Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.

* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them

Mandarin Oriental Hotel

Award-winning hotel secures critical data with Endpoint Protector by CoSoSys.

Mandarin Oriental Hotel Group is the award winning owner and operator of some of the most luxurious hotels, resorts and residences located in prime destinations around the world. Increasingly recognized for creating some of the world's most sought-after properties, the Group provides 21st century luxury with oriental charm. Above all, Mandarin Oriental is renowned for creating unique hotels through distinctive design and a strong sense of place, luxury hotels right for their time and place.

The Challenge

Mandarin Oriental from Bangkok is a truly remarkable five-star hotel that managed to become a top destination through contemporary, classic yet cutting-edge, unique blend of luxury and comfort. Their success comes from style, service, and excellence, and these strong points translate into know-how that has to be kept securely inside the hotel's premises. The challenge is that employees from the reception, marketing department, HR department, and others, handle critical data and transfer it for job purposes on portable storage devices making it vulnerable to leakages and losses.

Why Endpoint Protector?
  • Great features
  • Monitors, blocks, and alerts data transfers
  • Ease of use and installation
The Solution

The IT Manager of the Mandarin Oriental chose Endpoint Protector because it was recommended by their trusted partner and the proof of concept revealed a great fit between their requirements and Endpoint Protector’s features.

File Tracing and File Shadowing are among the preferred features because they disclose file transfers on portable media, meaning exactly what user, from what computer, in what moment, what file and on which device did the transfer occur. Additionally, the software provides a copy of the transferred file, for the Admin to see exactly what the file contains and if the title of the file corresponds to its content. For example, the title could be "Hotel presentation", but to contain the personal records of all the staff.

On a scale from 1 to 5 (one being "poor" and five being "excellent"), the hotel's IT Manager rated all aspects related to Endpoint Protector as excellent - features, granularity, ease of installation, ease of use, support and updates, availability of staff when calling or asking for assistance, and competitive pricing. When asked about the experience he had in dealing with our Support team and our company in general, the hotel's IT Manager had a positive response.

We like Endpoint Protector because it gives us the possibility to identify portable storage devices connected to the network and to restrict the transfer of information. Endpoint Protector offers granular control over portable media, with policies for devices, computers, users, groups and even custom classes.
Mandarin Oriental, Bangkok
IT Manager
The case study is also available for download