Overview
Product Information on Endpoint Protector
What is Endpoint Protector?
Endpoint Protector Pricing
Endpoint Protector Product Images



Overall experience with Endpoint Protector
“Console Usability and USB Control Enhance Security, Though Setup May Be Challenging”
“Cosoys EPP ”
About Company
Company Description
Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach. Our solutions also limit the impact of attacks by helping IT teams detect, respond and recover from them faster and with less effort. Over 13,500 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.
Company Details
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About Endpoint Protector
Reviewer Insights for: Endpoint Protector
Deciding Factors: Endpoint Protector Vs. Market Average
Performance of Endpoint Protector Across Market Features
Endpoint Protector Likes & Dislikes
1. Ease of Use - The console layout is user friendly and organized 2. Ability to block USB devices - The ability to block USB devices is very important to an organization's security posture. This aligns with the core principle in cybersecurity of principle of least privilege. 3. Reasonably priced - Endpoint Protector's cost is well worth the security it provides
Read Full ReviewI appreciate the device control, enforced encryption, compliance management templates, and detailed reporting and analytics that the tool provides. We have specific rules tailored to our different departments and roles which makes it easy to manage based on job level. I like that it works great on Mac or Windows.
Read Full Review1. The console can be slow - Sometimes I experience slow loading while navigating through the console when clicking on various items 2. Initial Setup - The vendor could have been a little more helpful with instructions on the initial setup 3. Device Wizard Inconsistency - The device wizard helps you identify plugged in devices on employees' computers. On rare occasions, the device wizard will fail to automatically identify a plugged in USB device.
Read Full ReviewTop Endpoint Protector Alternatives
Peer Discussions
Endpoint Protector Reviews and Ratings
- SECURITY ANALYST<50M USDInsurance (except health)Review Source
Console Usability and USB Control Enhance Security, Though Setup May Be Challenging
Endpoint Protector is a great product to have to reduce risk to your organization - CLAIMS ADJUSTER50M-1B USDInsurance (except health)Review Source
Customizable Rules and Device Control Facilitate Security Management Across Departments
A great cyber security tool that helps to prevent theft, insider threats, and data leaks. It's easy to make sure you're compliant with regulations. Made of good use by our IT security teams. - Head of Infrastructure50M-1B USDServices (non-Government)Review Source
Simple Setup and Easy Configuration With Occasional Challenges in Product Whitelisting
It's a really straight forward product, quick to setup and configure and very easy to push out. - Cybersecurity lead1B-10B USDServices (non-Government)Review Source
Reliable Insight Into IT Changes and Events Supports Compliance and Auditing Requirements
Very positive The platform is able to provide reliable insight into critical chnages,access events,and events, and configuration modifications across IT infra. Compliance requirements and internal audits can be met with this valuable tool - Director of IT services1B-10B USDSoftwareReview Source
Ease of Implementation Noted, With Suggestions for Better Automation and OS Support
Endpoint protector is very easy to use and we can customize our use cases a lot.



