Case Study
Gulf Insurance Group

Gulf Insurance Group implemented Endpoint Protector to prevent sensitive data leaks, and to better control and manage the risks of portable storage devices.

Industry: Insurance
Intuitive granular solution to monitor and control USB and peripheral ports
Endpoint Protector's Device Control for USB and peripheral port control
Flexibility and granularity within a modular format

Gulf Insurance Group was looking for a Data Loss Prevention (DLP) solution that offers granular options to monitor and control USB and peripheral ports in order to prevent data leaks and ensure the security of sensitive information. They were looking for an efficient tool that could be customized according to their needs and helps to meet the compliance requirements of different regulations.

The ideal data security solution for Gulf Insurance Group is easy to use and has a single dashboard that can manage all clients.


Gulf Insurance Group chose Device Control by Endpoint Protector by CoSoSys for its USB and peripheral port control. They chose Endpoint Protector because the solution comes in modular format, and they could customize Device Control according to their needs.

“Allowing the use of devices based on device ID is a really useful feature for us, as well as being able to track end-users activity based on files,” said Ahmad Jamali, Senior Engineer.

The Offline Temporary Password (OTP) feature is another valuable feature for Gulf Insurance Group, allowing administrators to generate a password that grants temporary unrestricted access to a specific device, computer, or user. These passwords can be requested by users with a justification, with validity period ranges between 30 minutes and 30 days.

Gulf Insurance Company rated Endpoint Protector's features, granularity, ease of use, support, and updates as excellent; ease of installation and staff availability when calling or asking for assistance as very good.

Why Endpoint Protector?

Gulf Insurance Group has chosen Endpoint Protector because the solution has a modular format, and it offers flexibility and granularity.

With Endpoint Protector, end users can easily request media access, and needed information will be passed to the IT team with the lowest effort from both sides,” Jamali added. “Overall, our end users are much more satisfied with Endpoint Protector than with our old solution.
Ahmad Jamali
Senior Engineer
Let’s talk about your use case Fill in the form below to get in touch with one of our DLP experts
Data Loss Prevention Best Practices
Download our free ebook on
Data Loss Prevention Best Practices

Data Loss Prevention (DLP) tools have become an essential part of data protection strategies. Highly flexible and adaptable to any company size, DLP solutions can be tailored to different needs and support compliance efforts with new data protection regulations. This whitepaper outlines the best practices companies should adopt when implementing DLP tools.

Request Demo
* Your privacy is important to us. Check out our Privacy Policy for more information.