Resources

A collection of resources regarding CoSoSys product: Endpoint Protector. The section includes User Manuals, Deployment Guides, Data Sheets, White Papers, Case Studies, Tutorials & Videos, Infographics, and more.

Data sheets

Endpoint Protector
Endpoint Protector - Technical Account Manager
EN

White Papers & Ebooks

Data Loss Prevention (DLP) tools have become an essential part of data protection strategies. Highly flexible and adaptable to any company size, DLP solutions can be tailored to different needs and support compliance efforts with new data protection regulations. This whitepaper outlines the best practices companies should adopt when implementing DLP tools.

In the last two decades, Macs gradually entered the workplace, first as a specialized tool for creatives and, increasingly, as a device of choice in the enterprise. Its rise owes much to the introduction of policies that allowed employees to use their own devices in the workplace or to choose their work technology.

Companies in the legal industry collect and use highly sensitive data as part of the services they offer. Thus, there is a lot at stake for them in terms of damages in case a data leak or data loss occurs. These include litigation strategies, lost billable hours, and irreparable damage to reputation and client relationships.

Endpoint Protector has been named a Leader in the DLP category by G2. Discover the reasons why organizations choose Endpoint Protector, how we compare to key vendors in the market, and how we rank for key buyer requirements.

Video tutorials

Extend your Device Control capabilities by adding Content Aware Protection

In this short 4 minute video, CoSoSys Director of North American Sales, Chris Roney explains how Content Aware Protection turns an existing Device Control deployment into full Data Loss Prevention covering all endpoint exit points.

User Remediation - Endpoint Protector by CoSoSys

User Remediation is an important new feature that can be applied to your DLP policies in Endpoint Protector 5.4.0.0. If enabled, your users will be able to override the DLP policy, adding a justification for doing so.

Currently available for the Content Aware Protection module, this feature significantly improves the…

How Device Control Works?

See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives.

Case Studies

Aspire Pharmaceuticals implemented Endpoint Protector to secure and protect their customers’ sensitive data, to monitor employees’ activity and to add additional security against insider threats.

Mandarin Oriental Hotel implemented Endpoint Protector to protect again sensitive data leaks and to control and monitor portable storage devices in order to secure the know-how across various departments.

Veolia Water implemented Endpoint Protector to secure their sensitive data in order to avoid data breaches that could compromise their competitive advantage. They also wanted to make ensure data encryption on removable devices.

Infographics

[Infographic] CCPA Compliance - What You Need To Know

The California Consumer Privacy Act (CCPA), sets a new privacy framework for California residents. Check out our infographic to learn about the most important aspects of CCPA and the steps your business can take to be ready.

GDPR Essentials

An infographic that offers an overview of the General Data Protection Regulation (GDPR) with details such as definition, dates, articles, and other info. Share it with your employees, partners and other collaborators to increase awareness in a more visual, original way.

Request Demo
* Your privacy is important to us. Check out our Privacy Policy for more information.