Endpoint Protector by CoSoSys

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)CoSoSys
Websitehttps://www.endpointprotector.com/
Company size (employees)50 to 99
Type of solutionHybrid

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

- Easy and fast deployment with an intuitive user-friendly interface
Endpoint Protector has an easy and fast deployment, meaning the solution can be up and running in 30 minutes or less. This is due to the great flexibility of its deployment methods which meet the needs of all organizational infrastructures. Endpoint Protector also supports a modern, user-friendly interface that offers a short learning curve and allows even non-specialized personnel to easily understand and use the solution.

- Cross-platform DLP solution with a lightweight agent
Endpoint Protector prides to be a cross-platform DLP solution, which offers feature parity between Windows, macOS, and Linux; it is the go-to solution for companies running hybrid OS networks. The solution can be managed by administrators from a single dashboard, eliminating the need for multiple accounts or control panels. Endpoint Protector has a lightweight agent with a minimum footprint on the client. Even with all modules installed, it doesn’t slow down the computer’s performance and has a maximum of 5% on the CPU spike.

- A modular approach to DLP with granular policies and settings
Endpoint Protector’s granular policies allow admins to apply policies not only globally but also based on devices and computers as well as users and groups. In this way, the particular needs of every department can be met without having to apply the same policies company-wide. Similarly, the strictness of policies can be adjusted based on individual users’ access to sensitive data. Due to its modular format, Endpoint Protector allows organizations to mix and match the right tools to serve their specific needs. This increases ease of use by eliminating any unneeded tools and focusing on a company’s areas of interest. At the same time, organizations looking for a complete DLP solution can simply choose all modules.

Overview

CoSoSys specializes in Data Loss Prevention (DLP) and security software. Its flagship product, Endpoint Protector, is a full DLP solution that puts an end to data leaks and data theft while offering control of portable storage devices and ensuring compliance with data protection regulations. It is an advanced cross-platform DLP solution for Windows, macOS, and Linux as well as Thin Clients.

With its modern intuitive interface and its smooth integration as Virtual or Hardware Appliance, the solution is easy to install and does not require advanced technical knowledge to run, making it the most accessible and user-friendly solution on the market. Mobile devices can be secured due to Endpoint Protector’s Mobile Device Management capabilities, thus sensitive enterprise data can be protected both inside and outside the companies’ walls.

Endpoint Protector features specialized modules which clients can pick and choose from based on their needs:

Device Control is the most granular solution of its kind on the market, allowing administrators to block or limit the use of portable storage devices based on criteria such as device type or serial number as well as based on time or network policies.

Content Aware Protection allows companies to decide which sensitive data can leave computers by creating policies based on predefined content or compliance regulations such as GDPR, PCI DSS, CCPA, HIPAA, and others. It also logs and reports transfers of important documents.

Enforced Encryption automatically encrypts any USB devices connected to network endpoints, ensuring data can only be saved on encrypted devices.

eDiscovery offers the possibility to scan sensitive data at rest stored on employees’ endpoints based on specific file types, predefined content, Regular Expressions, GDPR or HIPAA protected content and more. Based on the scan results, remediation actions can be taken such as encrypting or deleting data.

  • Vote For This Nomination

Browse Award Nominations