Endpoint Protector by CoSoSys

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)CoSoSys
Websitehttps://www.endpointprotector.com
Company size (employees)100 to 499
Type of solutionSoftware

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

Endpoint Protector provides Data Loss Prevention not just for Windows, but also for macOS and Linux computers, Thin Clients, and DaaS platforms. It is the go-to solution for companies running hybrid OS networks. We are pioneers in implementing DLP for macOS and Linux, covering Mac OS X 10.4+ and several Linux distributions – Ubuntu, OpenSUSE, RedHat, and more. Endpoint Protector offers zero-day support to new Windows and macOS versions (including Windows 11 and macOS Monterey). Our cross-platform coverage extends to all Endpoint Protector modules, including USB Enforced Encryption, enabling seamless management of all endpoints regardless of their operating system, all from a single dashboard.

We offer diverse implementation formats to meet the needs of all organizational
infrastructures. Endpoint Protector can come as a Virtual Appliance compatible with popular virtualization tools. Besides, the server can be hosted by us and in major cloud infrastructures like Amazon Web Services, Microsoft Azure, or Google Cloud. These three optimized implementation methods greatly reduce the time it takes for new clients to set up our Data Loss Prevention software and makes it an attractive product for companies worried about the difficulties they might encounter while adopting a DLP solution.

Our motto at CoSoSys is that clients will have Endpoint Protector up and running in 30 minutes and with its intuitive, user-friendly interface, its flexible policy management, and its carefree installation, it’s easy to see why it’s become one of our biggest selling points. Our Data Loss Prevention solution also offers a short learning curve and can be managed even by non-specialized personnel, so there is no need for companies to spend money on additional training for staff, helping to reduce the cost and hassle of transitioning to a more secure work environment.

Brief Overview

Endpoint Protector is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) platforms. The solution protects companies from data leaks, theft, and exfiltration; it minimizes the risk of insider threats and helps to reach compliance with data protection regulations such as the GDPR, CCPA, PCI DSS, HIPAA, LGPD, and more. With its modern, intuitive interface and smooth integration as Virtual Appliance or through cloud services (Amazon Web Services, Microsoft Azure, and Google Cloud Platform), Endpoint Protector is easy to install and does not require advanced technical knowledge to run.
The solution features specialized modules which clients can pick and choose from based on their needs:
Content Aware Protection allows companies to decide which sensitive data can leave computers by creating policies based on predefined content or compliance regulations. It also logs and reports transfers of important documents. By enabling the Deep Packet Inspection (DPI) functionality, it is possible to block access to specific websites, or allow access to specific domains. The user remediation feature provides flexibility and enhances productivity; users can override DLP policies by adding a custom or predefined justification.
Device Control is the most granular solution of its kind on the market, allowing administrators to block or limit the use of portable storage devices based on criteria such as device type or serial number as well as based on time or network policies.
Enforced Encryption automatically encrypts any USB devices connected to network endpoints, ensuring data can only be saved on encrypted devices.
eDiscovery offers the possibility to scan sensitive data at rest stored on employees’ endpoints based on specific file types, predefined content, Regular Expressions, GDPR or HIPAA protected content and more. Based on the scan results, remediation actions can be taken such as encrypting or deleting data.