Endpoint Protector References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (329)
    3+ References
  • 4.7 / 5.0 (3565)
    96+ References
  • 4.7 / 5.0 (4746)
    289+ References

Endpoint Protector Testimonials

  • "We decided to take the basic software we used so far to the next level of security with Endpoint Protector, because it best suits our needs. The experience with the vendor has been very good and the Support Team is very helpful and fast."

  • "With Endpoint Protector, we have the overview needed to evaluate the employees‘ activities. For example, it is easy to comprehend which devices were connected and what content was transferred."

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References3 total
    About

    Aware aims to adopt the latest advancements in cognitive computing, artificial intelligence and behavioral analytics to amplify enterprise value by monitoring the social graph. Their flagship product, Aware Risk Management, extends traditional governance and compliance technologies by providing human-centric insight to enhance employee engagement and reduce the risk of unsafe behavior on enterprise collaboration tools

  • Reference Rating
    4.7 / 5.0
    Customer References96 total
    About

    Code42 is not new to the cyber security scene but their approach to insider risk protection is. For nearly 20 years, they have been safeguarding the data of more than 50,000 organizations, including 18 of the world’s most valuable brands. And as their needs and the needs of their workforces have evolved, so have their data security solutions.

  • Reference Rating
    4.7 / 5.0
    Customer References289 total
    About

    Forcepoint was created to empower organizations to drive their business forward by safely embracing transformative technologies – cloud, mobility, Internet of Things (IoT), and others – through a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies involved in managing a collection of point security products.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked