Endpoint Protector Valuable Features

Rene Wenger
Core Facilities & ICT Manager at MJB International LLC/ Al Masaood John Brown LLC
There are a lot of features, but the main feature is that I can use a device serial number to unlock any particular machine or for all machines. If I have a phone, like a Samsung phone, I can whitelist that specific phone for full access wherever it is plugged into any of our devices. This is the same with a USB, because most USBs come in bulk and have the same serial number. I can then whitelist that particular USB to be read-write with full access. View full review »
Sanjeev Goyal
Head IT at Trantor
I have not found any valuable features. View full review »
Alex Alexandre
System Administrator at Insight Financial Credit Union, Inc.
I don't have a single most valuable feature. Every feature is really working for me. One of the reasons I bought it was for the USB block, but that's not as much a use case anymore since I have a lot of people working remotely. It's the DLP part that is more important to me right now, to pinpoint the data that's getting moved. The granularity enables me to not only see a file, but to read inside the file and pull out the data inside it. The granularity is really pretty good on that. It's very important. Let's say somebody just exported a file or emailed a file or uploaded a file on the internet. Seeing the inside of the file is really important to me. Whether it's encrypted or not, I still can see inside the file. I'm the only admin on it, but the role-based access is fine. I have one user that I give access to so he can just see device control and that's it. That's all I need him to see. I was able to do that, so I'm pretty happy with the role-based access. I use the solution's clipboard granularity feature to monitor copying and pasting to specific exit points, and it works great. People are trying to get the data any way they can, from the clipboard and things like that. I'm able to see it, report on it, and block it. View full review »
Learn what your peers think about Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
457,459 professionals have used our research since 2012.
reviewer1468050
Manager of IT Infrastructure at a comms service provider with 10,001+ employees
We are happy and satisfied with the solution. When we face any problem, we contact the CoSoSys technical team support directly and they support us as much as possible. CoSoSys provides a single platform to support Windows, MacOS and Linux. We are using hybrid deployment docs, but we're only using Linux and a Mac, not Windows. It manages the DLP. It is easy to manage the DLP between MacOS and Linux. This is very important for us because we don't have any sort of in-house solution for data collection for the Linux and Mac environment. We are fully dependent on CoSoSys. We are not using encryption, because the encryption depends on the server and on many other things, which will cause us to face problems. Additionally, it has granularity features to copy, paste, and do other things. Between PCs, there is no control, but we are interested when data is transferred to outside the PCs. At those times we use CoSoSys. CoSoSys can control most of this part. It has absolutely, 100% helped to reduce important data from going out of our organization. View full review »
Mahesh Chenchalapu
IT Manager of Information Technology Operations Manager at Astra Rafael Comsys Pvt. Ltd.
Endpoint Protector by CoSoSys has some valuable features. The role-based access features for the teams that administer it is good. The granularity of the policies is good. The versatility of exit points is good. It also supports both macOS and Windows. View full review »
Darshil Sanghvi
Technology Consultant at a tech services company with 501-1,000 employees
The most valuable features are Device Control, Content-Aware Protection, Enforced Encryption, and eDiscovery. Device control is a module of CoSoSys EPP where we get granular rights and controls for protection of data getting leaked from any hardware devices like USB drives, Storage media, Wi-Fi, printers, etc. Content-Aware Protection prevents users from uploading or sharing the data or files/documents with others through any application or software like web-browsers, email, file-sharing, or remote application software. It can even prevent users from taking and/or sharing screenshots or clipboard data. Enforced Encryption is used when you want to have only permitted or restrictive devices connecting to user systems. eDiscovery is another module where an IT admin can find a file/resource/path/folder present in a user's system. View full review »
Learn what your peers think about Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
457,459 professionals have used our research since 2012.