Protecting data on
more than 30 million devices

+1-888-576 6177
  

Support Center


Need help? Our step-by-step support center is available here.
  

Documentation


Endpoint Protector - User Manual    version 4.4.0.4    - pdf 11.4 MB
My Endpoint Protector - User Manual    version 4.4.0.3    - pdf 4.8 MB
Endpoint Protector - Mobile Device Management User Manual    version 1.0.0.9    - pdf 7.6 MB
Endpoint Protector - Hardware Appliance User Manual    version 4.0.0.5    - pdf 2.4 MB
Endpoint Protector - Virtual Appliance User Manual    version 4.1.0.2    - pdf 5.0 MB
Endpoint Protector - Amazon Web Services EC2 User Manual    version 1.0.0.1    - pdf 2.0 MB
Endpoint Protector - Active Directory Deployment Guide    version 1.0.0.3    - pdf 1.1 MB
Endpoint Protector Basic - User Manual    version 3.7    - pdf 990.9 Kb
EasyLock - User Manual    version 2.0.0.0    - pdf 735.1 Kb
  

DLP and BYOD Comics



BYOD Adventures - Comic Series
New series of comics raising awareness on BYOD, Mobile Application Management, Mobile Device Management and Data Loss Prevention for MAC.


  

Knowledge Base


Can the Endpoint Protector Client's icon be hidden from the system tray?
Yes. Endpoint Protector offers several functionality modes for users, clients and machines. In Stealth mode and Transparent mode the system tray icon is automatically hidden so the PC user will not be able to see that Endpoint Protector is installed on the used PC. For more information, please consult the User Manual.

  

Articles & White Papers


Protect Data Residing on Employees’ Smartphones and Tablets    - pdf 662.9 Kb
Identifying and Preventing the Top Data and Network Security Threats of 2011    - pdf 1.2 MB
Endpoint Protection - Secure Passage through a World of Technological Threats    - pdf 125.4 Kb
Easy Guide to Comprehensive IT Security Strategies for SMBs     - pdf 118.6 Kb
  

Reviews

   1 2 3
Real-world friendly
(Endpoint Protector & EasyLock)

After confirming security capability, ease of use and cost typically arise as the first elements most Mac businesses explore when contemplating security and encryption choices. Businesses will find Endpoint Protector capable on all fronts.



  

Testimonials

   1 2 3 4 5 6 7 8 9 10


Endpoint Protector 4 is one the best DLP products around. Not only is the product complete, innovative and industry leading, its interface is easy to use and yet the product is so powerful. Furthermore the team from CoSoSys is so cooperative and supportive, helping us deploy and manage Endpoint Protector in 1 day. For us, not only must the product be good, which Endpoint Protector 4 is, but the tech support team is very important. Team CoSoSys was wonderful from the start and even helped us on issues that were not related to their product. Well done CoSoSys for a great product and great people!
Resham Ganglani, Business Development Director, Halo Data International

  

Screenshots


Endpoint Protector
   
Endpoint Protector Basic
   
EasyLock
   



  

Videos & Tutorials


Mobile Device Management (MDM) for iOS and Android with Endpoint Protector
Content Aware Protection to prevent sensitive data leakage through all possible exit points
Endpoint Protector Virtual Appliance for Device Control and DLP
Endpoint Protector Hardware Appliance for Device Control and Endpoint Security
Endpoint Protector for Device Control explained in plain English

  

Data Sheets


Endpoint Protector - Datasheet     EN | DE | FR | ES | KR | RO | PL | HU     - pdf 1.1 MB
Endpoint Protector - Mobile Device Management Datasheet     EN | DE | FR | ES | KR     - pdf 1.1 MB
Endpoint Protector - Content Aware Protection Datasheet     EN | DE | KR     - pdf 1.1 MB
Endpoint Protector - DLP for Mac OS X Datasheet     EN | DE | FR | KR     - pdf 364.0 Kb
Endpoint Protector Basic - Datasheet     EN | DE     - pdf 392.5 Kb
EasyLock - Datasheet     EN | DE     - pdf 341.0 Kb
  

Case Studies


Spectrum of Hope (United States of America) and Endpoint Protector 4
Spectrum of Hope protects patients and improves security and compliance with CoSoSys’ Endpoint Protector 4

Mafilm Audio (Hungary) and Endpoint Protector 4
Mafilm Audio prevents data leakage on Macs with the Endpoint Protector Hardware Appliance

Mafilm Audio (Magyarország) és Endpoint Protector 4 (in Hungarian)
A Mafilm Audio Endpoint Protector Hardver Appliance-t használ az adatszivárgs megelőzésére

Zeppelin (Germany) and Endpoint Protector Appliance
Zeppelin Airship Technology secures portable devices and ports with the Endpoint Protector Hardware Appliance

Zeppelin (Germania) și Endpoint Protector Appliance (in Romanian)
Zeppelin NT securizează dispozitivele portabile și porturile cu Endpoint Protector Hardware Appliance

JJB Sports (United Kingdom) and Endpoint Protector
Large UK sports retailer uses Endpoint Protector to proactively manage data loss and theft risks

Paymark (New Zealand) and Endpoint Protector
Leading electronic payments provider proactively manages risks posed by portable storage devices

ABB (Germany) and Secure it Easy
ABB Logistics Center Europe now protects its USB ports effectively

University Freiburg (Germany) and Endpoint Protector
University benefits from proactive protection against portable storage devices

Vitacom (Romania) and Endpoint Protector
Leading Romanian distributor of electronics effectively prevents breaches and outbreaks caused by portable storage devices

Vitacom (România) și Endpoint Protector (in Romanian)
Unul dintre cei mai mari distribuitori de produse electronice din România previne eficient breșele de securitate și infecțiile cu viruși cauzate de dispozitivele de stocare portabile

  

Partner Case Studies


Caudex Services (United Kingdom) and Endpoint Protector 4
Caudex Services Ltd. enables its customers to prevent data loss with Endpoint Protector

Day Zero Security (United Kingdom) and Endpoint Protector 4
Day Zero Security picked Endpoint Protector to be their DLP and MDM recommendation for SMBs and Enterprises

Shore2Shore IT (United Kingdom) and Endpoint Protector 4
Shore2Shore IT Ltd. Provides CoSoSys’ Endpoint Protector Data Loss Prevention and Mobile Device Management solutions

  

Customers





  

Newsletter


Feel free to subscribe (or unsubscribe) yourself to the newsletter. Please fill in the form:
  Salutation:
  First Name:
  Last Name:
  E-mail: *
  Company:
   
   
*   Required fields

Press Kit

Logos, Bios, Company profile, Screenshots and more.


Comics

Testimonials

Are you a satisfied Endpoint Protector user? Please submit your feedback using this form:

Name *

E-mail *
Job title

Company
Testimonial *



This technology is designed to certify that certain endpoint devices are trustworthy to protect sensitive and confidential data in transit. This will assure even if a device is lost or stolen that all data stored on it is encrypted.
IT Business Edge - Endpoint Protector Review
Touted as an all-in-one device offering that works straight out of the box without the need for complicated server setup, the device secures endpoints with just a few clicks of the mouse.

Case Studies
Paymark and Endpoint Protector
Leading electronic payments provider proactively manages risks posed by portable storage devices




Zeppelin and Endpoint Protector Appliance
Zeppelin Airship Technology secures portable devices and ports with the Endpoint Protector Hardware Appliance

Testimonials

Endpoint Protector 2008 gives us the ability to manage the controlled use of USB devices, external hard drives, FireWire devices, CD/ DVD-Readers/ Writers and many other potentially harmful endpoint devices, while also stopping malware, viruses and other unwanted data intrusions.
Carl Bigby, Network Security Manager, SearchAmerica

Can the Endpoint Protector Client's icon be hidden from the system tray?
Yes. Endpoint Protector offers several functionality modes for users, clients and machines. In Stealth mode and Transparent mode the system tray icon is automatically hidden so the PC user will not be able to see that Endpoint Protector is installed on the used PC. For more information, please consult the User Manual.