Endpoint Protector by CoSoSys

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)CoSoSys
Websitehttps://www.endpointprotector.com/
Company size (employees)50 to 99
Type of solutionHybrid

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

Endpoint Protector provides Data Loss Prevention not just for Windows, but also for macOS and Linux computers, Thin Clients, and DaaS platforms. It is the go-to solution for companies running hybrid OS networks. We are pioneers in the implementation of DLP for macOS and Linux, covering Mac OS X 10.4+ and several Linux distributions – Ubuntu, OpenSUSE, RedHat, and more. Endpoint Protector offers zero-day support to new macOS versions. Our cross-platform coverage extends to all Endpoint Protector modules, including USB Enforced Encryption, enabling seamless management of all endpoints regardless of their operating system, all from a single dashboard.

We offer diverse implementation formats to meet the needs of all organizational
infrastructures. Endpoint Protector can come as a Virtual Appliance compatible with popular virtualization tools. Besides, the server can be hosted by us and in major cloud infrastructures like Amazon Web Services, Microsoft Azure, or Google Cloud. These three optimized implementation methods greatly reduce the time it takes for new clients to set up our Data Loss Prevention software and makes it an attractive product for companies worried about the difficulties they might encounter while adopting a DLP solution.

Our motto at CoSoSys is that clients will have Endpoint Protector up and running in 30 minutes and with its intuitive, user-friendly interface, its flexible policy management, and its carefree installation, it’s easy to see why it’s become one of our biggest selling points. Our Data Loss Prevention solution also offers a short learning curve and can be managed even by non-specialized personnel so there is no need for companies to spend money on additional training for staff, helping to reduce the cost and hassle of transitioning to a more secure work environment.

Overview

Endpoint Protector is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, and Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) platforms. The solution protects from data leaks, theft, and exfiltration, it minimizes the risk of insider threats and helps companies to reach compliance with data protection regulations such as the GDPR, CCPA, PCI DSS, HIPAA, and more. With its modern intuitive interface and its smooth integration as Virtual Appliance or through cloud services (Amazon Web Services, Microsoft Azure, and Google Cloud Platform), Endpoint Protector is easy to install and does not require advanced technical knowledge to run, making it the most accessible and user-friendly solution on the market.
It features specialized modules which clients can pick and choose from based on their needs:
Content Aware Protection allows companies to decide which sensitive data can leave computers by creating policies based on predefined content or compliance regulations. It also logs and reports transfers of important documents. By enabling the Deep Packet Inspection (DPI) functionality, it is possible to inspect network traffic at an endpoint level, to block access to specific websites, or to whitelist specific domains or URLs.
Device Control is the most granular solution of its kind on the market, allowing administrators to block or limit the use of portable storage devices based on criteria such as device type or serial number as well as based on time or network policies.
Enforced Encryption automatically encrypts any USB devices connected to network endpoints, ensuring data can only be saved on encrypted devices.
eDiscovery offers the possibility to scan sensitive data at rest stored on employees’ endpoints based on specific file types, predefined content, Regular Expressions, GDPR or HIPAA protected content and more. Based on the scan results, remediation actions can be taken such as encrypting or deleting data.

  • Vote for this Nomination
    (click the thumbs-up icon to cast your vote)

Browse Award Nominations