

Mimecast Incydr and Netwrix Endpoint Protector compete in data protection and threat management. Mimecast is preferred for its pricing and customer support, whereas Netwrix is noted for its extensive feature set.
Features: Mimecast Incydr incorporates advanced threat intelligence, seamless integration of email and data security, and detailed reporting capabilities. Netwrix Endpoint Protector stands out with comprehensive data loss prevention, flexible policy settings, and robust compliance management tools.
Room for Improvement: Mimecast Incydr could enhance its feature breadth to match wider data protection requirements. Meanwhile, Netwrix Endpoint Protector might streamline some of its processes to simplify integration. Mimecast's user interface could benefit from a more intuitive design, and Netwrix could improve initial setup efficiency.
Ease of Deployment and Customer Service: Mimecast Incydr is known for its efficient cloud-based deployment and responsive customer service, facilitating a smoother onboarding experience. Netwrix Endpoint Protector, while offering both cloud and on-premises deployment, requires more effort for integration within existing systems.
Pricing and ROI: Mimecast Incydr offers competitive pricing with various subscription tiers providing significant ROI by reducing security risks and ease of use. On the other hand, Netwrix Endpoint Protector, despite a potentially higher initial setup cost, provides value through its comprehensive features and long-term data protection benefits.
I never needed to contact the vendor for technical support because we faced very few issues.
I would rate the technical support for Netwrix Endpoint Protector as a nine because we have trained engineers, and I am also trained.
Everything starts from the endpoint, and we maintain the Endpoint DLP in many cases while working alongside existing DLP systems.
If we had predominantly based our systems on Mac and Windows, it would have been very smooth sailing for us.
The product has been around for over 15 years now and is very stable because I started using them from version three.
Stability-wise, the solution is stable; we experienced no downtimes during our two years of usage.
Not all the policies applied to the Linux clients were as effective as those for Mac and Windows.
Netwrix is known as the best DLP for Apple Macintosh computers, which is noteworthy.
Assuming if there's a breach, we will be able to know exactly where the breach has occurred and what has occurred, and they are quite granular in how they report their information, including their logs.
In the dashboard, one system was utilizing two licenses for a single system.
Netwrix Endpoint Protector works on Linux and macOS to block USB ports, control internet access, and manage other peripheral ports.
| Product | Market Share (%) |
|---|---|
| Netwrix Endpoint Protector | 1.9% |
| Mimecast Incydr | 2.4% |
| Other | 95.7% |


| Company Size | Count |
|---|---|
| Small Business | 24 |
| Midsize Enterprise | 24 |
| Large Enterprise | 30 |
| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 9 |
| Large Enterprise | 6 |
Mimecast Incydr offers a comprehensive data protection and recovery solution, ideal for organizations needing robust insider threat protection and regulatory compliance.
Mimecast Incydr provides a seamless experience across platforms with lightweight clients and centralized administration. It focuses on real-time monitoring, instant access to backups, strong encryption, and customizable risk scoring. This ensures data protection against insider threats while promoting ease of use and low system overhead. Although improvements are possible in areas like Java dependency reduction, GUI design, cloud storage integration, and comprehensive reporting, Mimecast Incydr remains valuable for data classification, legal discovery, and identity management, especially for large environments handling classified information.
What key features does Mimecast Incydr offer?Mimecast Incydr is leveraged across industries for data leakage protection and egress solution integration. It supports HIPAA-compliant backups and peer-to-peer data management, proving invaluable for corporate data protection and traveling employees facing data loss risks. Its application in legal data discovery and disaster recovery planning enhances its relevance for IT administrators and compliance officers managing data-intensive operations.
Content Aware Protection
Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.
Device Control
USB & peripheral port control
Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.
Enforced Encryption
Automatic USB encryption
Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.
eDiscovery
Scanning data at rest
Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans
We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.