We performed a comparison between CoSoSys Endpoint Protector and Forcepoint Data Loss Prevention based on real PeerSpot user reviews.
Find out in this report how the two Data Loss Prevention (DLP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is easy to manage the DLP between MacOS and Linux."
"The versatility regarding the exit point Endpoint Protector supports in making sure that important data doesn't leave our organization is vital for us. In the industry that we're in, data breaches are a significant concern. While our staff is contractually required to maintain confidentiality and they're all very aware that they shouldn't try and transfer company data of different classifications elsewhere to non-company devices, there's a risk."
"There are effectively two areas of DLP to look at from a technical perspective. One is how it performs the pickup of information traversing the system and the other is how the policy engine, which analyzes the data, works. On the first aspect, CoSoSys is probably best of breed for macOS because they're reasonably well-integrated into the operating system. They're looking at the file system operations level, not at the execution level."
"We like that content-aware and device controls can easily be managed. They're not complicated. You don't need to be a rocket scientist to understand them."
"The device control is a big deal for us because we can actually lock out removable drives and different types of hardware. It allows us to have better control over what end-users plug into their computers, and we can have deny lists and tighten our security posture."
"The core of its value lies in obtaining logs remotely and exercising control over what employees can or cannot use."
"The interface is pretty user-friendly, neatly explained, and simple to use."
"There are a lot of features, but the main feature is that I can use a device serial number to unlock any particular machine or for all machines. If I have a phone, like a Samsung phone, I can whitelist that specific phone for full access wherever it is plugged into any of our devices. This is the same with a USB, because most USBs come in bulk and have the same serial number. I can then whitelist that particular USB to be read-write with full access."
"Technical support has been helpful."
"I did not experience any crashes. The solution has been stable in my usage."
"The solution offers very good sensitive data protection."
"It was mostly stable."
"We don't require a lot of downtime, but when we do then we are getting proper support with no issue."
"We like the ability to customize our requirements and rules, as well as its ease of use and management. It also has a cloud feature and proxy functionality."
"I like that you can quickly create policies and enforce them in a matter of minutes."
"One of the most valuable features is being able to see file movement, where files are going. Every week we review the files. It can identify software codes, so we code files and we know where they're going and who's doing what. It gives us visibility."
"One of the areas where there is room for improvement is support. It takes time for them to respond. They need to respond on time. Instead of sending an email, I think it would be very helpful to say, 'Let's set up a WebEx to see what's really going on,' instead of the back and forth of email."
"Sometimes, it should try to focus on one thing rather than multiple things. Endpoint Protector does device control very well, which is why we use that particular function."
"It would be better if they had an inbound restriction feature. For example, I work out of my home from my personal computer. All my policies can be deployed while working. When I am done, I should be able to use my machine as my personal machine, and all these policies should be waived. In the next release, I want time bound restriction of the policies because most of these users were working out of home and using their personal computers."
"Because it is only an Endpoint Protector at this point in time, it does not have a network DLP component. There's only an endpoint DLP component. In the future, it would be good if a network DLP component could be embedded and extended to have network DLP capabilities."
"They have many predefined classifiers in terms of data identifiers, and they should improve this."
"I would like to see an alert feature that when a system is started, it checks to make sure that the client has the most up-to-date policies."
"The reports and analysis could be improved. There could be a little more data, and the logs could be a little more granular, but it's nothing major. It does what it needs to do, and it's fine."
"When you want to uninstall and reinstall, there are a lot of issues. You have to do a lot of workarounds to reinstall Endpoint Protector. This is a major issue that we have constantly because we still have old systems with XP. While there are only very few, we need to run them because there are machines attached that only run on XP. When we need to uninstall and reinstall on XP or Windows 10, we have serious issues left in the Registry Editor everywhere. There is a lot of manual interference to get the reinstallation to work. For the uninstallation of Endpoint Protector, they need to work on this so it doesn't leave any leftovers behind."
"Their discovery or the way they discover the data at risk can also be improved. There are many database servers that are not supported by Forcepoint."
"Everything takes a long time, as it does in every software company, especially since COVID. That is something I notice with every product I use."
"The ease of deployment wasn't as flexible as Digital Guardian."
"The post-optical character recognization feature could be improved because it only really works on documents with some length (at least three paragraphs)."
"An area for improvement in Forcepoint Data Loss Prevention is the complex UI and policy deployment. You have to find the policies, and then designing the policies is also tricky."
"Forcepoint Data Loss Prevention can improve by having an uninstall option for the client or restart of a client agent can be controlled from the server. This feature is missing which is available with other solutions."
"There's zero Forcepoint presence in West Africa. Customers typically like having these things close to them. It would help if they had a presence here. Right now, Forcepoint West Africa has been administered from South Africa. Because of this, customers can't access premium support in our region."
"I would like to see the product extended into the cloud as a single solution."
More Forcepoint Data Loss Prevention Pricing and Cost Advice →
CoSoSys Endpoint Protector is ranked 8th in Data Loss Prevention (DLP) with 25 reviews while Forcepoint Data Loss Prevention is ranked 2nd in Data Loss Prevention (DLP) with 51 reviews. CoSoSys Endpoint Protector is rated 8.4, while Forcepoint Data Loss Prevention is rated 8.0. The top reviewer of CoSoSys Endpoint Protector writes "Makes management and upgrades easier and provides better control". On the other hand, the top reviewer of Forcepoint Data Loss Prevention writes "DLP great for encryptions; tech support is quite helpful". CoSoSys Endpoint Protector is most compared with Symantec Data Loss Prevention, Safetica ONE, Microsoft Purview Data Loss Prevention, Zscaler DLP and GTB Technologies Inspector, whereas Forcepoint Data Loss Prevention is most compared with Microsoft Purview Data Loss Prevention, Digital Guardian, Symantec Data Loss Prevention, Zscaler DLP and GTB Technologies Inspector. See our CoSoSys Endpoint Protector vs. Forcepoint Data Loss Prevention report.
See our list of best Data Loss Prevention (DLP) vendors.
We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.