For VendorsBlog
Login
CoSoSys Endpoint Protector

Add to comparison

CoSoSys Endpoint Protector

1
Pitch
On-premise full DLP for Enterprise and Small-Medium businesses, available as hardware and virtual appliance, or as cloud infrastructure.

Features of product

Проблемы Problem Solving
  • Risk of attacks by hackers
  • Risk of data loss or damage
  • Risk or Leaks of confidential information
  • Unauthorized access to corporate IT systems and data
Ценности Business Values
  • Ensure Security and Business Continuity
  • Reduce Costs
Матрица сравнения с конкурентами Matrix of comparison with competitors
Описание

About Product

Easy to use, cross-platform Data Loss Prevention tools that ensure seamless control of USB and peripheral ports, scan data in motion and data at rest, enforce encryption and offer enterprise mobility management.

Content Aware Protection

Scanning data in motion

Monitor, control and block file transfers. Detailed control through both content and context inspection.

Device Control

USB & peripheral port control

Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.

Enforced Encryption

Automatic USB encryption

Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.

eDiscovery

Scanning data at rest

Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans

Mobile Device Management

Enterprise Mobility Management

Secure, locate and manage mobile devices. Push apps and network settings or remotely wipe data.

Характеристики

Characteristics

Network protection N/A
Endpoint protection
Cloud support N/A
Enterprise email control N/A
Webmail control N/A
Instant messengers control N/A
Internet traffic control
Encrypted traffic control N/A
External/removable devices control
Policy templates

Features of users

Роли заинтересованных сотрудников Stakeholders Roles
  • Chief Information Officer
  • Chief IT Security Officer
  • IT Security and Risk Management
Признаки применимости Company requirements
  • GDPR Compliance
  • Internet access is available for employees
Продающие истории Use Cases

Free Data Security Products

Продающия история

Easily protect your data with our free tools for Data Loss Prevention, Device Control, Content Aware Protection, MDM, and AutoRun Disable for home users and small businesses. Read here 

Work flow chart

Схема