CoSoSys S.R.L. – Romanian developer of data protection solutions with 15 years of experience. Its offices in 5 countries around the world already serve more than 11 million users.

Endpoint Protector – the flagship DLP product of CoSoSys. Entered the market in 2008 and since then has been marked with many rewards . This is a cross-platform DLP solution for small, medium and large enterprises, which provides:

  • control of USB devices and peripheral ports
  • scanning data in motion and data at rest
  • encryption

In February 2017 Endpoint Protector DLP was marked by Gartner in category Endpoint Protector Solutions. More details.

Available Modules

Content Aware Protection

Scanning data in motion

Monitor, control and block file transfers. Detailed control through both content and context inspection.

Enforced Encryption

Automatic USB encryption

Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.

Device Control

USB and peripheral port control

Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.


Scanning data at rest

Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans.

Endpoint Protector can be integrated as a Hardware Appliance, Virtual Appliance or Cloud Services, providing a fast setup an deployment.

Key features of Endpoint Protector DLP




Seamless control of portable storage devices

Monitor and block data transfers

Cross-platform eDiscovery

Control and set rights for removable devices and ports. Establish policies for users, computers and groups.

Stop data leakage through the most common applications such as emails, browsers, and other online applications.

Create policies to inspect data residing on protected Windows, macOS and Linux computers. Discover sensitive data at rest and encrypt or delete it.


Protection for Windows, macOS, and Linux

Endpoint Protector takes cross-platform DLP to the next level. Protect data against loss and theft on all company’s endpoints.

How it works?