Cososys Endpoint Protector
Endpoint Protector
Device Control
DLP / Data Leakage
enforced usb encryption memory drive encryptionEnforced USB Encryption
DLP for Mac OSX
Ransomware Ransomware - 11 tips
Mobile Device Management
Video Overview
Demo Interface
Device Security Policies
Defining Usage Rights
Auditing & Shadowing
Virtual Appliances
Certifications & Awards
Datasheets & Case Studies

Get Started
Request Pricing

Also of interest?
Sophos XG Firewall

We are here to help...
CALL: 08456 443 911
Request Call Back
Request Live Demo
Make a Quick Enquiry



Cososys Endpoint Protector is a multi award winning, government certified solution for;

  • Device & Port Lockdown & Control
  • Automatic USB drive encryption
  • Mobile Device Management (MDM)
  • Data Leakage Prevention (DLP)
  • A single console manages Windows, Mac and Linux endpoints!
Deployed in minutes, networks of all sizes get immediate protection from confidential data leakage and data theft by controlling, monitoring and blocking data movement across all removable devices, mobiles & hard to control applications such as Skype, Webmail, Dropbox and Outlook.

Detailed reports, logs & audit trails on all the information transferred in and out of the network provide compliance for Government and Industry regulations such as PCI, SOX, HIPAA.

Key Features:

endpoint protector dlp Instantly lockdown access to ALL ports & removable devices - USB, FireWire, Thunderbolt, WiFi, Bluetooth, eSATA, CD/DVD, iPhone/iPad/iPod, Android, Windows mobile, cameras, tape drives, printers...
cososys Block sensitive data leaving your network via Skype, clipboard, Dropbox, webmail, email, copy/paste, disable print screen and more.
cososys Awarded DLP Solution of the year - multiple years running.
Enforce Encryption on all regular USB drives
Unique and a World First - Windows, Mac & Linux device control in a single solution [more] 
Mobile Device Management and Mobile Application Management - monitor and control all iOS and Android devices in depth now with "Geolocation" based policies.
Discover what removables devices are being used on your network today. "Transparent" mode will show you.
The ONLY solution to provide cross platform OS support - 32 and 64-bit Windows, XP, Windows 7, 8, 2003, 2008 R2, 10, 2012, Mac OSX and Linux !
Government Common Criteria, ITSCC and VMware certified. See more certifications
Simple to manage.  A colourful, intuitive management dashboard with default security policies make setup a breeze. Try it.
Data Shadowing - take a copy of all information copied to or from a USB / removable device.
Full forensic auditing, logging, reporting of everything.
Media Whitelist - authorise devices based on the specific data they contain.
Set removable devices for read-only mode.
Control access to devices depending on username, group membership, computer and even time of the day and the day of the week.
Create the white list of approved USB and other devices that will not be locked regardless of any other settings.
Try CoSoSys Endpoint Protector now or Contact us for a quote.
More Info

Watch 2 Minute Overview   

1 Minute Product Tour


How to configure/set-up
rights in Endpoint Protector 4:

Configuration of Policies

Sample Screen Shots:


Endpoint RightsEndpoint Rights

Endpoint Settings
Social Network / IM Client / Mail
Endpoint Settings

Offline Temporary Password
Offline Temporary

redcoin home