|
98% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more ![]()
View Details
|
83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more ![]()
View Details
|
Description | Endpoint Protector is a compact endpoint data protection software that helps companies with data discovery, monitoring and protection based on multi-OS data loss prevention features. It also provides granular control over USB and other peripheral devices, based on product ID, vendor ID, serial number and more. In addition, businesses can depend on the same to streamline file transfers, besides getting access to detailed control through both context and content inspection. Endpoint Protector keeps the USB storage devices completely safe with password protection. It even runs accurate scans through all the content, manually or automatically, in order to find any issues with the data that could be harmful. The software works on advanced technologies to quickly discover intellectual properties, like source code, present in hundreds of file formats. Endpoint Protector can even scan and safeguard Personally Identifiable Information (PII), including bank account numbers, credit card numbers and social security numbers. Ultimately, the software assures accurate protection against internal threats by conducting detailed scans across sensitive information, under its loss prevention feature. Read more | Forcepoint DLP is a data loss prevention solution that defends roaming users against data theft and advanced threats. It comes equipped with enhanced technologies that can identify threats and shield sensitive data in real-time. Moreover, users also get to control their data with a single policy. Organizations can leverage Forcepoint DLP to eliminate their broad, sweeping, and individualized rules. The platform offers adaptive data security terms without affecting productivity levels. Besides, users also get to monitor and control all of their information with the predefined policy library and administrative compliance over 80+ countries for CCPA, GDPR, and more. They can use Azure Information Protection and Boldon James for deploying data classification. The software helps with the protection of vital intellectual data and properties like trade secrets, company financials, credit card data, etc., with unprecedented accuracy. Moreover, the platform can also be used to block data breaches in an automated manner. Read more |
Pricing Options |
|
|
SW Score & Breakdown |
98% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
Total Features |
10 Features
|
4 Features
|
Common Features for All |
Blacklisting
Compliance Reporting
Data Backup
Data Leak Detection
File Server Auditing
Incident Management
Policy Management
Sensitive Data Identification
Threat Protection
Whitelisting
|
Blacklisting
Compliance Reporting
Data Backup
Data Leak Detection
File Server Auditing
Incident Management
Policy Management
Sensitive Data Identification
Threat Protection
Whitelisting
|
Organization Types Supported |
|
|
Platforms Supported |
|
|
Modes of Support |
|
|
API Support |
|
|
User Rating |
|
|
Rating Distribution |
|
|
User Sentiments |
Cross-Platform Compatibility, Effective Device Control, Easy Deployment, Strong Data Loss Prevention Outdated User Interface, Occasional Agent Issues, Limited Reporting Functionality, Complex Content-Aware Configuration |
Not Available
|
Review Summary |
Endpoint Protector is widely praised for its effectiveness in preventing data breaches and endpoint security incidents. Users appreciate its user-friendly interface, comprehensive features, and excellent customer support. However, some users have reported occasional technical glitches and connectivity issues. Overall, Endpoint Protector is highly recommended for businesses seeking robust endpoint protection and data security solutions. |
Not Available
|
Pros & Cons |
|
Not Available
|
Read All User Reviews | Read All User Reviews |
AI-Generated from the text of User Reviews
Pricing Options |
|
|
Pricing Plans
Monthly Plans
Annual Plans
|
Endpoint Protector Custom |
Forcepoint DLP Custom |
View Detailed Pricing
|
View Detailed Pricing
|
Screenshots |
![]() |
Not Available |
Videos |
![]()
+ 1 More
|
![]()
+ 2 More
|
Company Details | Located in: Cluj-Napoca, Romania | Located in: Austin, Texas |
Contact Details |
+40 264 593 110 |
1-858-320-8000 |
Social Media Handles |
|
Not available |
What are the key features of Endpoint Protector?
How does Endpoint Protector ensure data security?
What are the alternatives to Endpoint Protector?
What are the key features of Forcepoint DLP?
How does Forcepoint DLP help protect intellectual property?
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.