Case Study
JFE Engineering
JFE Engineering implemented Endpoint Protector to efficiently protect against data loss and to closely monitor employee activity in regards to data transfers. They also wanted an additional layer of security.

Competitive pricing, monitor employee activity, manage threats
Endpoint Protector Device Control and Content Aware modules
Easy deployment, user-friendly interface, granular control
JFEEIPL was looking for a solution that helps to mitigate and prevent possibilities of direct/indirect data loss threats and closely monitor employee activity related to data transfers. JFEEIPL was also searching for an efficient DLP solution as an additional layer for data security.
JFE Engineering India Pvt. Ltd. is using our Device Control and Content Aware Protection modules. Endpoint Protector’s Device Control module allows the company to monitor and control USB and peripheral ports, thus preventing unauthorized data transfers and the use of unauthorized devices. With the Content Aware Protection module, JFEEIPL scans and protects data in motion with content inspection and contextual scanning of data. This module prevents data leakage and data loss through various exit points, including web browsers, email clients, and applications such as Microsoft Outlook, Skype, or Dropbox.
Endpoint Protector can be deployed in multiple ways, depending on the existing infrastructure of the company. Clients can choose from a virtual appliance, a cloud server (compatible with Amazon Web Services, Google Cloud, or Microsoft Azure) and a SaaS offering hosted by CoSoSys in AWS.
JFE Engineering India Pvt Ltd rated Endpoint Protector’s features, granularity, ease of installation, and ease of use as good, and staff availability when calling or asking for assistance very good.
JFE Engineering India Pvt. Ltd. has chosen Endpoint Protector because the solution is easy to deploy and user-friendly, offers cross-platform capabilities and competitive pricing.

Data Loss Prevention Best Practices
Data Loss Prevention (DLP) tools have become an essential part of data protection strategies. Highly flexible and adaptable to any company size, DLP solutions can be tailored to different needs and support compliance efforts with new data protection regulations. This whitepaper outlines the best practices companies should adopt when implementing DLP tools.