Try our new research platform with insights from 80,000+ expert users

Netwrix Endpoint Protector vs Trellix DLP comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Netwrix Endpoint Protector
Ranking in Data Loss Prevention (DLP)
9th
Average Rating
8.6
Number of Reviews
26
Ranking in other categories
No ranking in other categories
Trellix DLP
Ranking in Data Loss Prevention (DLP)
18th
Average Rating
8.2
Number of Reviews
7
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of November 2024, in the Data Loss Prevention (DLP) category, the mindshare of Netwrix Endpoint Protector is 4.5%, down from 5.5% compared to the previous year. The mindshare of Trellix DLP is 5.5%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Loss Prevention (DLP)
 

Featured Reviews

SunnyKumar - PeerSpot reviewer
Sep 26, 2023
Enhancing data security with proactive protection and control
I've encountered some latency issues that appear to be related to the internet speed. When I install the agent on the laptop, the internet speed often drops from 100 MBPS to around 80 MBPS or even as low as 50 MBPS at times. The slow response seems to be connected to the fact that all network traffic is routed through this agent. The challenge arises when trying to analyze the logs, as every single click and action, even a single command in GitHub, generates a multitude of logs. This makes it difficult to extract relevant information. It would be helpful to implement filtering mechanisms so that we can sort and view the data based on software and vendor, providing more clarity and ease in analysis.
Nishant Singh Chauhan - PeerSpot reviewer
May 13, 2024
Useful in the area of data security and is easy to deploy
I use the solution in my company for data security, where our primary focus is on our customers' data. The tool is used to store customer information inside the organization The negative part of the product stems from the area revolving around certain browsers. The solution does not support…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The versatility regarding the exit point Endpoint Protector supports in making sure that important data doesn't leave our organization is vital for us. In the industry that we're in, data breaches are a significant concern. While our staff is contractually required to maintain confidentiality and they're all very aware that they shouldn't try and transfer company data of different classifications elsewhere to non-company devices, there's a risk."
"The product's most valuable feature is its ability to support Linux operating systems."
"The search for keywords is very important in our security operations because one of the key use cases we had was for the ability to search keyword-based on an internal database of keywords that have been submitted by other project managers within the company that's around intellectual property. The ability to search on keywords was part of that."
"Endpoint Protector's best features are its protection and user-friendliness."
"There are a lot of features, but the main feature is that I can use a device serial number to unlock any particular machine or for all machines. If I have a phone, like a Samsung phone, I can whitelist that specific phone for full access wherever it is plugged into any of our devices. This is the same with a USB, because most USBs come in bulk and have the same serial number. I can then whitelist that particular USB to be read-write with full access."
"I like the data protection feature. Our users were working on a client's CRM application with a lot of client-related EIA information. We did not want the users to be able to send any of this data outside. I also like its ability to protect against data leaks via emails and social media. I like that you can deploy it quickly, and it requires no training."
"It also provides us with the ability to lock down a wide variety of USB devices, which is pretty important because we don't want certain data accessed. It does a really good job when it comes to the versatility of the exit points it supports, making sure that important data does not leave our organization."
"There are effectively two areas of DLP to look at from a technical perspective. One is how it performs the pickup of information traversing the system and the other is how the policy engine, which analyzes the data, works. On the first aspect, CoSoSys is probably best of breed for macOS because they're reasonably well-integrated into the operating system. They're looking at the file system operations level, not at the execution level."
"Trellix DLP has an agent that continuously scans the endpoint and sends the data to the portal. From there, it continuously leverages data from its threat intelligence."
"It is a very stable solution."
"It prevents enterprises from installing external software and devices and can block specific network pathways."
"The tool has prebuilt templates for data classification. It is easier for customers to get started."
"Trellix can transfer the data through the cloud. The storage device control is an important feature."
"Scalability is feasible since it's on-premises. It's easy to scale there."
"Trellix DLP helps handle false positives, but it depends on your configuration. It is quite overwhelming in terms of its dashboard."
 

Cons

"It would be helpful if they offered discounted pricing for long-term contracts to serve customers who are interested in committing for periods of three years, five years, or longer."
"I would rate the role-based access features for administrators a six out of ten. There's work to be done on the granularity of roles that can be assigned to an administrator but there is role-based administrator access present. That's why it's not a zero rating."
"There are times when the server needs to be updated, and it would help if I got a notification for when the newest version comes out, because at the moment, I'm going in every now and then and checking. Sometimes it comes out and I didn't know it had come out."
"Customization could be a lot better."
"Endpoint Protector, in particular, had some features to be desired for the Mac operating system."
"One of the areas where there is room for improvement is support. It takes time for them to respond. They need to respond on time. Instead of sending an email, I think it would be very helpful to say, 'Let's set up a WebEx to see what's really going on,' instead of the back and forth of email."
"They have many predefined classifiers in terms of data identifiers, and they should improve this."
"Currently, for additional applications that need monitoring by the EPP, a request must be made to their technical support. It would be beneficial to add a feature allowing users to manually add applications for monitoring without depending on the vendor."
"The support team's response time during the night is an area of concern where improvements are required."
"Virtualization is complex and requires proper training. However, once you get trained, it is a very good product."
"Trellix needs to improve customer support."
"Trellix is incompatible with Linux, and its DLP part is incompatible with Mac. Sometimes, it does not work on Windows, either."
"It's not very user-friendly for a beginner, so it would be easier if the platform or console were manageable or user-friendly. The dashboard could be simplified."
"In future releases, I would like to see like to see encryption available on the cloud-based version."
"The whole UI of the server console installed on the standalone computers is hefty."
 

Pricing and Cost Advice

"The pricing is very competitive and is cheaper in comparison to that of other solutions. It makes it an easy decision to go with EPP for the data loss prevention infrastructure."
"For what it's doing, the cost is somewhat high for us, but it's the cost of doing business with the clients that we have."
"We have a limited budget for our media section. When we purchased it last year, we migrated from a different solution to this solution, and at that time, they told us that the cost will remain the same, but this year, they increased the price by 20% or something like that. I am not sure about the exact price, but let's say from 8,000, it increased to 10,000. It was a huge gap, and we couldn't bear this cost because we have a limited budget. When we spoke to them, they understood our problem and reduced it to the same price that we had last year."
"The solution’s pricing is a normal industry standard and depends on customers and salespersons."
"The software comes with a higher price tag when compared to other DLP solutions."
"When I last renewed the license it was for a two-year term, and they gave me the second year at half price."
"Pricing is quite reasonable. For smaller organizations, it lets them get into the product domain, whereas a lot of vendors won't even talk to them. CoSoSys is just about at that sweet spot of being serious enough that you have to budget for it, but at the same time, affordable enough that the value is well worth it."
"This is a budget-friendly solution that covers all the aspects of host-level DLP."
"The pricing depends on the number of users in a company."
report
Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Manufacturing Company
13%
Financial Services Firm
13%
Educational Organization
5%
Financial Services Firm
15%
Comms Service Provider
13%
Manufacturing Company
12%
Computer Software Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Endpoint Protector?
Its robust security audit and compliance functionalities prove especially beneficial for businesses in sectors like BFSI (Banking, Financial Services, and Insurance) and Information Technology.
What needs improvement with Endpoint Protector?
The only aspect that prevents it from being a perfect solution is the occasional slower response time.
What do you like most about Trellix?
Trellix can transfer the data through the cloud. The storage device control is an important feature.
What needs improvement with Trellix?
It's not very user-friendly for a beginner, so it would be easier if the platform or console were manageable or user-friendly. The dashboard could be simplified. It should improve its quality and o...
What advice do you have for others considering Trellix?
They should conduct more simulations. We have not been able to explore the dashboard fully, so it is important to familiarize ourselves with where DLP features are located and what steps to follow....
 

Also Known As

CoSoSys Endpoint Protector
No data available
 

Learn More

 

Overview

 

Sample Customers

Samsung, Toyota, Philips, Zeppelin, Western Union, eBay
Information Not Available
Find out what your peers are saying about Netwrix Endpoint Protector vs. Trellix DLP and other solutions. Updated: October 2024.
814,649 professionals have used our research since 2012.