98% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
Complete data protection based on advanced technologies
66.4%
29.8%
1.5%
0.8%
1.5%
Cross-Platform Compatibility, Effective Device Control, Easy Deployment, Strong Data Loss Prevention
Outdated User Interface, Occasional Agent Issues, Limited Reporting Functionality, Complex Content-Aware Configuration
Endpoint Protector is widely praised for its effectiveness in preventing data breaches and endpoint security incidents. Users appreciate its user-friendly interface, comprehensive features, and excellent customer support. However, some users have reported occasional technical glitches and connectivity issues. Overall, Endpoint Protector is highly recommended for businesses seeking robust endpoint protection and data security solutions.
AI-Generated from the text of User Reviews
everything about this software is great true DLP i can monitor user outside company manage USB block any device not approve on the end point block SSN CC and sensitive information. lockdown. encrypt and delete sensitive data.
i dont have anything i dislike about the solution
device control content-aware protection secure USB storage. inspection scan
CosoSys has a complete platform to perform and apply rules for policy, complains and tools to enforce integrity, confidentiality and disponibility of the information
All is automatic but sometimes when the business needs should be another traditional path for installation and configuration usually for Latin American business
This tool helps us resolve issues about lost information in the organization, like bank account balances, transfer data, access to files, notices and block, lists of customers and prices falling in nonadequate hands.
We chose to use Endpoint Protector as a support tool for our Linux environment. It's easy to use, manage, install and update.
It has content verification based on a large number of triggers.
Although it is simple to use, the tool is not intuitive and therefore requires a little more attention and a more initial learning curve.
Data Loss Prevention Management for Linux environment. Allows greater control and protection of the company's sensitive data.
Easy to use the console, rich functionality and very high level of support
There are no downsides. It might be developing new features faster, but it is already swift and very client-oriented.
The system monitors and blocks the transfer of sensitive data, controls USBs, encrypts USBs and finds files with sensitive data if they are stored where they should not.
Wenn es um die Überwachung der angeschlossenen Geräte geht, macht man mit dieser Software alles richtig. Erkennung sehr gut. Einfsch managebar. Und steht's ein guter Support seitens EPP!
Das System kommt als fertige VMDK. Einstellungen im Betriebssystem sind nicht wirklich gut managebar. Das System läuft aber. Ein parr mehr Möglichkeiten das OS anzupassen wären schön.
Es hilft uns die abgeschlossenen Geräte zu überwachen. Dazu gibt es uns Sicherheit bei der Nutzung von USB Stocks und Festplatten. Die Verschlüsselung sorgt für Sicherheit Öl
Endpoint Feature for Device Management
ability to manage almost all components
Some Client version is not compatible with OSX
Device Managemet
Security
The design, Deployment, and management is fairly simple to implement and they have On-Prem and Cloud offerings that really helps the enterprise to take action
I don't see any downside during my review of this product, but if they add self healing capability in the agent that will ease the work of system administrators
Endpoint Protector is a very mature product that I have come across and it has various capabilities to manage any device granularly and DLP feature is an added advantage to this product that makes it a complete security tool for any organization to maintain a compliant security posture.
we were looking for allowing users to connect the device that was provided by company to their work laptops. we were finding difficulty before in managing this, but with EPP tool set, we were able to add the device ID and make it available to the laptop that is registered to that user. we did with USB port controls that we need to take control of.
In the company that I work, Endpoint Protector is used for the device control part. I think that this solution can solve the information security problems of the organization and also it prevents data to be leaked outside organization.
There are not so many downsides I can think of. Maybe the reporting part could be improved.
For the company that I work, it solved the problem of information security and it reduce the probability of data leakege.
Since i saw the trial interface I thought it was our solution.
Until today We couldn´t find a dislike point.
The film material is our most valuable property, Prevent illegal distribution is our goal
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.
We use a very limited part of the EP functionalities,yet. Mostly focusing on the USB enable/disable functions. However, we are looking forward to start using DLP functions as well. So far - so good with our overal experience.
There is nothing that we dislike - whatever functions we need - we have been able to use it or find the needed information. Might be interesting to view more modern UI.
It is solving mainly our issue with disabling easily the USB ports for the devices in our organization. It makes it simple and easy to do it. However, we will use more functionalities of EP in the future to resolve more DLP problems.