What is Endpoint Protector?
Discover, monitor, and protect your sensitive data with Endpoint Protector, advanced multi-OS data loss prevention.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceEndpoint Protector Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on Endpoint Protector.
89 Likeliness to Recommend
2
Since last award
95 Plan to Renew
80 Satisfaction of Cost Relative to Value
2
Since last award
Emotional Footprint Overview
+90 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love Endpoint Protector?
Pros
- Efficient Service
- Caring
- Security Protects
- Continually Improving Product
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Endpoint Support
Multiple Enforcement Actions
Activity Monitoring Alerts
Real Time Scanning
Encryption and Decryption Support
Data Discovery (DLP)
Forensic Analysis Support
Environment Support
Email and IM Support
Centralized Reporting Engine
Customizable and Pre Canned Policies
Vendor Capability Ratings
Ease of Implementation
Usability and Intuitiveness
Quality of Features
Ease of Data Integration
Business Value Created
Breadth of Features
Product Strategy and Rate of Improvement
Ease of IT Administration
Vendor Support
Availability and Quality of Training
Ease of Customization
Endpoint Protector Reviews
Hilson S.
- Role: Information Technology
- Industry: Healthcare
- Involvement: End User of Application
Submitted Oct 2022
Reliable Approach for Absolute Safety.
Likeliness to Recommend
What differentiates Endpoint Protector from other similar products?
Endpoint Protector provides a collective security options for every system
What is your favorite aspect of this product?
Endpoint Protector gives insightful report in case some challenges we encountered.
What do you dislike most about this product?
Endpoint Protector takes appropriate analytics and system security is well maintained.
What recommendations would you give to someone considering this product?
Endpoint Protector is highly efficient with suitable business analysis
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Enables Productivity
Moues-Lee T.
- Role: Human Resources
- Industry: Other
- Involvement: Business Leader or Manager
Submitted Jun 2022
Endpoint protector is a great endpoint solution.
Likeliness to Recommend
What differentiates Endpoint Protector from other similar products?
The device management will be terribly granular – by device, by user, by computer, by group. It mechanically finds devices so you’ll add rights and policies to those devices or regarding those devices. There’s also one time Passwords – that i believe last as long as you retain them in the console, therefore can be re-used, despite the name. That is nice for a sure admin to own so I will get my job done.
What is your favorite aspect of this product?
The agent is simple to install/ deploy. The most effective part is that you just can unlock any device additionally without a web connection, that is very vital to us as several of our engineers add remote or desert areas. I can solely extremely suggest this software.
What do you dislike most about this product?
The absence of Okta integration and a Splunk app is what I most dislike regarding endpoint Protector. The UI might use some rewording and work flow changes. If they had some wizards to be ready to copy a Windows policy to a mac policy to a Linux policy that might be huge however those options are still lacking. There’ a touch of automation that the endpoint protector by CoSoSys might do better on.
What recommendations would you give to someone considering this product?
Although you select to host the server in your cloud setting you have to do it with their AMI that disables SSH access for you. Therefore you’re dependent on them for continuing support. Had we known this we would have simply hosted through them from the get-go.
Pros
- Saves Time
- Continually Improving Product
- Performance Enhancing
- Enables Productivity
Salmine H.
- Role: Information Technology
- Industry: Technology
- Involvement: End User of Application
Submitted Jun 2022
It is a complete application for DLP.
Likeliness to Recommend
What differentiates Endpoint Protector from other similar products?
I like however granular the settings are. We can create policies for users, computers, devices, and so on this permits us to make terribly specific policies to allow least privilege to end users. They were conjointly very competitive with pricing compared to alternative service suppliers within the same space.
What is your favorite aspect of this product?
End point protector moves with the times, not solely with support of widely used OS’ however its options and GUI set it higher than its competition. Its wonderful that such a complex was created with simplest interface. Controls are clear and principally is used with none issues. Documentation of the merchandise is additionally smart and have thorough details, one among the key issue is Deep packet inspection. This enables the organization like us to observe , what’ going out of the company. Although we’ve got also started using a feature , wherever we can lock the laptop/Desktop, USB and secondary storage device. Reportage is another thing t
What do you dislike most about this product?
The UI isn’t the best, weird sometimes. Additionally sending emails concerning pretected devices suddenly stops (after a couple of weeks). Once you reboot, all of a sudden hundreds of emails arrive. Devices, that you ought to unlock for an endpoint, show up “green” (because they’re already unsecured for others) but are still locked for this specific endpoint.
What recommendations would you give to someone considering this product?
If you’re searching for a straightforward one-stop answer for observance of the most valuable info and belongings of your business, you’ll love using endpoint protector by CoSoSys.
Pros
- Continually Improving Product
- Performance Enhancing
- Efficient Service
- Inspires Innovation