Case Study
Fusionex
(Malaysia)

Fusionex is an established multi-award winning IT software group that specializes in Analytics and Big Data. The company business is to help clients manage, make sense of and derive useful insights and information from the vast amounts of structured and unstructured data at their disposal. Fusionex is focused on bridging the gap between business and technology, and in doing so, providing an exceptional and positive experience to customers of various markets.

The Challenge

The mobile development division in the company is facing a tough challenge to protect their source code to comply with the company intellectual property protection policy. The development team is required to work in a secured development environment which prevents source code file transfer out from the environment through either internet, USB ports or any cloud storage channels. Although there are many other software in the market that can lock down USB ports, the development team needs the ability to allow USB port access to certain mobile devices just for mobile application deployment and debugging purpose.

The Solution

Fusionex mobile development division had evaluated and tested many solutions, but decided that Endpoint Protector solution from CoSoSys fits well into their development environment. Endpoint Management and Endpoint Rights features in the Endpoint Protector provide all that the development team needs in controlling the USB ports’ access. 

"We opted for My Endpoint Protector from all the solutions we tried so far because it best suited our needs. We consider that the control panel is useful and we can control everything with My Endpoint Protector which is very important to us," said Umut Çetin, Company Director of Artı Uç. 

Content Aware Protection allows the development team to set up different Content Aware Policies to further prevent any files matching the source code file pattern to be copied out from the machine. Any misconduct of file copying activity is all logged using the File Tracing and File Shadowing features for the company audit purpose. The Endpoint Protector administration console is very powerful, allowing setup of different hierarchies and groupings of endpoints for easy management.

“We found that Endpoint Protector is the best DLP solution that is simple enough to use but it has the most comprehensive features that fit well with what we need for our source code protection in the development division,“ said Spence Chee, Senior Solution Manager at Fusionex.

Why Endpoint Protector?
  • Monitor data and file transfers
  • Content Aware Protection
  • Intuitive and user-friendly interface
  • Fast and easy to setup
  • Lifetime licenses and best TCO
  • Good post sales support
Let’s talk about your use case

Fill in the form below to get in touch with one of our DLP experts
Check your email to download .
If you don't see it please check your spam or junk folders.



Please use a valid email address!
Data Loss Prevention (DLP) for Technology Companies
Download our free ebook on
Data Loss Prevention (DLP) for Technology Companies

For companies in the technology sector, intellectual property is often their most valuable asset. Data can also be at the core of what a technology company owns. With stricter compliance requirements under data protection laws and consumers becoming more aware of how companies use their data, it is essential to ensure that sensitive information is protected.

The case study is also available for download