Endpoint Protector References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (3732)
    96+ References
  • 4.7 / 5.0 (2240)
    Verified23+ References
  • 4.7 / 5.0 (5036)
    289+ References

Endpoint Protector Testimonials

  • "We have chosen Endpoint Protector for its functionalities. The solution fits our data security needs. It allows us to control portable storage devices which connect to our corporate computers, reducing data loss."

  • "Good customer feedback when we tested the market was the main reason we decided to take on CoSoSys. It has now been added as one of our main products as part of our portfolio as we felt confident in taking this to new and existing customers."

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References96 total
    About

    Code42 is not new to the cyber security scene but their approach to insider risk protection is. For nearly 20 years, they have been safeguarding the data of more than 50,000 organizations, including 18 of the world’s most valuable brands. And as their needs and the needs of their workforces have evolved, so have their data security solutions.

  • Reference Rating
    4.7 / 5.0
    Customer References23 total
    About

    Digital Guardian is a next generation data protection platform designed to stop data theft. The Digital Guardian platform performs across the corporate network, traditional endpoints, mobile devices and cloud applications to make it easier to see and stop all threats to sensitive data. For more than 10 years, it has enabled data-rich organizations to protect their most valuable assets with an on premise deployment or an outsourced managed security program (MSP). Digital Guardian’s unique data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, enables you to protect data without slowing the pace of your business.

  • Reference Rating
    4.7 / 5.0
    Customer References289 total
    About

    Forcepoint was created to empower organizations to drive their business forward by safely embracing transformative technologies – cloud, mobility, Internet of Things (IoT), and others – through a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies involved in managing a collection of point security products.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked