much as possible. During that period they helped us a lot.

Because we are using it for security purposes, there is no direct impact value, but it is saving our data. That is very important. It's almost like an insurance policy.

What is most valuable?

We are happy and satisfied with the solution. When we face any problem, we contact the CoSoSys technical team support directly and they support us as much as possible.

CoSoSys provides a single platform to support Windows, MacOS and Linux. We are using hybrid deployment docs, but we're only using Linux and a Mac, not Windows.

It manages the DLP. It is easy to manage the DLP between MacOS and Linux. This is very important for us because we don't have any sort of in-house solution for data collection for the Linux and Mac environment. We are fully dependent on CoSoSys.

We are not using encryption, because the encryption depends on the server and on many other things, which will cause us to face problems.

Additionally, it has granularity features to copy, paste, and do other things.

Between PCs, there is no control, but we are interested when data is transferred to outside the PCs. At those times we use CoSoSys. CoSoSys can control most of this part.

It has absolutely, 100% helped to reduce important data from going out of our organization.

What needs improvement?

Some CoSoSys features do need to be improved. For example, in Linux a user can remove a getent anytime. There is no control there on the file structure in Linux. So if this solution could give us information on what users removed in the dashboard, it would help us. If CoSoSys applied this sort of improvement, it would help us a lot.

For how long have I used the solution?

We have been using Endpoint Protector for two to three years.

What do I think about the stability of the solution?

Endpoint Protector is a very stable product.

We manage it directly and when we face any issues, we directly contact CoSoSys. There is no third party. When purchasing we use a third party for payment and other purposes as it is overseas payment, so we can't pay directly.

We are licensing from a reseller, but all our support is directly through CoSoSys.

What do I think about the scalability of the solution?

Right now we have about 400 developers using this solution, with one person managing it and one as backup. It does not require too much manpower to manage this team.

How are customer service and technical support?

Their support is very good. We have had very good experiences with them.

They have been responsive and they're generally knowledgeable. They always support us when we request it.

How was the initial setup?

The initial setup is simple, not complex.

The initial setup did not take much time. It is a very lightweight application and it runs very smoothly. It actually took less than half a minute to setup.

You just need to install and sync with the management service and it work in the background as an agent. It is automatically up and working in the background.

The first time we needed to configure and set up synchronization and the next times, for any changes we may need, we need to apply it in the server and sync with both of them.

Prior to deploying it, we had some strategies. We set our purpose, our policy, and then based on this policy, we deployed it.

What's my experience with pricing, setup cost, and licensing?

We think the pricing is very reasonable.

Which other solutions did I evaluate?

We searched Digital Guardian and some other solutions. We found CoSoSys is the most suitable for us.

CoSoSys completely allows combined work in Windows, Linux, and Mac and the synchronization between server and client is very easy. In addition, creating exceptions is very easy in CoSoSys compared to other solutions.

What other advice do I have?

I work in Samsung, so we have many subsidiaries all over the world. Gradually we are explaining to them that we are using this solution in Bangladesh and we are expecting more organizations in Samsung to use this solution.

We have a platform to communicate with each other and share our experiences. So if any offices in Samsung begin using this process it would allow us to develop these things for Samsung more closely.

On a scale of one to ten I would give Endpoint Protector an eight. Our experience using Endpoint Protector for security purposes is very good.

Which deployment model are you using for this solution?

On-premises
Disclosure: IT Central Station contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Learn what your peers think about Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: October 2021.
543,424 professionals have used our research since 2012.
PB
People Operations Manager at a tech services company with 11-50 employees
Real User
Top 10
Main dashboard is intuitive, and offline temporary passcode solution is really easy to use

Pros and Cons

  • "It also provides us with the ability to lock down a wide variety of USB devices, which is pretty important because we don't want certain data accessed. It does a really good job when it comes to the versatility of the exit points it supports, making sure that important data does not leave our organization."
  • "There are times when the server needs to be updated, and it would help if I got a notification for when the newest version comes out, because at the moment, I'm going in every now and then and checking. Sometimes it comes out and I didn't know it had come out."

What is our primary use case?

We use it primarily for endpoint protection. We have to be SOC 2 compliant. We have a number of standards that we have to abide by for HIPAA reasons and SOC 2 reasons, which is why we initially put it in place, but we mostly use it for endpoint protection and MDM.

How has it helped my organization?

We have access to some healthcare data, at times, which means that we have to follow very strict guidelines. So we need the endpoint protection.

What is most valuable?

I like the main dashboard. It's very intuitive. 

The offline temporary passcode solution is really easy to use for both the backend administrator and the users.

The granularity of the policies that you can create is pretty sufficient. We haven't had to make any super-granular policies. I understand what its capabilities are, and it is really nice to know that if we have to crack down and be a little more strict on our policies, Endpoint Protector provides those features.

It also provides us with the ability to lock down a wide variety of USB devices, which is pretty important because we don't want certain data accessed. It does a really good job when it comes to the versatility of the exit points it supports, making sure that important data does not leave our organization.

Endpoint Protector also provides a single platform to support Windows, macOS, and Linux, although we don't use Linux, we just use Windows and Mac. It makes it pretty easy for me to manage DLP in such a hybrid environment. I find it intuitive. It's pretty vital that it supports Windows and macOS because we use both types of computers in our company. It provides Zero day protection for macOS.

What needs improvement?

There are times when the server needs to be updated, and it would help if I got a notification for when the newest version comes out, because at the moment, I'm going in every now and then and checking. Sometimes it comes out and I didn't know it had come out. It would be super-helpful if I got a notification saying, "It's time to update the server."

For how long have I used the solution?

I've been using CoSoSys for a little more than two years.

What do I think about the stability of the solution?

It hasn't changed much since we started using it, so I haven't really found myself having to adapt or learn anything new. It has served all the purposes that we've purchased it for, so it's pretty stable.

What do I think about the scalability of the solution?

We have such a small team that scalability hasn't really been an issue at this point. It's easy enough for me to manage it on my own. We have fewer than 50 employees, and somewhere between 50 and 60 computers, so I haven't really encountered any scalability issues. We've adopted it 100 percent.

How are customer service and technical support?

For the most part, their technical support has been really responsive and good about setting up time to go over things. They have been pretty timely, in general.

Which solution did I use previously and why did I switch?

We didn't have anything in place before.

How was the initial setup?

It's really easy to install. I had to do most of them in person. At the time, most of us were in the office, so I just had folks drop off their computers at my desk for 15 minutes while I set it up. Some took less than 15 minutes. We do have some remote workers, and I used Zoom which has a remote screen option.

It was done over the course of a couple of days, because I had 50-something devices to do.

I don't know if Endpoint Protector has this kind of feature, because I didn't need to use it. But if I had more than 50 computers, it would have been really time-consuming to do the implementation. It wasn't that bad for me, but any more than 50 computers would be a little bit of a hassle.

What was our ROI?

Our return is that it serves the purpose that we need it for.

What's my experience with pricing, setup cost, and licensing?

The pricing model changed the last time that we renewed, but it's reasonable compared to what's out there.

Which other solutions did I evaluate?

Choosing a solution was a discussion that happened before I was in the mix. I don't know if other solutions were discussed before this one was decided upon. I do know that it was something that another employee had used before and she recommended it. I don't know if a lot of other research went on or they just said, "Okay, since someone knows it and they've used it, we'll use it too."

What other advice do I have?

In terms of feature parity between Windows and macOS, with Windows it takes a lot longer to install, but that's really the main difference.

Disclosure: IT Central Station contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
MP
IT Specialist at TresVista Financial Services Pvt. Ltd.
Real User
User-friendly, simple-to-use interface, good support, and protects us from data leakage

Pros and Cons

  • "The interface is pretty user-friendly, neatly explained, and simple to use."
  • "We are currently facing an issue where it is blocking the Winman software, which is something that we don't want to happen because we use it in our accounts department to pay taxes."

What is our primary use case?

We use this product to protect our Mac and Windows 10 endpoints.

Our main purpose is to block the uploading of Excel and PowerPoint files. We also use it to block USB devices and other peripherals that users connect to the system. 

How has it helped my organization?

This product performs well and multiple things have been blocked by it.

By raising discovered issues with our team members, they are doing their part in terms of resolving them.

Endpoint Protector provides a single platform to support our Windows and Mac machines. We do not have any Linux machines in our environment. Managing DLP for our machines in this hybrid environment is pretty simple, as the product is user-friendly and we can easily find what we need.

The fact that this solution supports different operating systems is very important to us because we want to ensure that there is no data leakage.

We have one or two Macs in our organization, with the majority of people using Windows 10 machines. We haven't seen any difference in the support that this product offers for either operating system.

What is most valuable?

The Device Control feature and tools are very nice. It can also be used for containers. We have blocked multiple financial components using these features and rely on the upload and block policies. For example, we have blocked Google Drive uploads, as well as the upload functionality for other cloud spaces.

The interface is pretty user-friendly, neatly explained, and simple to use.

We are able to lock down a wide variety of USB devices, which is important to us because none of our users can connect a USB drive or other device to the machine. By preventing this, there won't be data leakage. We have experienced this in the past and we are now able to control it through the use of device policies. 

The technical support that they provide works well.

We use the RDP remote desktop option to prevent copy and paste operations to remote systems. If anyone tries to copy and paste between a remote system and a local system then they will not be able to do it. This works well and it makes our operations more secure.

What needs improvement?

We are currently facing an issue where it is blocking the Winman software, which is something that we don't want to happen because we use it in our accounts department to pay taxes.

There is no option or support available for DriveHQ. 

For how long have I used the solution?

We have been using Endpoint Protector for between seven and eight years.

What do I think about the stability of the solution?

This product is pretty stable.

What do I think about the scalability of the solution?

It is easy to scale. Across the organization, we have more than 900 users with Endpoint Protector deployed on their machines.

We plan to soon increase the number of licenses that we have. Our intention is to start deploying on our laptops, which will bring us to a total of approximately 1,500 licenses.

How are customer service and technical support?

We have been in touch with technical support and our experience has been pretty nice.

How was the initial setup?

This solution was easy to deploy but it was implemented before I joined the company so I don't know how long the process took.

No major upgrades have been required since I have been working with it.

What about the implementation team?

We have an in-house person who is responsible for servers, and he deployed Endpoint Protector. The process is not complex and only one person is required.

We have three system engineers, three senior system engineers, and one assistant manager in charge of maintenance.

Which other solutions did I evaluate?

We looked at a DLP product by Forcepoint but our current solution was working pretty well, so we opted not to switch.

What other advice do I have?

This is a product that has improved over time. For example, in the past, there was no option to view the ports that were not added to your list. This is now supported and some of the problems we were facing have been stopped. Another example is that we are now able to block Teams and it works pretty well, whereas, in the past, we could not block uploads or downloads with Teams.

Endpoint Protector has other features that we do not use, such as encryption. Instead, we deployed Sophos Encryption approximately six months ago for this purpose.

The biggest lesson that I have learned from using this product is how to block uploads and downloads, as well as how to lock devices on users' machines. My advice for anybody who is considering it is that it is pretty simple to use. It's a friendly environment and it's easy to block devices, uploads, and other security issues.

In summary, we have not faced many issues with Endpoint Protector and it is fulfilling our requirements, as we wanted.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: IT Central Station contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
VS
IT Manager at a tech vendor with 11-50 employees
Real User
Top 10
Easy to set up, good reporting, and provides valuable insight into users' activities

Pros and Cons

  • "The most valuable feature is device control."
  • "I would like to see an alert feature that when a system is started, it checks to make sure that the client has the most up-to-date policies."

What is our primary use case?

We use Endpoint Protector as our data loss prevention solution for Windows, Linux, and Mac machines. Our clients work from outside of our building and in different locations, and we need to use this product to keep our data secure.

How has it helped my organization?

There are many benefits to using this solution.

In terms of the granularity of policies that we can create, this is a good product. We have created two policies that are used on Windows, Linux, and our Mac machines. The first is related to screen sharing, and the second is responsible for blocking files in email attachments.

This functionality is important to us. At the end of the day, we get reports about files, the users, and what they are doing. Preventing screen sharing with unknown people, or accepting files from somebody who is not known, are both things that I want to prevent.

We get detailed reports that identify our clients and we can see how each of them is spending their day at the office. Essentially, we have good visibility of the traffic on our endpoints.

To this point, I have not needed to lock down a variety of different USB devices. I have not used, for example, a card reader. I have only used it to lock down USB storage devices. In the future, I may use more of these features.

I have had no difficulty with using this solution in our hybrid environment that includes Windows, Linux, and Mac machines. There is no difference in features between the different platforms. There are differences such as the web browser that is used. For example, in Windows, we use Chrome, whereas, with Mac, we use Safari. Certain things are different based on the software but otherwise, everything is the same.

What is most valuable?

The most valuable feature is device control. If you have the wrong devices connected to the network then it may cost you, and this product allows you to control them. For example, you can prevent users from using an external hard disk, which is something that I like.

There is a clipboard feature to ensure that a user cannot print their screen or take a screenshot. This is one of the reasons that we feel secure when using this product.

The users are happy with using this solution on a daily basis. 

What needs improvement?

I would like to see an alert feature that when a system is started, it checks to make sure that the client has the most up-to-date policies. Before the policies are updated, nothing can be done on the system.

For how long have I used the solution?

We have been using Endpoint Protector for one year.

What do I think about the stability of the solution?

This is a stable product and we haven't had any problems with it.

What do I think about the scalability of the solution?

We have between 50 and 60 people in our organization.

How are customer service and technical support?

Within the past month or two, I have experienced problems and contacted technical support by email. They immediately responded and gave me suggestions on how to improve our security.

Normally, I send the support team an email and they answer within 24 hours. They analyze the problem and try to determine why it has occurred. They ask end-to-end questions such as what I was doing at the time, which allows them to assess and analyze all of the relevant points.

Which solution did I use previously and why did I switch?

This is the first DLP solution that we have used.

How was the initial setup?

The initial setup is very easy and there is nothing difficult about it.

Our deployment took one month and we didn't know anything about the product in advance. We didn't know exactly how it would work or which features would be added. The vendor explained everything to us after that.

What's my experience with pricing, setup cost, and licensing?

The minimum number of licenses they sell is 50 or 150 users. They do not sell, for example, a package of 10 licenses. It would be helpful if you could purchase a smaller number of licenses at one time.

Which other solutions did I evaluate?

We did not evaluate other such solutions before selecting this one.

What other advice do I have?

My advice for anybody who is considering this product is that it's user-friendly, and everyone can easily understand the details about how it works.

I am 100% confident in the security that I get from this product.

Overall, I think that our requirements for basic control, including application control, have been met. I'm happy with the current product and I like the feature set. That said, if they provide additional features in the future then we will use them.

I would rate this solution a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: IT Central Station contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
MC
IT Manager of Information Technology Operations Manager at Astra Rafael Comsys Pvt. Ltd.
Real User
Top 5
A versatile and user friendly solution with great customer support

Pros and Cons

  • "The role-based access features for the teams that administer it is good."
  • "Customization could be a lot better."

What is our primary use case?

I use the Endpoint Protector to monitor what the users or employees are doing. I monitor employee data like what they are sending, who they are sending it to, and what kind of data they're sending.

If I want to check that data, I can download it. I am checking the backup of the Endpoint Protector data weekly. If I want to monitor previous things, I can do that with the backup of the software.

It's important to create policies to protect my company data. If I create a policy that only our attachments go through our domain, only our attachments get through and not from Google, Yahoo, and others. It's blocking attachments effectively while providing me with an alert if I included an alert policy.

What is most valuable?

Endpoint Protector by CoSoSys has some valuable features. The role-based access features for the teams that administer it is good.

The granularity of the policies is good. The versatility of exit points is good. It also supports both macOS and Windows.

What needs improvement?

A lot of things can be improved. Especially customization could be a lot better.

Sometimes there are issues like when I write a policy to block finance sites. It also blocks the banking sites I have not included. Sometimes it also blocks commands I send to the machine while using Matrix software. 

Whenever this happens, I have to go into the software and choose the packet inspection option or something similar. Then I have to send the command again to the machine, and if it doesn't work, I have to contact the support team. These are some of the issues I have dealt with.

For how long have I used the solution?

I have been using the Endpoint Protector by CoSoSys for over six months. 

What do I think about the stability of the solution?

The stability, reliability, and availability of Endpoint Protector by CoSoSys is good.

What do I think about the scalability of the solution?

Endpoint Protector by CoSoSys is scalable and that's why we use it.

How are customer service and technical support?

The support is excellent. I got responses promptly, just like the vendor stated. If I email or call support, they are ready to assist me.

Which solution did I use previously and why did I switch?

Previously, we used Symantec Endpoint Protection, but the customer support wasn't good. I also inquired about Symantec Endpoint Protection and found out from our local vendors that the support wasn't good, and they recommended CoSoSys.

I installed CoSoSys in my system and tested it for two to three days. I made some policies like data blocking policies, mail blocking policies, attachment blocking policies, and all kinds of policies we need in our company. I tested it and felt very good about it and purchased the license.

How was the initial setup?

The initial setup and deployment are very easy. You can download the database directly, and you can purchase the license. After that, you can download the ETP client to install it. That's all you have to do.

The deployment takes about two hours. The company had a deployment plan and strategy, and I did the rest. 

What about the implementation team?

I implemented the Endpoint Protector by CoSoSys all by myself. 

What's my experience with pricing, setup cost, and licensing?

The price of Endpoint Protector by CoSoSys is more or less the same as other competing solutions.

Which other solutions did I evaluate?

I have installed Symantec Endpoint Protection previously, and the response wasn't good. That's why I moved to CoSoSys DLP. Before CoSoSys DLP, I checked another software, but I found it wasn't a DLP.

What other advice do I have?

If you need a good DLP software to protect your data, I recommend that you go for CoSoSys without any second thought. 

Endpoint Protector by CoSoSys is a versatile solution. The important thing is to protect the data, and it does that well. I have blocked all USB connections from the users via CoSoSys Endpoint Protector. 

It's very easy to use, just download the database from the internet directly, and after getting the license key, we can install and connect to the internet. Once you purchase the license, it's very easy, and 4GB of RAM and 150GB hard disk is enough for this data.

On a scale from one to ten, I would give Endpoint Protector by CoSoSys a ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: IT Central Station contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
SE
IT Manager at a marketing services firm with 51-200 employees
Real User
Top 20
Helpful support, intuitive interface, and it effectively protects our confidential graphics files

Pros and Cons

  • "The software is easy to use and the dashboard is intuitive."
  • "It would be helpful if they offered discounted pricing for long-term contracts to serve customers who are interested in committing for periods of three years, five years, or longer."

What is our primary use case?

We store graphics files on our computers and they are confidential, so we implemented this product to block all of the computers from being able to send the data outside of our organization.

We use it to block USB ports so that people cannot connect an external hard drive, flash drive, or anything else that people can use to take files off of the system. Essentially, it blocks data transfer.

How has it helped my organization?

We only have two policies. The first is to block everything and the second one allows for Wi-Fi and Bluetooth connections.

This product does give us multiple choices for blocking data exit points. Without giving specifics, I can say that I know we have better security because of it.

We have Mac and PC machines, and it is very easy to manage both types. There is no noticeable difference in features between Mac and Windows machines.

We use role-based access for administering this solution, but as we are a small company, it is only insofar as having an administrative role that can perform any of the functions when needed. Some people can unblock certain policies, but we have a single administrator that can do everything.

What is most valuable?

The most valuable feature is blocking data transfer.

The software is easy to use and the dashboard is intuitive.

For how long have I used the solution?

I have been using Endpoint Protector since I joined the company five years ago. I believe that they were using it for one or two years prior to that.

What do I think about the stability of the solution?

Stability-wise, it is very good and very safe. It seems to work fine.

What do I think about the scalability of the solution?

We have approximately 117 endpoints and for the time being, I don't think that we will be expanding. We already have all of our computers.

How are customer service and technical support?

I have not used technical support often, but every time I have, it was perfect. They have good support and they have helped me very well.

Which solution did I use previously and why did I switch?

Several years ago, we used ESET but we found that it only logged the files that were transferred via the ports. This was not what we wanted to do, so we canceled the license and implemented Endpoint Protector instead for blocking the ports.

What's my experience with pricing, setup cost, and licensing?

When I last renewed the license it was for a two-year term, and they gave me the second year at half price. It was a very nice gesture. Normally, I renew my license annually and I was happy to get a discount for committing to two years. There are no costs in addition to the standard licensing fees.

It would be helpful if they offered discounted pricing for long-term contracts to serve customers who are interested in committing for periods of three years, five years, or longer. I have been with the same company for five years, it was installed when I arrived, and we are going to continue using it in the future. Perhaps after a company has completed their first year, they should propose longer contracts to them.

What other advice do I have?

My advice for anybody who is considering this product is that if they want something to protect data on both Macs and PCs then this is a very good choice. I have never worked with a product that is this easy to use.

In summary, this is a good product and for now, I think that it has everything we need. It seems to be a perfect match for us.

I would rate this solution a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: IT Central Station contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
Darshil Sanghvi
Consultant at a tech services company with 501-1,000 employees
Reseller
Top 5Leaderboard
Feature-rich, easy to set up, and protects our data against different kinds of loss

Pros and Cons

  • "The most valuable features are Device Control, Content-Aware Protection, Enforced Encryption, and eDiscovery."
  • "If CoSoSys comes up with a suite of Host DLP, along with Network DLP and SaaS DLP, it will cover all of the aspects of a DLP solution."

What is our primary use case?

We have been implementing and designing solutions with CoSoSys as a part of the Host level DLP (Data leak prevention) solution. Our major cause is to provide a solution to protect data being leaked by their users, knowingly, via any application or software like web browsers, email, SaaS applications, drive, etc., or any hardware devices through MTP/PTP (mobile phones, wifi, USB, cd/floppy, printer, or ay such devices

We have successfully implemented this solution in multiple customer environments, PAN India.

How has it helped my organization?

We have implemented this solution for protecting our data that may be leaked by users for their personal use.

Our concern for data protection came into the picture during the pandemic phase (COVID-19), where users were performing critical business operations from their homes. At that moment, it was observed that data needs to be protected.

We were searching for data protection solutions on Google during the time, where Endpoint Protector popped up. We connected with their team, implemented the same in our environment initially for testing purposes, and then implemented it in our environment and then in our customer's network.

What is most valuable?

The most valuable features are Device Control, Content-Aware Protection, Enforced Encryption, and eDiscovery.

Device control is a module of CoSoSys EPP where we get granular rights and controls for protection of data getting leaked from any hardware devices like USB drives, Storage media, Wi-Fi, printers, etc.

Content-Aware Protection prevents users from uploading or sharing the data or files/documents with others through any application or software like web-browsers, email, file-sharing, or remote application software. It can even prevent users from taking and/or sharing screenshots or clipboard data.

Enforced Encryption is used when you want to have only permitted or restrictive devices connecting to user systems.

eDiscovery is another module where an IT admin can find a file/resource/path/folder present in a user's system.

What needs improvement?

As a host DLP solution, it has granular controls and features. It misses Network level DLP and SaaD DLP offerings. If CoSoSys comes up with a suite of Host DLP, along with Network DLP and SaaS DLP, it will cover all of the aspects of a DLP solution.

Various other products provide us a complete suite of solutions covering Host, Network, and SaaS aspects. Examples of these are Forcepoint and Digital Guardian.

For how long have I used the solution?

I have been deploying and presenting this solution to multiple customers, since April 2020.

How are customer service and technical support?

There are areas where CoSoSys supports more than other vendors do. For example, they offer support for Windows, Mac, and Linux platforms, which not all of the other vendors provide.

How was the initial setup?

The initial setup and installation of the server were very simple.

What about the implementation team?

We implemented in-house using the admin guide that was provided.

What's my experience with pricing, setup cost, and licensing?

This is a budget-friendly solution that covers all the aspects of host-level DLP.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: My company is providing solutions to customers needing DLP solutions.