Browse Software
List Your Product
Loading...
Forcepoint DLP logo

Forcepoint DLP

  Add to Compare

86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Metomic logo
Visit Website

98% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Endpoint Protector logo
Visit Website

Overview

Description Metomic is a sensitive data management platform equipped with adequate infrastructure. Based on the particular, clients can identify and locate sensitive data throughout their cloud infrastructure, and have full access to the whereabouts and time of uploading along with editors lists. Clients can further build classifiers of their own, scan files and pile unstructured data successfully. Metomic offers a hundred per cent authority to its clients to control data related security policies across thousands of locations. This prevents data from being uploaded to the wrong places and automatically deletes it when the requirement expires. Metomic further offers best-in-class classification thanks to its shelf-data classifiers and a data discovery API. That uses Webhooks backed by a secure architecture, helping companies eliminate risks of data leakage and other related stuff. Metomic’s pre-built app integrations allow real-time collaboration with multiple applications, enhancing visibility right from the very first day. It promises appropriate integrations with external platforms like Amazon AWS, Hubspot, Mailchimp, Salesforce, Google Sheet and more. Read more Endpoint Protector is a compact endpoint data protection software that helps companies with data discovery, monitoring and protection based on multi-OS data loss prevention features. It also provides granular control over USB and other peripheral devices, based on product ID, vendor ID, serial number and more. In addition, businesses can depend on the same to streamline file transfers, besides getting access to detailed control through both context and content inspection. Endpoint Protector keeps the USB storage devices completely safe with password protection. It even runs accurate scans through all the content, manually or automatically, in order to find any issues with the data that could be harmful. The software works on advanced technologies to quickly discover intellectual properties, like source code, present in hundreds of file formats. Endpoint Protector can even scan and safeguard Personally Identifiable Information (PII), including bank account numbers, credit card numbers and social security numbers. Ultimately, the software assures accurate protection against internal threats by conducting detailed scans across sensitive information, under its loss prevention feature. Read more
Pricing Options
  • Free Trial Not Available
  • Metomic Offers Custom plan.
  • Free Trial Not Available
  • Endpoint Protector Offers Custom plan.
SW Score & Breakdown

86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    91%
  • Reviews
    60%
  • Momentum
    68%
  • Popularity
    78%

98% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    97%
  • Reviews
    88%
  • Momentum
    67%
  • Popularity
    98%

Features

Total Features
7 Features
10 Features
Common Features for All
    Blacklisting The practice of blocking identified entities to access particular privilege and services
    Compliance Reporting Helps in creating a compliance report to establish an effective and efficient policy and procedure management.
    Data Backup Facility to backup files to prevent accidental damage and loss of important data due to deletion.
    Data Leak Detection Helps to prevent and mitigate data leaks through endpoints
    File Analysis Helps to analyze and identity ROT (redundant, outdated, and trivial) files to perform disk optimization
    File Server Auditing Records and reports all file accesses and modifications made to file servers in the real-time environment.
    Incident Management Helps in identifying, analyzing and rectifying a bad incident or issues to ensure it does not reoccur in future
    Policy Management Helps to design, maintain, update and report on compliance rules, regulations and policy status electronically so that it is easily accessible
    Sensitive Data Identification Inspects the sensitive data (PII, PCI, PHI) in file contents and classifies the files, folders, and data based on vulnerability
    Threat Protection This feature will defend the system and application from cyber threats
    Whitelisting The practice of allowing identified entities to access particular privilege and services
  • + 4 More - Show Less
    • Blacklisting The practice of blocking identified entities to access particular privilege and services
      Compliance Reporting Helps in creating a compliance report to establish an effective and efficient policy and procedure management.
      Data Backup Facility to backup files to prevent accidental damage and loss of important data due to deletion.
      Data Leak Detection Helps to prevent and mitigate data leaks through endpoints
      File Analysis Helps to analyze and identity ROT (redundant, outdated, and trivial) files to perform disk optimization
      File Server Auditing Records and reports all file accesses and modifications made to file servers in the real-time environment.
      Incident Management Helps in identifying, analyzing and rectifying a bad incident or issues to ensure it does not reoccur in future
      Policy Management Helps to design, maintain, update and report on compliance rules, regulations and policy status electronically so that it is easily accessible
      Sensitive Data Identification Inspects the sensitive data (PII, PCI, PHI) in file contents and classifies the files, folders, and data based on vulnerability
      Threat Protection This feature will defend the system and application from cyber threats
      Whitelisting The practice of allowing identified entities to access particular privilege and services
  • + 7 More - Show Less
  • Technical Details

    Organization Types Supported
    • Freelancers
    • Large Enterprises
    • Medium Business
    • Small Business
    • Freelancers
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Installed - Windows
    • Installed - Mac
    • SaaS/Web/Cloud
    • Installed - Windows
    • Installed - Mac
    Modes of Support
    • 24/7 (Live rep)
    • Business Hours
    • Online
    • 24/7 (Live rep)
    • Business Hours
    • Online
    API Support
    • Available
    • Available

    Reviews & Ratings

    User Rating
    Not Available
    4.6/5 6 user ratings
    Ratings Distribution
    Not Available
    • Excellent

      66.4%
    • Very Good

      29.8%
    • Average

      1.5%
    • Poor

      0.8%
    • Terrible

      1.5%
    Review Summary
    Not Available

    Endpoint Protector is widely praised for its effectiveness in preventing data breaches and endpoint security incidents. Users appreciate its user-friendly interface, comprehensive features, and excellent customer support. However, some users have reported occasional technical glitches and connectivity issues. Overall, Endpoint Protector is highly recommended for businesses seeking robust endpoint protection and data security solutions.

      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Not Available
    • Metomic Offers Custom plan.
    • Free Trial Not Available
    • Endpoint Protector Offers Custom plan.
    Pricing Plans
    Monthly Plans Annual Plans

    Metomic Custom

    Endpoint Protector Custom

     
    View Detailed Pricing
    View Detailed Pricing

    Screenshots & Videos

    Screenshots screenshot
    + 2 More
    Endpoint Protector screenshot
    Videos Not Available Video Thumbnail
    + 1 More

    Vendor information

    Company Details Located in: London, United Kingdom Founded in: 2018 Located in: Cluj-Napoca, Romania
    Contact Details

    Not available

    https://metomic.io/

    +40 264 593 110

    https://www.endpointprotector.com/

    Social Media Handles

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed