Try our new research platform with insights from 80,000+ expert users
reviewer1497009 - PeerSpot reviewer
People Operations Manager at a tech services company with 11-50 employees
Real User
Main dashboard is intuitive, and offline temporary passcode solution is really easy to use
Pros and Cons
  • "It also provides us with the ability to lock down a wide variety of USB devices, which is pretty important because we don't want certain data accessed. It does a really good job when it comes to the versatility of the exit points it supports, making sure that important data does not leave our organization."
  • "There are times when the server needs to be updated, and it would help if I got a notification for when the newest version comes out, because at the moment, I'm going in every now and then and checking. Sometimes it comes out and I didn't know it had come out."

What is our primary use case?

We use it primarily for endpoint protection. We have to be SOC 2 compliant. We have a number of standards that we have to abide by for HIPAA reasons and SOC 2 reasons, which is why we initially put it in place, but we mostly use it for endpoint protection and MDM.

How has it helped my organization?

We have access to some healthcare data, at times, which means that we have to follow very strict guidelines. So we need the endpoint protection.

What is most valuable?

I like the main dashboard. It's very intuitive. 

The offline temporary passcode solution is really easy to use for both the backend administrator and the users.

The granularity of the policies that you can create is pretty sufficient. We haven't had to make any super-granular policies. I understand what its capabilities are, and it is really nice to know that if we have to crack down and be a little more strict on our policies, Endpoint Protector provides those features.

It also provides us with the ability to lock down a wide variety of USB devices, which is pretty important because we don't want certain data accessed. It does a really good job when it comes to the versatility of the exit points it supports, making sure that important data does not leave our organization.

Endpoint Protector also provides a single platform to support Windows, macOS, and Linux, although we don't use Linux, we just use Windows and Mac. It makes it pretty easy for me to manage DLP in such a hybrid environment. I find it intuitive. It's pretty vital that it supports Windows and macOS because we use both types of computers in our company. It provides Zero day protection for macOS.

What needs improvement?

There are times when the server needs to be updated, and it would help if I got a notification for when the newest version comes out, because at the moment, I'm going in every now and then and checking. Sometimes it comes out and I didn't know it had come out. It would be super-helpful if I got a notification saying, "It's time to update the server."

Buyer's Guide
Netwrix Endpoint Protector
March 2025
Learn what your peers think about Netwrix Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,388 professionals have used our research since 2012.

For how long have I used the solution?

I've been using CoSoSys for a little more than two years.

What do I think about the stability of the solution?

It hasn't changed much since we started using it, so I haven't really found myself having to adapt or learn anything new. It has served all the purposes that we've purchased it for, so it's pretty stable.

What do I think about the scalability of the solution?

We have such a small team that scalability hasn't really been an issue at this point. It's easy enough for me to manage it on my own. We have fewer than 50 employees, and somewhere between 50 and 60 computers, so I haven't really encountered any scalability issues. We've adopted it 100 percent.

How are customer service and support?

For the most part, their technical support has been really responsive and good about setting up time to go over things. They have been pretty timely, in general.

Which solution did I use previously and why did I switch?

We didn't have anything in place before.

How was the initial setup?

It's really easy to install. I had to do most of them in person. At the time, most of us were in the office, so I just had folks drop off their computers at my desk for 15 minutes while I set it up. Some took less than 15 minutes. We do have some remote workers, and I used Zoom which has a remote screen option.

It was done over the course of a couple of days, because I had 50-something devices to do.

I don't know if Endpoint Protector has this kind of feature, because I didn't need to use it. But if I had more than 50 computers, it would have been really time-consuming to do the implementation. It wasn't that bad for me, but any more than 50 computers would be a little bit of a hassle.

What was our ROI?

Our return is that it serves the purpose that we need it for.

What's my experience with pricing, setup cost, and licensing?

The pricing model changed the last time that we renewed, but it's reasonable compared to what's out there.

Which other solutions did I evaluate?

Choosing a solution was a discussion that happened before I was in the mix. I don't know if other solutions were discussed before this one was decided upon. I do know that it was something that another employee had used before and she recommended it. I don't know if a lot of other research went on or they just said, "Okay, since someone knows it and they've used it, we'll use it too."

What other advice do I have?

In terms of feature parity between Windows and macOS, with Windows it takes a lot longer to install, but that's really the main difference.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Alexandru Hagea - PeerSpot reviewer
Network and Security Lead at Accesa
MSP
Top 5
A comprehensive solution with a user-friendly console, making it easy to navigate and create policies
Pros and Cons
  • "One unique feature is drive encryption. We have portable devices, and they have a password vault. If you transfer any data to your device, you can use the password vault to protect it."
  • "It needs to improve in terms of policy customization."

What is our primary use case?

CoSoSys Endpoint Protector is a unique solution for Linux devices. It has a user-friendly console that makes it easy to navigate and create policies.

What is most valuable?

CoSoSys is supported on Mac devices. One unique feature is drive encryption. We have portable devices, and they have a password vault. If you transfer any data to your device, you can use the password vault to protect it.

What needs improvement?

CoSoSys Endpoint Protector has many predefined classifiers for data identifiers. It needs to improve in terms of policy customization. I observed that fewer policies were available, which needs to be improved so that users can modify and view policies based on their requirements and create their templates. The audit part could be added. With our current architecture, we have a lot of alerts, for example, when a user requests access to a policy temporarily for a business requirement. We can make an automatic request mechanism that would work for this type of scenario, which would help us sleep better at night.

For how long have I used the solution?

I have been using CoSoSys Endpoint Protector for no longer than six months. We are using the latest version of the solution.

What do I think about the stability of the solution?

The product is stable apart from the policies because it is limited.

What do I think about the scalability of the solution?

The solution is scalable. Despite the limited resources, customers are looking for some platforms for Mac and Linux, but I have tried many products on the market. For example, Forcepoint and Trend Micro are there.

Which solution did I use previously and why did I switch?

We have Forcepoint for endpoint data leakage protection and this scale and footprint for network protection. It depends on business requirements.

How was the initial setup?

The initial setup is easy and seamless.

What's my experience with pricing, setup cost, and licensing?

The solution’s pricing is a normal industry standard and depends on customers and salespersons.

What other advice do I have?

CoSoSys Endpoint Protector has improved significantly in recent years, with new features and enhancements that make it a leading data loss prevention solution. Data identification is essential for data protection, as CoSoSys Endpoint Protector cannot protect data it cannot identify. Overall, I rate the solution a six out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Netwrix Endpoint Protector
March 2025
Learn what your peers think about Netwrix Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,388 professionals have used our research since 2012.
Shiv Ram - PeerSpot reviewer
Assistant Manager at Bharti Airtel Limited
Real User
Top 5Leaderboard
A stable solution that scans all documents residing on desktops, laptops, and servers, identifying and localizing IPs
Pros and Cons
  • "The console is friendly and it supports Mac."
  • "They have many predefined classifiers in terms of data identifiers, and they should improve this."

What is our primary use case?

It was the unique seventy-point I used for Linux devices. 

What is most valuable?

The console is friendly and it supports Mac.

What needs improvement?

They have many predefined classifiers in terms of data identifiers, and they should improve this. 

As per the market perspectives, the data is driven and the usage is totally modernized. Digitally, there are lots of inventions and the data usage depends on the cloud.

For how long have I used the solution?

I have been using CoSoSys Endpoint Protector for six months. 

What do I think about the stability of the solution?

The solution is stable. 

What do I think about the scalability of the solution?

The solution is scalable. 

How was the initial setup?

The initial setup is easy. 

What's my experience with pricing, setup cost, and licensing?

The pricing depends on the customers. 

What other advice do I have?

I rate the overall solution a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1560321 - PeerSpot reviewer
Information Security Manager at a financial services firm with 5,001-10,000 employees
Real User
Enables us to block and blacklist all types of USB devices
Pros and Cons
  • "The versatility regarding the exit point Endpoint Protector supports in making sure that important data doesn't leave our organization is vital for us. In the industry that we're in, data breaches are a significant concern. While our staff is contractually required to maintain confidentiality and they're all very aware that they shouldn't try and transfer company data of different classifications elsewhere to non-company devices, there's a risk."
  • "Sometimes, it should try to focus on one thing rather than multiple things. Endpoint Protector does device control very well, which is why we use that particular function."

What is our primary use case?

I work for a financial services company. As a consequence, we work with multiple lenders and lender clients; essentially banks and building societies. There's a requirement in this industry for tight controls from an information security point of view. For many years we've had industry requirements to deploy a number of technical controls to secure things like device control.

Prior to using Endpoint Protector, we used Ivanti Device Control. However, from the UI point of view, it was a bit of a dated product, and some of the functionality wasn't brilliant. We also took a recommendation from our service provider, who had been using this product with other customers, and as such we deployed CoSoSys Endpoint Protector. We primarily have one single purpose, which is to secure all of our endpoints, mostly laptops. We have a very small number of client computers as well, but we primarily use it to block all removable media and all USB points on the laptops.

As a business, we don't enable and support the use of removable media. We do have a small number of use cases where that is allowed, primarily within our IT team, but they are the exception. As such, every single USB port is blocked across the business with Endpoint Protector to mitigate the risk of somebody intentionally, accidentally, or for whatever reason being tricked into inputting their USB drive into our network which would then cause potentially a risk to the confidentiality, integrity, and availability of our data.

We have a contractual requirement for us to have a tool like CoSoSys. It mitigates risk for us as a business by enabling us to be sure that no one can exfiltrate data from our company via USB media or be infected by malware by plugging a device into an endpoint.

We only use that one particular feature. I believe there are other features available but I don't believe we pay for the other elements of functionality of the software. There are other features like DLP within the software, however, we have a suite of additional tools within our business to control those other elements so we use CoSoSys exclusively for device control.

We only use it for a very small use case. It certainly has a wide range of functionality, although, we don't use the vast majority of the functionality because we don't pay for it or because we have other tools in place that are specific for a certain purpose.

What is most valuable?

The granularity of the policies that we can create is good. We block USB media. One of the reasons we left our previous provider is because of the lack of this functionality. We have built some custom rules to make exceptions for staff members that should be able to use USB media. Of course, the ability to amend and write policies is far more granular than the previous product that we used. Switches, disabling and blocking Bluetooth, weren't available with our previous supplier. 

The feature that locks down USB devices means that if you plug removable media into any of our USB drives, it blocks it. As we block, we blacklist all the types of USB devices, and the cloud running trail blocks that. If someone puts the USB drive in, it will block them from opening that drive or even registering that drive. If they want to make an exception, they have to make a formal request to do so, and that can be made either by email or through an application to our IT desk.

The versatility regarding the exit point Endpoint Protector supports in making sure that important data doesn't leave our organization is vital for us. In the industry that we're in, data breaches are a significant concern. While our staff is contractually required to maintain confidentiality and they're all very aware that they shouldn't try and transfer company data of different classifications elsewhere to non-company devices, there's a risk. If we didn't have Endpoint Protector in place, they could plug in a USB drive, copy a file onto the USB drive, and then take that onto their personal computer or share it externally, whether that be with the press or the public, etc. This tool stops that from happening. It means employees are unable to share files and exfiltrate data via that channel.

We have other controls to stop other channels. One of the biggest concerns for us as a business is employees sharing data via the internet, dragging files and confidential information from our computer drives into Dropbox or into Webmail, et cetera. We have other controls and tools to stop that. But Endpoint Protector is used exclusively to stop USB media.If we didn't have Endpoint Protector in place, they could plug in a USB drive, copy a file onto the USB drive, and then take that onto their personal computer or share it externally, whether that be with the press or the public, etc. This tool stops that from happening. It means employees are unable to share files and exfiltrate data via that channel.

We have other controls to stop other channels. One of the biggest concerns for us as a business is employees sharing data via the internet, dragging files and confidential information from our computer drives into Dropbox or into Webmail, et cetera. We have other controls and tools to stop that. But Endpoint Protector is used exclusively to stop USB media.

For how long have I used the solution?

I have been using Endpoint Protector for 18 months.

What do I think about the stability of the solution?

The stability is very comfortable. We have no qualms or concerns. There have not been any incidents or issues with it not working, or any problems that I'm aware of. Any kind of such problems would be raised to my attention and discussion review, and there haven't been any concerns raised by users or with our IT service desk. There has been no concern there.

What do I think about the scalability of the solution?

Scalability is about the policies. We could deploy it simply to larger groups of people as and when required. There's a procedure where we deploy using an RMM tool. It's easy to deploy.

At present, we don't have plans to increase usage. We have a number of different controls and requirements, and we have specialist tools for each of the different requirements. We're also trying to move towards a Microsoft stack where possible because we have so many different tools in use. Microsoft doesn't do device control. 

How are customer service and technical support?

I have never personally been involved with technical support. There was joint deployment with our MSP. There have been no problems, so I think it's fairly positive.

Which solution did I use previously and why did I switch?

We were previously using Ivanti.

How was the initial setup?

The setup was quite straightforward and didn't cause any issues. But I wasn't involved. Our IT system team deployed it around 18 months ago. I was quite new to the business at the time. It went relatively smoothly, there were no hiccups, and there were no deployment problems.

It took under a few weeks to implement. It was not a couple of weeks of solid work. We deployed it slowly within a UAT testing environment and only on a small number of laptops. Once we were comfortable that the config was working as expected, then we deployed our tool to other users. We deployed the end client to all endpoints using an RMM tool we use from SolarWinds.

What about the implementation team?

We have a managed service provider who we use to support some of our IT needs. They were the ones who recommended the products and they would have been the ones who actually implemented the product and do much of the actual deployment with our IT service desk.

The implementation required around 2-3 staff members. It was one person from the MSP and two people in-house who would have worked on that project to deploy it. It was a normal project team for the deployment of that size.

Day-to-day maintenance only requires one or two employees. We don't have somebody looking at it daily, but our service desk will review it, update it, and amend things within the tool as and when required. It really runs by itself, it's not a huge amount of maintenance, which is a good thing.

What was our ROI?

ROI is very hard to quantify but Endpoint Protector is ultimately priceless. If device control wasn't in place, any single data breach that could occur as a consequence of a USB device being able to transfer data externally could result, for us as a business, in considerable loss, and considerable fines. There are massive fines for data breaches in the UK.

Data breaches could have a very significant reputational impact on our business. It's very difficult to quantify, but we haven't had any of these breaches. If we didn't have Endpoint Protector in place, we would be at a higher risk.

What's my experience with pricing, setup cost, and licensing?

The pricing is very fair. No concerns. We don't have massive budgets, we're quite a small company, but we don't have small budgets either. I think it's quite competitive.

I don't believe there are additional costs in addition to standard licensing. 

Which other solutions did I evaluate?

We reviewed Ivanti Device Control, which is the previous tool we were using, and we compared it with Endpoint Protector's product set. Then we compared the prices and compared the features, and decided to go with Endpoint Protector over the previous supplier.

What other advice do I have?

We have a third-party that automatically encrypts confidential data transferred to USB storage devices. That's not a use case for us with Endpoint Protector.

We exclusively use Windows. We do have instances of Linux, but from an endpoint point of view, it is exclusively Windows. 

As a business, we're never going to move into a Mac OS environment, so the fact that it supports Windows, Mac, and Linux wouldn't be one of our prerequisites. We looked at Endpoint Protector to make sure it supported Windows but the fact that it supports all platforms wasn't that important to us. Obviously, if it didn't work with Windows we wouldn't have used it, but from that point of view, it's not important for us now.

We also don't use it to search for keywords that are important to our business. We have a third-party tool we've had in use for several years that classifies all our data and ensures that we have visibility of where data is and what type of data is at risk.

I would rate Endpoint Protector an eight out of ten. I'm by no means an expert on the tool, however, it does appear to offer quite a large range of different functions within the toolset. Sometimes, it should try to focus on one thing rather than multiple things. Endpoint Protector does device control very well, which is why we use that particular function.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Sivakumar Mahathevan - PeerSpot reviewer
Head of MSP Division at Halodata
Reseller
Leaderboard
Is user-friendly, easy to manage and set up, and is stable and scalable
Pros and Cons
  • "We like that content-aware and device controls can easily be managed. They're not complicated. You don't need to be a rocket scientist to understand them."
  • "Because it is only an Endpoint Protector at this point in time, it does not have a network DLP component. There's only an endpoint DLP component. In the future, it would be good if a network DLP component could be embedded and extended to have network DLP capabilities."

What is our primary use case?

We are using it for data loss prevention, basically managing all our employees throughout the region. Our servers are installed in our HQ in Singapore. We use device control, content-aware management or content-aware protection, and enforce encryption.

What is most valuable?

We like that content-aware and device controls can easily be managed. They're not complicated. You don't need to be a rocket scientist to understand them.

As for overall experience, Endpoint Protector is very user-friendly.

What needs improvement?

Because it is only an Endpoint Protector at this point in time, it does not have a network DLP component. There's only an endpoint DLP component. In the future, it would be good if a network DLP component could be embedded and extended to have network DLP capabilities.

For how long have I used the solution?

We've been using Endpoint Protector for more than seven years.

What do I think about the stability of the solution?

It is stable.

What do I think about the scalability of the solution?

It is very easily scalable.

In my company alone, we have close to 100 users. They are scattered across three countries in the region. We manage for our end partners who have about 15,000 users.

How are customer service and support?

I am satisfied with Endpoint Protector support services. It is exceptional.

How was the initial setup?

It is super easy to set up. It takes less than one hour to set up the whole system, and you can actually get the users to get on the basic policies and tools in under a couple of hours as well.

What's my experience with pricing, setup cost, and licensing?

The pricing is very competitive and is cheaper in comparison to that of other solutions. It makes it an easy decision to go with EPP for the data loss prevention infrastructure.

Which other solutions did I evaluate?

In terms of the ease of deployment, the ease of management, and the ease of actually getting the basis of Endpoint Protector to move on, EPP is one of the easiest. I have seen more difficult ones, including those with setups that can take days and weeks.

In terms of the infrastructure needed here, EPP only requires one VM to run the whole infrastructure, unlike McAfee or Symantec that require a database server with an operating system. You will need a file server and an operating server, which will make the infrastructure itself too expensive. With EPP, you will need just one VM server, and you can start your data loss prevention just like that.

What other advice do I have?

End users need to understand what data loss prevention is; otherwise, they will select the wrong solution. It will become too difficult, and they won't know what to do with it. It's best to start off with the baselines of Endpoint Protector and then move up to more complex situations with network DLP-based options.

I would rate this solution at nine on a scale from one to ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Mohammad Amir Hossain - PeerSpot reviewer
Head of IT Infrastructure at a tech vendor with 10,001+ employees
Real User
Top 10
Stable and works well across multiple platforms
Pros and Cons
  • "It is easy to manage the DLP between MacOS and Linux."
  • "In Linux a user can remove a getent anytime. There is no control there on the file structure in Linux. So if this solution could give us information on what users removed in the dashboard, it would help us."

What is our primary use case?

We have a multi-platform environment, mainly Linux and Mac.

We installed a client in our client PCs and we have a management server in the same network. So we control the workstation through that management control, we mainly enable the Endpoint Protector function for blocking USBS and other physical ports, and we have some policies to restrict data passing from one PC to another PC. Those are the main features we are using.

How has it helped my organization?

Endpoint Protector almost fulfills our requirements; by 60%. Compared to other solutions we feel better with CoSoSys. 

We are a research center, so control is very important for us. We don't have any in-house solutions for Mac and Linux, so CoSoSys is a very important tool for us to control and ensure our internal security. This is a very important function.

During lockdown time we needed to deploy some new policies and rules. We faced problems all the time. We communicated with CoSoSys'  technical teams and we generated support tickets. They supported us as much as possible. During that period they helped us a lot.

Because we are using it for security purposes, there is no direct impact value, but it is saving our data. That is very important. It's almost like an insurance policy.

What is most valuable?

We are happy and satisfied with the solution. When we face any problem, we contact the CoSoSys technical team support directly and they support us as much as possible.

CoSoSys provides a single platform to support Windows, MacOS and Linux. We are using hybrid deployment docs, but we're only using Linux and a Mac, not Windows.

It manages the DLP. It is easy to manage the DLP between MacOS and Linux. This is very important for us because we don't have any sort of in-house solution for data collection for the Linux and Mac environment. We are fully dependent on CoSoSys.

We are not using encryption, because the encryption depends on the server and on many other things, which will cause us to face problems.

Additionally, it has granularity features to copy, paste, and do other things.

Between PCs, there is no control, but we are interested when data is transferred to outside the PCs. At those times we use CoSoSys. CoSoSys can control most of this part.

It has absolutely, 100% helped to reduce important data from going out of our organization.

What needs improvement?

Some CoSoSys features do need to be improved. For example, in Linux a user can remove a getent anytime. There is no control there on the file structure in Linux. So if this solution could give us information on what users removed in the dashboard, it would help us. If CoSoSys applied this sort of improvement, it would help us a lot.

For how long have I used the solution?

We have been using Endpoint Protector for two to three years.

What do I think about the stability of the solution?

Endpoint Protector is a very stable product.

We manage it directly and when we face any issues, we directly contact CoSoSys. There is no third party. When purchasing we use a third party for payment and other purposes as it is overseas payment, so we can't pay directly.

We are licensing from a reseller, but all our support is directly through CoSoSys.

What do I think about the scalability of the solution?

Right now we have about 400 developers using this solution, with one person managing it and one as backup. It does not require too much manpower to manage this team.

How are customer service and technical support?

Their support is very good. We have had very good experiences with them.

They have been responsive and they're generally knowledgeable. They always support us when we request it.

How was the initial setup?

The initial setup is simple, not complex.

The initial setup did not take much time. It is a very lightweight application and it runs very smoothly. It actually took less than half a minute to setup.

You just need to install and sync with the management service and it work in the background as an agent. It is automatically up and working in the background.

The first time we needed to configure and set up synchronization and the next times, for any changes we may need, we need to apply it in the server and sync with both of them.

Prior to deploying it, we had some strategies. We set our purpose, our policy, and then based on this policy, we deployed it.

What's my experience with pricing, setup cost, and licensing?

We think the pricing is very reasonable.

Which other solutions did I evaluate?

We searched Digital Guardian and some other solutions. We found CoSoSys is the most suitable for us.

CoSoSys completely allows combined work in Windows, Linux, and Mac and the synchronization between server and client is very easy. In addition, creating exceptions is very easy in CoSoSys compared to other solutions.

What other advice do I have?

I work in Samsung, so we have many subsidiaries all over the world. Gradually we are explaining to them that we are using this solution in Bangladesh and we are expecting more organizations in Samsung to use this solution.

We have a platform to communicate with each other and share our experiences. So if any offices in Samsung begin using this process it would allow us to develop these things for Samsung more closely.

On a scale of one to ten I would give Endpoint Protector an eight. Our experience using Endpoint Protector for security purposes is very good.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Dan Pham Ich - PeerSpot reviewer
Assistant It Manager at New system vietnam
Real User
Prevents 99% of ransomware
Pros and Cons
  • "Endpoint Protector's best features are its protection and user-friendliness."
  • "Endpoint Protector would be improved with more DLP templates."

What is our primary use case?

I use Endpoint Protector to protect our end server.

What is most valuable?

Endpoint Protector's best features are its protection and user-friendliness.

What needs improvement?

Endpoint Protector would be improved with more DLP templates.

For how long have I used the solution?

I've been using Endpoint Protector for two to three months.

What do I think about the stability of the solution?

Endpoint Protector works perfectly.

What do I think about the scalability of the solution?

Endpoint Protector is scalable.

How was the initial setup?

The initial setup is easy with a private cloud.

What other advice do I have?

Endpoint Protector has machine learning and AI, and it prevents 99% of ransomware. I would give Endpoint Protector a rating of nine out of ten.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
BDM at Hercules Infotech Pvt Ltd
Real User
Has an easy setup process and good technical support services
Pros and Cons
  • "The product's most valuable feature is its ability to support Linux operating systems."
  • "CoSoSys Endpoint Protector's network-level DLP and integration with mail servers need improvement."

What is most valuable?

The product's most valuable feature is its ability to support Linux operating systems.

What needs improvement?

CoSoSys Endpoint Protector's network-level DLP and integration with mail servers need improvement.

For how long have I used the solution?

We have been using CoSoSys Endpoint Protector for five or six years.

What do I think about the stability of the solution?

We never encountered any bugs or issues. The product has been running for many years since we set it up with the server.

What do I think about the scalability of the solution?

We have 10 CoSoSys Endpoint Protector users in our organization.

How are customer service and support?

The technical support services are good.

How was the initial setup?

CoSoSys Endpoint Protector can be deployed on the cloud and on-premises. It takes 15 minutes to set up the server and get it running. The process is easy.

What was our ROI?

The product is worth the investment.

What's my experience with pricing, setup cost, and licensing?

The product has average pricing.

What other advice do I have?

The product supports Linux systems and multiple source codes. I advise others to go for it. I rate it a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: customer/partner
PeerSpot user
Buyer's Guide
Download our free Netwrix Endpoint Protector Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2025
Product Categories
Data Loss Prevention (DLP)
Buyer's Guide
Download our free Netwrix Endpoint Protector Report and get advice and tips from experienced pros sharing their opinions.