Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Alternatives to Consider

  • Cloudflare Reviews & Ratings
    1,948 Ratings
    Company Website
  • cside Reviews & Ratings
    25 Ratings
    Company Website
  • Feroot Reviews & Ratings
    27 Ratings
    Company Website
  • A10 Defend Threat Control Reviews & Ratings
    41 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website
  • Newforma Reviews & Ratings
    158 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    18 Ratings
    Company Website
  • Expedience Software Reviews & Ratings
    32 Ratings
    Company Website
  • optivalue.ai Reviews & Ratings
    3 Ratings
    Company Website
  • phoenixNAP Reviews & Ratings
    6 Ratings
    Company Website

What is Trusted Knight Protector Web?

Protector Air focuses on the protection of individual sessions and their related transactions, while Protector Web strengthens the security of web servers with enterprise-grade web application security and DDoS defense strategies. This solution proficiently tackles various vulnerabilities present in websites and applications, such as cross-site scripting (XSS), SQL Injection, Remote File Inclusion (RFI), and the OWASP Top-10 vulnerabilities. By preventing unauthorized access to web systems, it safeguards sensitive data and prevents defacement of websites, thus lessening an organization’s dependency on secure development practices and external patches. Acting as a superior alternative to conventional web application firewalls (WAF), Protector Web addresses notable limitations commonly associated with WAFs by utilizing active learning, dynamic content serving, and cloud replication methods. As a result, it significantly reduces the frequency of false positives and negatives, accelerates deployment to just hours, and makes operational management more straightforward for users. This all-encompassing strategy not only bolsters security but also delivers a more streamlined and effective defense against evolving cyber threats, ensuring that organizations can maintain their digital integrity in an increasingly complex landscape. Moreover, by integrating cutting-edge technologies, it paves the way for a proactive security posture that adapts to new challenges as they arise.

What is Endpoint Protector?

Endpoint Protector serves as a robust, integrated Data Loss Prevention (DLP) solution for various operating systems including Windows, macOS, and Linux, effectively thwarting data breaches and unauthorized data transfers while ensuring comprehensive management of portable storage devices. It offers the capability to monitor and filter both data in transit and at rest, utilizing tools such as regular expressions, dictionaries, or compliance with data protection standards such as GDPR, PCI DSS, and HIPAA. The platform features multiple modular options that can be tailored to fit the specific requirements of clients, including functionalities such as Content Aware Protection and Device Control, alongside the option for Enforced Encryption. Additionally, eDiscovery capabilities are included, enhancing the overall user experience by making workflows more secure and efficient, ultimately leading to significant returns on investment. Its versatility and effectiveness position Endpoint Protector as a vital asset in any organization's data protection strategy.

Media

Media

Integrations Supported

Amazon Web Services (AWS)
Blackwell Security
Google Cloud Platform
Kriptos
Microsoft Azure

Integrations Supported

Amazon Web Services (AWS)
Blackwell Security
Google Cloud Platform
Kriptos
Microsoft Azure

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Trusted Knight Corporation

Date Founded

2010

Company Location

United States

Company Website

www.trustedknight.com/protector-endpoint-protection/

Company Facts

Organization Name

CoSoSys

Date Founded

2004

Company Location

United States

Company Website

www.endpointprotector.com

Categories and Features

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

RFI

Categories and Features

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Popular Alternatives

Trusted Knight Protector Air Reviews & Ratings

Trusted Knight Protector Air

Trusted Knight Corporation

Popular Alternatives

Trusted Knight Protector Endpoint Reviews & Ratings

Trusted Knight Protector Endpoint

Trusted Knight Corporation
WebOrion Protector Reviews & Ratings

WebOrion Protector

cloudsineAI
USB-LOCK-RP Reviews & Ratings

USB-LOCK-RP

Advanced Systems International