Endpoint Protector 5
Gartner Recognised, Award-Winning Data Loss Prevention.


Endpoint Protector is a full DLP and MDM solution which prevents users from removing sensitive data outside the company via portable storage devices.

The Endpoint Protector 5 Suite contains; Content-Aware Protection, eDiscovery, and Device Control modules, all of which are available for Windows, MacOS, and Linux.

 

 

 

 

 

 

 

CoSoSys Recognized for its Endpoint Protector Solutions in the February 2017 Gartner Magic Quadrant for Enterprise Data Loss Prevention
Read more

Module Overview:

 

For Windows, MacOS, and Linux:
Strong device use policies will ensure proactive protection for a safer work environment with removable storage devices.

 

 

For Windows, MacOS, and Linux:
It offers detailed control over sensitive data leaving the computers and endpoints in the network. Through efficient content inspection, transfers of important company documents will be logged and reported. Based on the company policy, file transfers will be allowed or blocked.

 


For Windows, MacOS, and Linux:
Endpoint Protector eDiscovery for data at rest scans sensitive data stored on employees’ endpoints. Setup scans based on file types, predefined or custom content, file name, Regular Expressions or HIPAA protected content.

 

 

For Android, iOS, and macOS:
Enforce strong security policies and access detailed tracking and asset management of all smartphones or tablets. Increase productivity by monitoring and pushing applications, network settings and more.

 

 


For Windows, MacOS,
An Encrypted area on your USB flash drive.
Password Protected and Encrypted to AES 256 bit, automatically deployed to non encrypted USB devices.

 

 

Appliance:
– Virtual Appliance
– Hardware Appliance

 

The Endpoint Protector Virtual Appliance is suitable for business of all sizes. It is available in VMX, PVA, OVF, OVA, XVA and VHD formats, being compatible with the most popular virtualization tools.

Simply install the Appliance in a Virtual Environment, import the Licenses and deploy the Endpoint Protector Clients to your machines. Device use is instantly controlled, Content Aware Protection, eDiscovery, and Mobile Device Management Policies are only a few clicks away.

 

 

 

 

It comes with everything preinstalled and the choice of different models is available for any organization’s needs.

Installation is not required. After pushing the power button, assign an IP to deploy the Endpoint Protector Clients.

 

 

DLP Blacklists and Whitelists

 

Content Aware Protection