Director /Founder at a energy/utilities company with 51-200 employees
Real User
Top 20
2023-11-10T07:26:41Z
Nov 10, 2023
My recommendation for Kaspersky is highly positive. It supports all platforms, including Windows, Linux, and Mac. This broad compatibility across three different operating systems is a significant advantage. If you're someone using multiple platforms, Kaspersky proves to be an excellent and versatile option. Overall, I would rate it eight out of ten.
CoSoSys Endpoint Protector has improved significantly in recent years, with new features and enhancements that make it a leading data loss prevention solution. Data identification is essential for data protection, as CoSoSys Endpoint Protector cannot protect data it cannot identify. Overall, I rate the solution a six out of ten.
Overall, I would rate the solution an eight out of ten. Compared to other products in the market, it is a fairly good product. It's definitely not the cheapest product. So first gauge your requirement to the point. And make sure you are using this product to the optimum because it has a lot to offer. So if there is any feature that you're not using, I would suggest them to be 100% sure why you are buying it.
I advise potential users to figure out the actual use case for deployment. For example, will it be for a corporate network or remote users? This is because the policies you will deploy will be different. On a scale from one to ten, I would give Endpoint Protector a nine.
Learn what your peers think about Netwrix Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
End users need to understand what data loss prevention is; otherwise, they will select the wrong solution. It will become too difficult, and they won't know what to do with it. It's best to start off with the baselines of Endpoint Protector and then move up to more complex situations with network DLP-based options. I would rate this solution at nine on a scale from one to ten.
You won't face many issues with EPP. Based on my experience, I've not faced any issues other than those related to the upgrade. Sometimes, you might face minor issues for agents, but their support is awesome. They can easily fix an issue if you contact them. I would rate Endpoint Protector a nine out of 10.
Information Security Manager at a financial services firm with 5,001-10,000 employees
Real User
2021-04-21T17:00:00Z
Apr 21, 2021
We have a third-party that automatically encrypts confidential data transferred to USB storage devices. That's not a use case for us with Endpoint Protector. We exclusively use Windows. We do have instances of Linux, but from an endpoint point of view, it is exclusively Windows. As a business, we're never going to move into a Mac OS environment, so the fact that it supports Windows, Mac, and Linux wouldn't be one of our prerequisites. We looked at Endpoint Protector to make sure it supported Windows but the fact that it supports all platforms wasn't that important to us. Obviously, if it didn't work with Windows we wouldn't have used it, but from that point of view, it's not important for us now. We also don't use it to search for keywords that are important to our business. We have a third-party tool we've had in use for several years that classifies all our data and ensures that we have visibility of where data is and what type of data is at risk. I would rate Endpoint Protector an eight out of ten. I'm by no means an expert on the tool, however, it does appear to offer quite a large range of different functions within the toolset. Sometimes, it should try to focus on one thing rather than multiple things. Endpoint Protector does device control very well, which is why we use that particular function.
IT Manager at a marketing services firm with 51-200 employees
Real User
2021-04-13T22:12:00Z
Apr 13, 2021
My advice for anybody who is considering this product is that if they want something to protect data on both Macs and PCs then this is a very good choice. I have never worked with a product that is this easy to use. In summary, this is a good product and for now, I think that it has everything we need. It seems to be a perfect match for us. I would rate this solution a ten out of ten.
Information Technology Security Engineer at a comms service provider with 10,001+ employees
Real User
2021-04-07T19:13:00Z
Apr 7, 2021
My advice would be to do an extensive test on the DPI and detour features to make sure they're compatible with your environment before deploying to the whole company. Do an extensive pilot with all features turned on, and then evaluate the results based on performance decreased and accessibility restrictions or limitations. Deep packet inspection tends to break some of the internal capabilities. I would rate Endpoint Protector an eight out of ten.
Interactive Developer at Customer Communications Group, Inc.
Real User
2021-03-10T21:41:00Z
Mar 10, 2021
The biggest lesson that we have learned from using this product is that it can keep our computers and data from leaving the organization. That's extremely valuable for us, and I can see how it would be so for other companies, as well. My advice for anybody who is looking into implementing this product is to make sure that they understand the requirements for the environment ahead of time. Our biggest hurdle at the very beginning was that piece of hardware. You have to make sure that you have either the cost evaluated within the budget to have Endpoint host that solution, or alternatively, that extra piece of hardware to house an internal machine. In summary, this is a good product and I don't have any suggestions for improvement. We're new to the software and it is quite detailed. I've been able to do everything that I need to have done. I would rate this solution an eight out of ten.
My advice for anybody who is considering this product is that it's user-friendly, and everyone can easily understand the details about how it works. I am 100% confident in the security that I get from this product. Overall, I think that our requirements for basic control, including application control, have been met. I'm happy with the current product and I like the feature set. That said, if they provide additional features in the future then we will use them. I would rate this solution a ten out of ten.
IT Specialist at TresVista Financial Services Pvt. Ltd.
Real User
2021-02-24T21:07:00Z
Feb 24, 2021
This is a product that has improved over time. For example, in the past, there was no option to view the ports that were not added to your list. This is now supported and some of the problems we were facing have been stopped. Another example is that we are now able to block Teams and it works pretty well, whereas, in the past, we could not block uploads or downloads with Teams. Endpoint Protector has other features that we do not use, such as encryption. Instead, we deployed Sophos Encryption approximately six months ago for this purpose. The biggest lesson that I have learned from using this product is how to block uploads and downloads, as well as how to lock devices on users' machines. My advice for anybody who is considering it is that it is pretty simple to use. It's a friendly environment and it's easy to block devices, uploads, and other security issues. In summary, we have not faced many issues with Endpoint Protector and it is fulfilling our requirements, as we wanted. I would rate this solution a nine out of ten.
Security Architect at a tech services company with 11-50 employees
Real User
2021-02-16T23:41:00Z
Feb 16, 2021
In my private practice, I work with a lot of other firms, including some design firms that are Mac-based and, as they start to ramp up their security—because they're now becoming vectors of attack into their own customer bases—this product is definitely something that's on the radar. The ability to lock down a wide variety of USB devices is a secondary thing for us, because we do central policy management through another solution, so we have devices locked down through other policy engine mechanisms. But it is very convenient how CoSoSys has implemented it. That ability is definitely on the list for us but not at the top because for us, for policy regulatory compliance, we have to be able to tell when the data is moving in and out. That's the big thing we look at. In terms of Endpoint Protector's support for Windows, macOS, and Linux, in our case, Linux is a non-starter. We operate big-data clusters. DLP just doesn't work in that context. The information is broken out into multiple pieces and spread all over the environment and traverses between the nodes as part of computation. DLP can't work in that kind of technique. As far as the Windows mechanisms go, we currently don't have Windows workstations or any Windows assets. I'm a red-teamer by trade, one of the people who gets paid to break into places, and Windows has a shared authentication model, meaning that if I compromise one of your servers or workstations, I can basically move unfettered throughout your network. Our environment is a mix, a heterogeneous environment, so that attackers would have to adapt to every different point they want to compromise. Overall, Endpoint Protector really provides what you expect from it. There are no huge surprises one way or another. If you do your research, it's exactly what they say in their advertisements. They are not promising things they can't deliver. It does its job well.
I'm in a Windows environment, but I see it does MacOS, Windows, open sources. It has all of that on the platform. I'm not using the EasyLock USB Enforced Encryption app to automatically encrypt confidential data transferred to USB storage devices. I'm more monitoring it. But I have the option of force it to encrypt. Overall, I've never seen a solution with this much granularity. I didn't expect that. I did the demo, but it was only when I actually put in my environment and saw things and said, "Oh, wow." The reporting and the analysis have provided a lot of lessons learned. I didn't think I could get that much information.
Core Facilities & ICT Manager at MJB International LLC/ Al Masaood John Brown LLC
Real User
2020-12-16T06:53:00Z
Dec 16, 2020
Have a look at a good demo. You will see the benefits of the system. We only use it for device blocking, but there are so many other features. It depends what you want out of Endpoint Protector. An overall demo of its capabilities will let you see that it is worthwhile. There is an application out there that does multiple things in one go. We looked only at blocking off other devices, but we are rethinking that. Next year, we will be looking to buy usage of all the other features. It would be nice to have one application that does multiple things in one go, which normally other people would use several applications and software subscriptions to do the same thing. There are so many policies that we have not even had time to explore all of them. We don't use the EasyLock USB Enforced Encryption app to automatically encrypt confidential data transferred to USB storage devices. Instead, we have a secure online storage called FileShare, similar to Dropbox, but only for us. This way, people don't save it on their USB and actually have to send it directly. They can only then send it from the camera into their desktop or laptop. Then, from the laptop, they send it directly into our cloud system. I would rate this solution as a nine out of 10.
I'm just waiting for the renewal. I will not use it again in the future. DLP means blocking something, and I have not blocked anything. If you look at my configuration, I'm just reporting things in case something happens so I can fetch the logs and show them to management. But I don't want to face an embarrassing situation in front of management, because we are in the software service. We have proper SLAs. But if management comes to me and says, "Why didn't you guys block this?" I will not have any answer. If I knew that support was fantastic, that if I did something and I got stuck I could reach out to support and they would help me out immediately, then I would try. But if I deploy something and I come across some issues, I don't know how much time these guys will take: two days, three days, or five days. They have no SLA. We are a startup but we have proper SLAs with our end-users and clients. If CoSoSys made some improvements in their product and to their support, no doubt it could be very good. The product is forward-looking, in my opinion, which is a requirement nowadays. But because of the pathetic support and their internal team not doing proper testing of their product... Previously, people used to work only on Windows. But now people are mainly working on Mac or Linux. And now, because of the COVID-19 situation, people are working from home and it is necessary to deploy this product on endpoints to save company data.
IT Manager of Information Technology Operations Manager at astrafaelcomsys.com
Real User
2020-12-08T05:42:00Z
Dec 8, 2020
If you need a good DLP software to protect your data, I recommend that you go for CoSoSys without any second thought. Endpoint Protector by CoSoSys is a versatile solution. The important thing is to protect the data, and it does that well. I have blocked all USB connections from the users via CoSoSys Endpoint Protector. It's very easy to use, just download the database from the internet directly, and after getting the license key, we can install and connect to the internet. Once you purchase the license, it's very easy, and 4GB of RAM and 150GB hard disk is enough for this data. On a scale from one to ten, I would give Endpoint Protector by CoSoSys a ten.
I work in Samsung, so we have many subsidiaries all over the world. Gradually we are explaining to them that we are using this solution in Bangladesh and we are expecting more organizations in Samsung to use this solution. We have a platform to communicate with each other and share our experiences. So if any offices in Samsung begin using this process it would allow us to develop these things for Samsung more closely. On a scale of one to ten I would give Endpoint Protector an eight. Our experience using Endpoint Protector for security purposes is very good.
Content Aware Protection
Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.
Device Control
USB & peripheral port control
Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.
Enforced Encryption
Automatic USB encryption
Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.
...
I would recommend Netwrix Endpoint Protector to others. I'd rate the solution nine out of ten.
My recommendation for Kaspersky is highly positive. It supports all platforms, including Windows, Linux, and Mac. This broad compatibility across three different operating systems is a significant advantage. If you're someone using multiple platforms, Kaspersky proves to be an excellent and versatile option. Overall, I would rate it eight out of ten.
CoSoSys Endpoint Protector has improved significantly in recent years, with new features and enhancements that make it a leading data loss prevention solution. Data identification is essential for data protection, as CoSoSys Endpoint Protector cannot protect data it cannot identify. Overall, I rate the solution a six out of ten.
Overall, I would rate the solution an eight out of ten. Compared to other products in the market, it is a fairly good product. It's definitely not the cheapest product. So first gauge your requirement to the point. And make sure you are using this product to the optimum because it has a lot to offer. So if there is any feature that you're not using, I would suggest them to be 100% sure why you are buying it.
I rate the overall solution a seven out of ten.
I advise potential users to figure out the actual use case for deployment. For example, will it be for a corporate network or remote users? This is because the policies you will deploy will be different. On a scale from one to ten, I would give Endpoint Protector a nine.
Endpoint Protector has machine learning and AI, and it prevents 99% of ransomware. I would give Endpoint Protector a rating of nine out of ten.
End users need to understand what data loss prevention is; otherwise, they will select the wrong solution. It will become too difficult, and they won't know what to do with it. It's best to start off with the baselines of Endpoint Protector and then move up to more complex situations with network DLP-based options. I would rate this solution at nine on a scale from one to ten.
You won't face many issues with EPP. Based on my experience, I've not faced any issues other than those related to the upgrade. Sometimes, you might face minor issues for agents, but their support is awesome. They can easily fix an issue if you contact them. I would rate Endpoint Protector a nine out of 10.
We have a third-party that automatically encrypts confidential data transferred to USB storage devices. That's not a use case for us with Endpoint Protector. We exclusively use Windows. We do have instances of Linux, but from an endpoint point of view, it is exclusively Windows. As a business, we're never going to move into a Mac OS environment, so the fact that it supports Windows, Mac, and Linux wouldn't be one of our prerequisites. We looked at Endpoint Protector to make sure it supported Windows but the fact that it supports all platforms wasn't that important to us. Obviously, if it didn't work with Windows we wouldn't have used it, but from that point of view, it's not important for us now. We also don't use it to search for keywords that are important to our business. We have a third-party tool we've had in use for several years that classifies all our data and ensures that we have visibility of where data is and what type of data is at risk. I would rate Endpoint Protector an eight out of ten. I'm by no means an expert on the tool, however, it does appear to offer quite a large range of different functions within the toolset. Sometimes, it should try to focus on one thing rather than multiple things. Endpoint Protector does device control very well, which is why we use that particular function.
My advice for anybody who is considering this product is that if they want something to protect data on both Macs and PCs then this is a very good choice. I have never worked with a product that is this easy to use. In summary, this is a good product and for now, I think that it has everything we need. It seems to be a perfect match for us. I would rate this solution a ten out of ten.
My advice would be to do an extensive test on the DPI and detour features to make sure they're compatible with your environment before deploying to the whole company. Do an extensive pilot with all features turned on, and then evaluate the results based on performance decreased and accessibility restrictions or limitations. Deep packet inspection tends to break some of the internal capabilities. I would rate Endpoint Protector an eight out of ten.
The biggest lesson that we have learned from using this product is that it can keep our computers and data from leaving the organization. That's extremely valuable for us, and I can see how it would be so for other companies, as well. My advice for anybody who is looking into implementing this product is to make sure that they understand the requirements for the environment ahead of time. Our biggest hurdle at the very beginning was that piece of hardware. You have to make sure that you have either the cost evaluated within the budget to have Endpoint host that solution, or alternatively, that extra piece of hardware to house an internal machine. In summary, this is a good product and I don't have any suggestions for improvement. We're new to the software and it is quite detailed. I've been able to do everything that I need to have done. I would rate this solution an eight out of ten.
My advice for anybody who is considering this product is that it's user-friendly, and everyone can easily understand the details about how it works. I am 100% confident in the security that I get from this product. Overall, I think that our requirements for basic control, including application control, have been met. I'm happy with the current product and I like the feature set. That said, if they provide additional features in the future then we will use them. I would rate this solution a ten out of ten.
This is a product that has improved over time. For example, in the past, there was no option to view the ports that were not added to your list. This is now supported and some of the problems we were facing have been stopped. Another example is that we are now able to block Teams and it works pretty well, whereas, in the past, we could not block uploads or downloads with Teams. Endpoint Protector has other features that we do not use, such as encryption. Instead, we deployed Sophos Encryption approximately six months ago for this purpose. The biggest lesson that I have learned from using this product is how to block uploads and downloads, as well as how to lock devices on users' machines. My advice for anybody who is considering it is that it is pretty simple to use. It's a friendly environment and it's easy to block devices, uploads, and other security issues. In summary, we have not faced many issues with Endpoint Protector and it is fulfilling our requirements, as we wanted. I would rate this solution a nine out of ten.
In my private practice, I work with a lot of other firms, including some design firms that are Mac-based and, as they start to ramp up their security—because they're now becoming vectors of attack into their own customer bases—this product is definitely something that's on the radar. The ability to lock down a wide variety of USB devices is a secondary thing for us, because we do central policy management through another solution, so we have devices locked down through other policy engine mechanisms. But it is very convenient how CoSoSys has implemented it. That ability is definitely on the list for us but not at the top because for us, for policy regulatory compliance, we have to be able to tell when the data is moving in and out. That's the big thing we look at. In terms of Endpoint Protector's support for Windows, macOS, and Linux, in our case, Linux is a non-starter. We operate big-data clusters. DLP just doesn't work in that context. The information is broken out into multiple pieces and spread all over the environment and traverses between the nodes as part of computation. DLP can't work in that kind of technique. As far as the Windows mechanisms go, we currently don't have Windows workstations or any Windows assets. I'm a red-teamer by trade, one of the people who gets paid to break into places, and Windows has a shared authentication model, meaning that if I compromise one of your servers or workstations, I can basically move unfettered throughout your network. Our environment is a mix, a heterogeneous environment, so that attackers would have to adapt to every different point they want to compromise. Overall, Endpoint Protector really provides what you expect from it. There are no huge surprises one way or another. If you do your research, it's exactly what they say in their advertisements. They are not promising things they can't deliver. It does its job well.
In terms of feature parity between Windows and macOS, with Windows it takes a lot longer to install, but that's really the main difference.
I'm in a Windows environment, but I see it does MacOS, Windows, open sources. It has all of that on the platform. I'm not using the EasyLock USB Enforced Encryption app to automatically encrypt confidential data transferred to USB storage devices. I'm more monitoring it. But I have the option of force it to encrypt. Overall, I've never seen a solution with this much granularity. I didn't expect that. I did the demo, but it was only when I actually put in my environment and saw things and said, "Oh, wow." The reporting and the analysis have provided a lot of lessons learned. I didn't think I could get that much information.
Have a look at a good demo. You will see the benefits of the system. We only use it for device blocking, but there are so many other features. It depends what you want out of Endpoint Protector. An overall demo of its capabilities will let you see that it is worthwhile. There is an application out there that does multiple things in one go. We looked only at blocking off other devices, but we are rethinking that. Next year, we will be looking to buy usage of all the other features. It would be nice to have one application that does multiple things in one go, which normally other people would use several applications and software subscriptions to do the same thing. There are so many policies that we have not even had time to explore all of them. We don't use the EasyLock USB Enforced Encryption app to automatically encrypt confidential data transferred to USB storage devices. Instead, we have a secure online storage called FileShare, similar to Dropbox, but only for us. This way, people don't save it on their USB and actually have to send it directly. They can only then send it from the camera into their desktop or laptop. Then, from the laptop, they send it directly into our cloud system. I would rate this solution as a nine out of 10.
I'm just waiting for the renewal. I will not use it again in the future. DLP means blocking something, and I have not blocked anything. If you look at my configuration, I'm just reporting things in case something happens so I can fetch the logs and show them to management. But I don't want to face an embarrassing situation in front of management, because we are in the software service. We have proper SLAs. But if management comes to me and says, "Why didn't you guys block this?" I will not have any answer. If I knew that support was fantastic, that if I did something and I got stuck I could reach out to support and they would help me out immediately, then I would try. But if I deploy something and I come across some issues, I don't know how much time these guys will take: two days, three days, or five days. They have no SLA. We are a startup but we have proper SLAs with our end-users and clients. If CoSoSys made some improvements in their product and to their support, no doubt it could be very good. The product is forward-looking, in my opinion, which is a requirement nowadays. But because of the pathetic support and their internal team not doing proper testing of their product... Previously, people used to work only on Windows. But now people are mainly working on Mac or Linux. And now, because of the COVID-19 situation, people are working from home and it is necessary to deploy this product on endpoints to save company data.
If you need a good DLP software to protect your data, I recommend that you go for CoSoSys without any second thought. Endpoint Protector by CoSoSys is a versatile solution. The important thing is to protect the data, and it does that well. I have blocked all USB connections from the users via CoSoSys Endpoint Protector. It's very easy to use, just download the database from the internet directly, and after getting the license key, we can install and connect to the internet. Once you purchase the license, it's very easy, and 4GB of RAM and 150GB hard disk is enough for this data. On a scale from one to ten, I would give Endpoint Protector by CoSoSys a ten.
I work in Samsung, so we have many subsidiaries all over the world. Gradually we are explaining to them that we are using this solution in Bangladesh and we are expecting more organizations in Samsung to use this solution. We have a platform to communicate with each other and share our experiences. So if any offices in Samsung begin using this process it would allow us to develop these things for Samsung more closely. On a scale of one to ten I would give Endpoint Protector an eight. Our experience using Endpoint Protector for security purposes is very good.