Download our FREE whitepaper on data loss prevention best practices. Download Now

6 Frequently Asked Questions about Endpoint Protector

Data protection has become a hot topic and Data Loss Prevention (DLP) solutions are growing in popularity as businesses are searching for ways to reduce the risk of sensitive data leaking outside the company. When it comes to choosing an enterprise DLP solution there are more aspects to take into account, from understanding where the company’s data exists to data classification, accounting for shadow IT, and more.

What has become clear by now, is that next generation Data Loss Prevention products must be simple to deploy and simple to use. At Endpoint Protector, we have always taken a human-centric approach. Our aim was to develop powerful tools that are not only highly effective in protecting data from loss and theft, but are also easy to implement and use. This article is a consolidated list of common questions and answers, that is intended for users who are new to the product, but can be of use to all users.

Check out the 6 most Frequently Asked Questions about Endpoint Protector.

1. How long does the implementation take?

There is a myth related to Data Loss Prevention that says it is really complex and difficult to implement. Endpoint Protector proves the contrary as an out-of-the-box, cross-platform solution with a straightforward and fast deployment.

The trial version of the product can be downloaded from the Endpoint Protector website at any time; this version enables all features for up to 50 computers for 30 days. The installation of the Virtual Appliance and the configuration of a basic set of policies usually takes just 1 or 2 hours. After the trial version, if the client finds that Endpoint Protector is suitable for the organization and for its requirements, the trial Virtual Appliance can be used further on. For this, a set of licenses is sent which can be loaded to the appliance.

Apart from Virtual Appliance, Endpoint Protector can be hosted in the customer’s own Amazon Web Services (AWS) account, in Microsoft Azure, and on Google Cloud as well, with fast implementation time.

2. What resources do I need to run a DLP?

When choosing a DLP solution, besides the DLP licenses, the total cost of implementation is an important factor as well; some DLP products require more additional tools, others less. For example, several solutions on the market need multiple servers, including a Windows server and a database server, which also mean additional costs. Endpoint Protector can be deployed as a Virtual Appliance, which is one of the simplest and easiest ways to set up a DLP.

3. What are the main benefits of using Endpoint Protector Virtual Appliance?

With Virtual Appliance the setup and deployment of the solution are fast. Furthermore, it is simple and easy to use, compatible with the most popular virtualization tools and it is distributed in different formats and for different platforms. See the complete list of the supported virtual environments here.

For implementing Endpoint Protector via Virtual Appliance it is needed only one server and a hypervisor of your choice to run the product. Another advantage is that the solution, the database, and the logs are in the same virtual image.

4. How long is Endpoint Protector’s learning curve?

Besides having an intuitive and easy-to-use web management interface, the solution has a short learning curve for administrators, thus busting the myth of DLP being complicated. Even non-specialized personnel can easily understand and use our solution. Endpoint Protector doesn’t require extensive training and it can be set up in less than 30 days.

5. How do I know if a user tries to uninstall the Endpoint Protector agent?

Besides specific DLP capabilities, performance and price, the security of the solution itself and the anti-tampering measures are also key features that make a DLP solution complete and effective. In order to ensure continuous data protection, our solution is equipped with different protection mechanisms and security features, including client uninstall protection and client integrity check. With these measures, the uninstallation of the Endpoint Protector client by a user can be prevented, even if the user is an administrator for the computer. Furthermore, the client sends an alert to the Endpoint Protector server and notifies the Endpoint Protector administrator about the action.

6. What is the EPP Client’s footprint?

It is a commonly met situation, that businesses are worried about the impact a DLP solution has on the computers’ performance. A big advantage Endpoint Protector has, is its minimum footprint on the client. Even with all modules installed, it won’t slow down the computer’s performance, having a maximum of 5% on the CPU spike.

 

explainer-c_learning

Download our free ebook on
Data Loss Prevention Best Practices

Helping IT Managers, IT Administrators and data security staff understand the concept and purpose of DLP and how to easily implement it.

In this article:

    Request Demo
    check mark

    Your request for Endpoint Protector was sent!
    One of our representatives will contact you shortly to schedule a demo.

    * Your privacy is important to us. Check out our Privacy Policy for more information.