Try our new research platform with insights from 80,000+ expert users
IT Manager of Information Technology Operations Manager at astrafaelcomsys.com
Real User
A versatile and user friendly solution with great customer support
Pros and Cons
  • "The role-based access features for the teams that administer it is good."
  • "Customization could be a lot better."

What is our primary use case?

I use the Endpoint Protector to monitor what the users or employees are doing. I monitor employee data like what they are sending, who they are sending it to, and what kind of data they're sending.

If I want to check that data, I can download it. I am checking the backup of the Endpoint Protector data weekly. If I want to monitor previous things, I can do that with the backup of the software.

It's important to create policies to protect my company data. If I create a policy that only our attachments go through our domain, only our attachments get through and not from Google, Yahoo, and others. It's blocking attachments effectively while providing me with an alert if I included an alert policy.

What is most valuable?

Endpoint Protector by CoSoSys has some valuable features. The role-based access features for the teams that administer it is good.

The granularity of the policies is good. The versatility of exit points is good. It also supports both macOS and Windows.

What needs improvement?

A lot of things can be improved. Especially customization could be a lot better.

Sometimes there are issues like when I write a policy to block finance sites. It also blocks the banking sites I have not included. Sometimes it also blocks commands I send to the machine while using Matrix software. 

Whenever this happens, I have to go into the software and choose the packet inspection option or something similar. Then I have to send the command again to the machine, and if it doesn't work, I have to contact the support team. These are some of the issues I have dealt with.

For how long have I used the solution?

I have been using the Endpoint Protector by CoSoSys for over six months. 

Buyer's Guide
Netwrix Endpoint Protector
August 2025
Learn what your peers think about Netwrix Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.

What do I think about the stability of the solution?

The stability, reliability, and availability of Endpoint Protector by CoSoSys is good.

What do I think about the scalability of the solution?

Endpoint Protector by CoSoSys is scalable and that's why we use it.

How are customer service and support?

The support is excellent. I got responses promptly, just like the vendor stated. If I email or call support, they are ready to assist me.

Which solution did I use previously and why did I switch?

Previously, we used Symantec Endpoint Protection, but the customer support wasn't good. I also inquired about Symantec Endpoint Protection and found out from our local vendors that the support wasn't good, and they recommended CoSoSys.

I installed CoSoSys in my system and tested it for two to three days. I made some policies like data blocking policies, mail blocking policies, attachment blocking policies, and all kinds of policies we need in our company. I tested it and felt very good about it and purchased the license.

How was the initial setup?

The initial setup and deployment are very easy. You can download the database directly, and you can purchase the license. After that, you can download the ETP client to install it. That's all you have to do.

The deployment takes about two hours. The company had a deployment plan and strategy, and I did the rest. 

What about the implementation team?

I implemented the Endpoint Protector by CoSoSys all by myself. 

What's my experience with pricing, setup cost, and licensing?

The price of Endpoint Protector by CoSoSys is more or less the same as other competing solutions.

Which other solutions did I evaluate?

I have installed Symantec Endpoint Protection previously, and the response wasn't good. That's why I moved to CoSoSys DLP. Before CoSoSys DLP, I checked another software, but I found it wasn't a DLP.

What other advice do I have?

If you need a good DLP software to protect your data, I recommend that you go for CoSoSys without any second thought. 

Endpoint Protector by CoSoSys is a versatile solution. The important thing is to protect the data, and it does that well. I have blocked all USB connections from the users via CoSoSys Endpoint Protector. 

It's very easy to use, just download the database from the internet directly, and after getting the license key, we can install and connect to the internet. Once you purchase the license, it's very easy, and 4GB of RAM and 150GB hard disk is enough for this data.

On a scale from one to ten, I would give Endpoint Protector by CoSoSys a ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Mohammad Amir Hossain - PeerSpot reviewer
Head of IT Infrastructure at a tech vendor with 10,001+ employees
Real User
Top 10
Stable and works well across multiple platforms
Pros and Cons
  • "It is easy to manage the DLP between MacOS and Linux."
  • "In Linux a user can remove a getent anytime. There is no control there on the file structure in Linux. So if this solution could give us information on what users removed in the dashboard, it would help us."

What is our primary use case?

We have a multi-platform environment, mainly Linux and Mac.

We installed a client in our client PCs and we have a management server in the same network. So we control the workstation through that management control, we mainly enable the Endpoint Protector function for blocking USBS and other physical ports, and we have some policies to restrict data passing from one PC to another PC. Those are the main features we are using.

How has it helped my organization?

Endpoint Protector almost fulfills our requirements; by 60%. Compared to other solutions we feel better with CoSoSys. 

We are a research center, so control is very important for us. We don't have any in-house solutions for Mac and Linux, so CoSoSys is a very important tool for us to control and ensure our internal security. This is a very important function.

During lockdown time we needed to deploy some new policies and rules. We faced problems all the time. We communicated with CoSoSys'  technical teams and we generated support tickets. They supported us as much as possible. During that period they helped us a lot.

Because we are using it for security purposes, there is no direct impact value, but it is saving our data. That is very important. It's almost like an insurance policy.

What is most valuable?

We are happy and satisfied with the solution. When we face any problem, we contact the CoSoSys technical team support directly and they support us as much as possible.

CoSoSys provides a single platform to support Windows, MacOS and Linux. We are using hybrid deployment docs, but we're only using Linux and a Mac, not Windows.

It manages the DLP. It is easy to manage the DLP between MacOS and Linux. This is very important for us because we don't have any sort of in-house solution for data collection for the Linux and Mac environment. We are fully dependent on CoSoSys.

We are not using encryption, because the encryption depends on the server and on many other things, which will cause us to face problems.

Additionally, it has granularity features to copy, paste, and do other things.

Between PCs, there is no control, but we are interested when data is transferred to outside the PCs. At those times we use CoSoSys. CoSoSys can control most of this part.

It has absolutely, 100% helped to reduce important data from going out of our organization.

What needs improvement?

Some CoSoSys features do need to be improved. For example, in Linux a user can remove a getent anytime. There is no control there on the file structure in Linux. So if this solution could give us information on what users removed in the dashboard, it would help us. If CoSoSys applied this sort of improvement, it would help us a lot.

For how long have I used the solution?

We have been using Endpoint Protector for two to three years.

What do I think about the stability of the solution?

Endpoint Protector is a very stable product.

We manage it directly and when we face any issues, we directly contact CoSoSys. There is no third party. When purchasing we use a third party for payment and other purposes as it is overseas payment, so we can't pay directly.

We are licensing from a reseller, but all our support is directly through CoSoSys.

What do I think about the scalability of the solution?

Right now we have about 400 developers using this solution, with one person managing it and one as backup. It does not require too much manpower to manage this team.

How are customer service and technical support?

Their support is very good. We have had very good experiences with them.

They have been responsive and they're generally knowledgeable. They always support us when we request it.

How was the initial setup?

The initial setup is simple, not complex.

The initial setup did not take much time. It is a very lightweight application and it runs very smoothly. It actually took less than half a minute to setup.

You just need to install and sync with the management service and it work in the background as an agent. It is automatically up and working in the background.

The first time we needed to configure and set up synchronization and the next times, for any changes we may need, we need to apply it in the server and sync with both of them.

Prior to deploying it, we had some strategies. We set our purpose, our policy, and then based on this policy, we deployed it.

What's my experience with pricing, setup cost, and licensing?

We think the pricing is very reasonable.

Which other solutions did I evaluate?

We searched Digital Guardian and some other solutions. We found CoSoSys is the most suitable for us.

CoSoSys completely allows combined work in Windows, Linux, and Mac and the synchronization between server and client is very easy. In addition, creating exceptions is very easy in CoSoSys compared to other solutions.

What other advice do I have?

I work in Samsung, so we have many subsidiaries all over the world. Gradually we are explaining to them that we are using this solution in Bangladesh and we are expecting more organizations in Samsung to use this solution.

We have a platform to communicate with each other and share our experiences. So if any offices in Samsung begin using this process it would allow us to develop these things for Samsung more closely.

On a scale of one to ten I would give Endpoint Protector an eight. Our experience using Endpoint Protector for security purposes is very good.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Netwrix Endpoint Protector
August 2025
Learn what your peers think about Netwrix Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
Consultant at a tech services company with 501-1,000 employees
Reseller
Feature-rich, easy to set up, and protects our data against different kinds of loss
Pros and Cons
  • "The most valuable features are Device Control, Content-Aware Protection, Enforced Encryption, and eDiscovery."
  • "If CoSoSys comes up with a suite of Host DLP, along with Network DLP and SaaS DLP, it will cover all of the aspects of a DLP solution."

What is our primary use case?

We have been implementing and designing solutions with CoSoSys as a part of the Host level DLP (Data leak prevention) solution. Our major cause is to provide a solution to protect data being leaked by their users, knowingly, via any application or software like web browsers, email, SaaS applications, drive, etc., or any hardware devices through MTP/PTP (mobile phones, wifi, USB, cd/floppy, printer, or ay such devices

We have successfully implemented this solution in multiple customer environments, PAN India.

How has it helped my organization?

We have implemented this solution for protecting our data that may be leaked by users for their personal use.

Our concern for data protection came into the picture during the pandemic phase (COVID-19), where users were performing critical business operations from their homes. At that moment, it was observed that data needs to be protected.

We were searching for data protection solutions on Google during the time, where Endpoint Protector popped up. We connected with their team, implemented the same in our environment initially for testing purposes, and then implemented it in our environment and then in our customer's network.

What is most valuable?

The most valuable features are Device Control, Content-Aware Protection, Enforced Encryption, and eDiscovery.

Device control is a module of CoSoSys EPP where we get granular rights and controls for protection of data getting leaked from any hardware devices like USB drives, Storage media, Wi-Fi, printers, etc.

Content-Aware Protection prevents users from uploading or sharing the data or files/documents with others through any application or software like web-browsers, email, file-sharing, or remote application software. It can even prevent users from taking and/or sharing screenshots or clipboard data.

Enforced Encryption is used when you want to have only permitted or restrictive devices connecting to user systems.

eDiscovery is another module where an IT admin can find a file/resource/path/folder present in a user's system.

What needs improvement?

As a host DLP solution, it has granular controls and features. It misses Network level DLP and SaaD DLP offerings. If CoSoSys comes up with a suite of Host DLP, along with Network DLP and SaaS DLP, it will cover all of the aspects of a DLP solution.

Various other products provide us a complete suite of solutions covering Host, Network, and SaaS aspects. Examples of these are Forcepoint and Digital Guardian.

For how long have I used the solution?

I have been deploying and presenting this solution to multiple customers, since April 2020.

How are customer service and technical support?

There are areas where CoSoSys supports more than other vendors do. For example, they offer support for Windows, Mac, and Linux platforms, which not all of the other vendors provide.

How was the initial setup?

The initial setup and installation of the server were very simple.

What about the implementation team?

We implemented in-house using the admin guide that was provided.

What's my experience with pricing, setup cost, and licensing?

This is a budget-friendly solution that covers all the aspects of host-level DLP.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. My company is providing solutions to customers needing DLP solutions.
PeerSpot user
reviewer2587170 - PeerSpot reviewer
IT Engineer at a tech services company with 51-200 employees
Real User
Top 5
Gain control over endpoint security with enhanced visibility and device management
Pros and Cons
  • "The most valuable aspects of the solution is the device control, which manages any portable device connected to the endpoint, and content-aware protection, which controls data in motion from the endpoint to outside, like when users try to upload data to a web browser or an instant messaging application."
  • "Currently, for additional applications that need monitoring by the EPP, a request must be made to their technical support. It would be beneficial to add a feature allowing users to manually add applications for monitoring without depending on the vendor."

What is our primary use case?

The primary use case is to prevent data loss and data breaches from employees using endpoints such as workstations or notebooks.

How has it helped my organization?

They gain a lot of visibility over file transfers and user activities. For example, a company can detect when a user copies sensitive company files to an external drive. With this visibility, security is enhanced, and any unauthorized attempt to handle sensitive data can be blocked.

What is most valuable?

The most valuable aspects of the solution is the device control, which manages any portable device connected to the endpoint, and content-aware protection, which controls data in motion from the endpoint to outside, like when users try to upload data to a web browser or an instant messaging application.

What needs improvement?

Currently, for additional applications that need monitoring by the EPP, a request must be made to their technical support. It would be beneficial to add a feature allowing users to manually add applications for monitoring without depending on the vendor.

For how long have I used the solution?

I have been working with Endpoint Protector for approximately five years.

How are customer service and support?

Generally, they are very helpful when we escalate an issue. However, the time difference can make some discussions and follow-ups challenging as their working hours are based on U.S. time, while we work on Indonesian time. There's a seven-hour difference.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with any other DLP solution before Netwrix Endpoint Protector.

What's my experience with pricing, setup cost, and licensing?

I am not sure about the pricing since I handle the technical aspects, not the pricing.

What other advice do I have?

I would recommend Netwrix Endpoint Protector to others.

I'd rate the solution nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Download our free Netwrix Endpoint Protector Report and get advice and tips from experienced pros sharing their opinions.
Updated: August 2025
Product Categories
Data Loss Prevention (DLP)
Buyer's Guide
Download our free Netwrix Endpoint Protector Report and get advice and tips from experienced pros sharing their opinions.