Try our new research platform with insights from 80,000+ expert users
IT Manager at a marketing services firm with 51-200 employees
Real User
Helpful support, intuitive interface, and it effectively protects our confidential graphics files
Pros and Cons
  • "The software is easy to use and the dashboard is intuitive."
  • "It would be helpful if they offered discounted pricing for long-term contracts to serve customers who are interested in committing for periods of three years, five years, or longer."

What is our primary use case?

We store graphics files on our computers and they are confidential, so we implemented this product to block all of the computers from being able to send the data outside of our organization.

We use it to block USB ports so that people cannot connect an external hard drive, flash drive, or anything else that people can use to take files off of the system. Essentially, it blocks data transfer.

How has it helped my organization?

We only have two policies. The first is to block everything and the second one allows for Wi-Fi and Bluetooth connections.

This product does give us multiple choices for blocking data exit points. Without giving specifics, I can say that I know we have better security because of it.

We have Mac and PC machines, and it is very easy to manage both types. There is no noticeable difference in features between Mac and Windows machines.

We use role-based access for administering this solution, but as we are a small company, it is only insofar as having an administrative role that can perform any of the functions when needed. Some people can unblock certain policies, but we have a single administrator that can do everything.

What is most valuable?

The most valuable feature is blocking data transfer.

The software is easy to use and the dashboard is intuitive.

For how long have I used the solution?

I have been using Endpoint Protector since I joined the company five years ago. I believe that they were using it for one or two years prior to that.

Buyer's Guide
Netwrix Endpoint Protector
March 2025
Learn what your peers think about Netwrix Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,296 professionals have used our research since 2012.

What do I think about the stability of the solution?

Stability-wise, it is very good and very safe. It seems to work fine.

What do I think about the scalability of the solution?

We have approximately 117 endpoints and for the time being, I don't think that we will be expanding. We already have all of our computers.

How are customer service and support?

I have not used technical support often, but every time I have, it was perfect. They have good support and they have helped me very well.

Which solution did I use previously and why did I switch?

Several years ago, we used ESET but we found that it only logged the files that were transferred via the ports. This was not what we wanted to do, so we canceled the license and implemented Endpoint Protector instead for blocking the ports.

What's my experience with pricing, setup cost, and licensing?

When I last renewed the license it was for a two-year term, and they gave me the second year at half price. It was a very nice gesture. Normally, I renew my license annually and I was happy to get a discount for committing to two years. There are no costs in addition to the standard licensing fees.

It would be helpful if they offered discounted pricing for long-term contracts to serve customers who are interested in committing for periods of three years, five years, or longer. I have been with the same company for five years, it was installed when I arrived, and we are going to continue using it in the future. Perhaps after a company has completed their first year, they should propose longer contracts to them.

What other advice do I have?

My advice for anybody who is considering this product is that if they want something to protect data on both Macs and PCs then this is a very good choice. I have never worked with a product that is this easy to use.

In summary, this is a good product and for now, I think that it has everything we need. It seems to be a perfect match for us.

I would rate this solution a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Naman Verma. - PeerSpot reviewer
Security Delivery Specialist at a consultancy with 10,001+ employees
Real User
Top 5
Efficient data layer inspection and good support
Pros and Cons
  • "All of the features are effective, but the highlight feature of the product was the data layer inspection. When we talk about a DLP product, data packet inspection is very important. Securing data at rest is easy, but securing data in transit is challenging. We used it comprehensively to secure end drives, data transfers, secure hard drives, and end-user machines. It proved monumental in our operations."
  • "Endpoint Protector, in particular, had some features to be desired for the Mac operating system."

What is our primary use case?

We were basically using it as a DLP solution, securing our endpoints for any data leaks. We were one of the contractors for IMS and AMM data, working on healthcare data. We had HIPAA compliance, so we had to abide by.

What is most valuable?

All of the features are effective, but the highlight feature of the product was the data layer inspection. When we talk about a DLP product, data packet inspection is very important. Securing data at rest is easy, but securing data in transit is challenging. We used it comprehensively to secure end drives, data transfers, secure hard drives, and end-user machines. It proved monumental in our operations.

What needs improvement?

Endpoint Protector, in particular, had some features to be desired for the Mac operating system. The controls it provided were not adequate with Mac machines, especially with the new application registry feature.

For how long have I used the solution?

I have around three and a half years of experience with this solution. 

What do I think about the stability of the solution?

It is a very stable product. So, I will rate it a solid eight out of ten. We had a couple of run-throughs with bugs, but, you know, their support was very helpful in resolving them. They immediately included it in their development part and their overall flow chart. So that was very helpful. Within a quarter, we got our issues resolved.

What do I think about the scalability of the solution?

I would rate the scalability a seven out of ten. There are still features to be desired for other operating systems, not just Windows. It needs to offer equally well features for other operating systems.

We had around 10,000 end users using this solution.

How are customer service and support?

The customer service and support were helpful. 

Which solution did I use previously and why did I switch?

We were using a DLP solution, it was called Safe End. It was an Israeli product from a company called WAVE.

SafeEnd was a very good product on the basics. But, looking at the scalability, the product had nothing much to offer. It was very stagnant and offered only twenty-odd features. We didn't have any scope of scalability moving on to new features. So, it was kind of stopping us from completing our compliance.

How was the initial setup?

The initial setup was easy and interesting at the same time. The overall configuration and setup were engaging. It wasn't just another setting; we found the product very good to work with.

What about the implementation team?

We did it in-house. The deployment took about 18 hours. We used SCCM for endpoint deployment, and since our overall compliance was good, the deployment was seamless.

What was our ROI?

We saw a return on investment. So, whatever we invest, the level of compliance that we follow through, and the effectiveness of the product. Overall, our clients were very impressed with it, and the amount of money that we were spending on our cybersecurity definitely gives solid ROI on our investment.

What's my experience with pricing, setup cost, and licensing?

The major reason in an organization when we apply.  So financial is a huge factor while we are doing it.  So we found it quite reasonable based on the features it was offering. This solution was not too cheap or too expensive. But for the amount of features that they are offering, it was reasonable.

What other advice do I have?

Overall, I would rate the solution an eight out of ten. Compared to other products in the market, it is a fairly good product. 

It's definitely not the cheapest product. So first gauge your requirement to the point. And make sure you are using this product to the optimum because it has a lot to offer. So if there is any feature that you're not using, I would suggest them to be 100%  sure why you are buying it.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Buyer's Guide
Netwrix Endpoint Protector
March 2025
Learn what your peers think about Netwrix Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,296 professionals have used our research since 2012.
system administrator at INSIGHT CREDIT UNION
Real User
Clipboard granularity works great, enabling me to see copying and pasting to specific exit points, and report on it and block it
Pros and Cons
  • "Compared to a lot of the USB management systems out there, Endpoint Protector is the only one that comes with true USB management and the DLP side of it. I'm pretty impressed because I've used several solutions with DLP and USB management, and I've never seen granularity like this solution has."
  • "One of the areas where there is room for improvement is support. It takes time for them to respond. They need to respond on time. Instead of sending an email, I think it would be very helpful to say, 'Let's set up a WebEx to see what's really going on,' instead of the back and forth of email."

What is our primary use case?

I was looking for a DLP solution and Endpoint Protector happened not only to help with that, but also with the USB management piece. As a credit union we have a lot of sensitive data, so we need to be able to see it at rest and block it, and not only on-premises, but off-premises as well. A lot of people work remotely now and this solution is really working for me because once the endpoint is on there, I'm still in control.

How has it helped my organization?

I've seen, through all my policies, how exit points get blocked. The eDiscovery is one of the important things in Endpoint Protector. That's been working a lot for me, especially with the remote users. The eDiscovery allows me to see data outside of the network.

I have policies right now with eDiscovery for social security number, credit card, member number, and I created a duplicate SSN. So it's finding anything where that agent is installed, anything from the computer. It's finding all that data and it's reported to me.

What is most valuable?

I don't have a single most valuable feature. Every feature is really working for me. One of the reasons I bought it was for the USB block, but that's not as much a use case anymore since I have a lot of people working remotely. It's the DLP part that is more important to me right now, to pinpoint the data that's getting moved.

The granularity enables me to not only see a file, but to read inside the file and pull out the data inside it. The granularity is really pretty good on that. It's very important. Let's say somebody just exported a file or emailed a file or uploaded a file on the internet. Seeing the inside of the file is really important to me. Whether it's encrypted or not, I still can see inside the file.

I'm the only admin on it, but the role-based access is fine. I have one user that I give access to so he can just see device control and that's it. That's all I need him to see. I was able to do that, so I'm pretty happy with the role-based access.

I use the solution's clipboard granularity feature to monitor copying and pasting to specific exit points, and it works great. People are trying to get the data any way they can, from the clipboard and things like that. I'm able to see it, report on it, and block it.

For how long have I used the solution?

I've been using Endpoint Protector for going on two years now.

What do I think about the stability of the solution?

I'm pretty impressed with its stability.

What do I think about the scalability of the solution?

I don't see any issues or limitations with scalability. As long as you have the license, everything should be fine.

I'm managing about 300 devices right now.

How are customer service and technical support?

One of the areas where there is room for improvement is support. It takes time for them to respond. They need to respond on time. Instead of sending an email, I think it would be very helpful to say, "Let's set up a WebEx to see what's really going on," instead of the back and forth of email.

Which solution did I use previously and why did I switch?

I didn't replace any solution with this one. I was looking for a USB management solution. I have competitors like ManageEngine, but when I happened to find Endpoint Protector, with the USB and the DLP side of it in one solution, it was good to have that in one platform. I was going to have to find another DLP solution to be able to manage all this.

How was the initial setup?

The initial setup was straightforward for me. They have good documentation, so if you follow everything it should be fine.

My deployment took a month. The implementation strategy for the solution was to set it up, deploy it to a couple of test machines, and see how it was behaving. Once that was done, I deployed it to everybody.

It doesn't require any maintenance on my side, other than when the updates come available. I get them installed and that's it.

What about the implementation team?

I deployed myself.

What was our ROI?

I have definitely seen return on the investment when it comes to satisfying my auditors. I can show them I'm looking at all these things. And I'm protecting the credit union at the same time. It's really all worth it.

What's my experience with pricing, setup cost, and licensing?

I don't have any issue with the licensing and pricing. I would love for it to be cheaper, but at the same time I'm getting a lot from it.

Which other solutions did I evaluate?

Compared to a lot of the USB management systems out there, Endpoint Protector is the only one that comes with true USB management and the DLP side of it. I'm pretty impressed because I've used several solutions with DLP and USB management, and I've never seen granularity like this solution has.

I haven't seen any solution like Endpoint Protector. Everybody says, "USB management: We can control, we can block, etc." And you have other solutions that are DLP only. Having it all in one place is really helpful. Not only do I have the USB management side, but I can come back and say, "All right, what's in that USB? What sensitive data is in there?"

What other advice do I have?

I'm in a Windows environment, but I see it does MacOS, Windows, open sources. It has all of that on the platform.

I'm not using the EasyLock USB Enforced Encryption app to automatically encrypt confidential data transferred to USB storage devices. I'm more monitoring it. But I have the option of force it to encrypt.

Overall, I've never seen a solution with this much granularity. I didn't expect that. I did the demo, but it was only when I actually put in my environment and saw things and said, "Oh, wow." The reporting and the analysis have provided a lot of lessons learned. I didn't think I could get that much information.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
IT Manager of Information Technology Operations Manager at astrafaelcomsys.com
Real User
A versatile and user friendly solution with great customer support
Pros and Cons
  • "The role-based access features for the teams that administer it is good."
  • "Customization could be a lot better."

What is our primary use case?

I use the Endpoint Protector to monitor what the users or employees are doing. I monitor employee data like what they are sending, who they are sending it to, and what kind of data they're sending.

If I want to check that data, I can download it. I am checking the backup of the Endpoint Protector data weekly. If I want to monitor previous things, I can do that with the backup of the software.

It's important to create policies to protect my company data. If I create a policy that only our attachments go through our domain, only our attachments get through and not from Google, Yahoo, and others. It's blocking attachments effectively while providing me with an alert if I included an alert policy.

What is most valuable?

Endpoint Protector by CoSoSys has some valuable features. The role-based access features for the teams that administer it is good.

The granularity of the policies is good. The versatility of exit points is good. It also supports both macOS and Windows.

What needs improvement?

A lot of things can be improved. Especially customization could be a lot better.

Sometimes there are issues like when I write a policy to block finance sites. It also blocks the banking sites I have not included. Sometimes it also blocks commands I send to the machine while using Matrix software. 

Whenever this happens, I have to go into the software and choose the packet inspection option or something similar. Then I have to send the command again to the machine, and if it doesn't work, I have to contact the support team. These are some of the issues I have dealt with.

For how long have I used the solution?

I have been using the Endpoint Protector by CoSoSys for over six months. 

What do I think about the stability of the solution?

The stability, reliability, and availability of Endpoint Protector by CoSoSys is good.

What do I think about the scalability of the solution?

Endpoint Protector by CoSoSys is scalable and that's why we use it.

How are customer service and technical support?

The support is excellent. I got responses promptly, just like the vendor stated. If I email or call support, they are ready to assist me.

Which solution did I use previously and why did I switch?

Previously, we used Symantec Endpoint Protection, but the customer support wasn't good. I also inquired about Symantec Endpoint Protection and found out from our local vendors that the support wasn't good, and they recommended CoSoSys.

I installed CoSoSys in my system and tested it for two to three days. I made some policies like data blocking policies, mail blocking policies, attachment blocking policies, and all kinds of policies we need in our company. I tested it and felt very good about it and purchased the license.

How was the initial setup?

The initial setup and deployment are very easy. You can download the database directly, and you can purchase the license. After that, you can download the ETP client to install it. That's all you have to do.

The deployment takes about two hours. The company had a deployment plan and strategy, and I did the rest. 

What about the implementation team?

I implemented the Endpoint Protector by CoSoSys all by myself. 

What's my experience with pricing, setup cost, and licensing?

The price of Endpoint Protector by CoSoSys is more or less the same as other competing solutions.

Which other solutions did I evaluate?

I have installed Symantec Endpoint Protection previously, and the response wasn't good. That's why I moved to CoSoSys DLP. Before CoSoSys DLP, I checked another software, but I found it wasn't a DLP.

What other advice do I have?

If you need a good DLP software to protect your data, I recommend that you go for CoSoSys without any second thought. 

Endpoint Protector by CoSoSys is a versatile solution. The important thing is to protect the data, and it does that well. I have blocked all USB connections from the users via CoSoSys Endpoint Protector. 

It's very easy to use, just download the database from the internet directly, and after getting the license key, we can install and connect to the internet. Once you purchase the license, it's very easy, and 4GB of RAM and 150GB hard disk is enough for this data.

On a scale from one to ten, I would give Endpoint Protector by CoSoSys a ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Director /Founder at Touchstone Machine Tap
Real User
Top 5Leaderboard
A robust data loss prevention offering effective internal data leakage prevention, simplified compliance management and user-friendly customization options
Pros and Cons
  • "Its robust security audit and compliance functionalities prove especially beneficial for businesses in sectors like BFSI (Banking, Financial Services, and Insurance) and Information Technology."
  • "The only aspect that prevents it from being a perfect solution is the occasional slower response time."

What is our primary use case?

It serves as a tool for ensuring compliance and facilitating security audits and it functions as a protective measure against unauthorized data transfers, whether through email or USB devices. The primary focus revolves around maintaining compliance with regulations and safeguarding sensitive information from unauthorized transfers.

How has it helped my organization?

The primary advantage lies in preventing internal data leakage, effectively thwarting any unauthorized data transfer within the organization. Additionally, the audit functionality is invaluable, particularly given the mandatory compliance with data security laws, a requisite for every company, especially in India.

What is most valuable?

Its robust security audit and compliance functionalities prove especially beneficial for businesses in sectors like BFSI (Banking, Financial Services, and Insurance) and Information Technology. Also, the flexibility to independently set, modify, and adapt data security policies is a crucial feature, allowing users to tailor the protection measures according to their specific needs.

What needs improvement?

The only aspect that prevents it from being a perfect solution is the occasional slower response time.

For how long have I used the solution?

I have been working with it for eight months now.

What do I think about the stability of the solution?

The product is highly stable, with no reported issues.

What do I think about the scalability of the solution?

It provides excellent scalability capabilities.

How was the initial setup?

The initial setup is neither overly simplistic nor excessively complex. While it may not be effortlessly intuitive, it doesn't fall into the category of being highly intricate either. The process requires some time, patience, and a basic understanding, as individuals may find it initially challenging. This is often attributed to the unfamiliarity of information technology teams in various companies with data loss prevention solutions.

What about the implementation team?

The deployment process typically begins with a two-way proof of concept on five or six endpoints within the company. Once the POC is completed, addressing most bugs, difficulties, and fine-tuning keywords for Content Aware, the stage is set. The continuous refinement of keywords is crucial during this phase. Following the POC, any remaining issues or customizations are ironed out. Actual deployment, which usually spans about four to five days within a week, is not overly time-consuming. Larger companies may require more time and a larger team for deployment. However, in the case of smaller-sized companies, specifically those with user counts ranging from five hundred to one thousand, a two-member team is generally sufficient. The training process requires an investment of approximately three to four months for the client or customer team to familiarize themselves with the solution. Although it tends to become more straightforward with practice, the initial learning period spans around three months.

What's my experience with pricing, setup cost, and licensing?

The pricing is reasonable for this particular market.

What other advice do I have?

My recommendation for Kaspersky is highly positive. It supports all platforms, including Windows, Linux, and Mac. This broad compatibility across three different operating systems is a significant advantage. If you're someone using multiple platforms, Kaspersky proves to be an excellent and versatile option. Overall, I would rate it eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
PeerSpot user
Head IT at Trantor
Real User
It seems they have not properly tested the product, and customer support is very poor
Pros and Cons
  • "The product is forward-looking, in my opinion, which is a requirement nowadays."
  • "I have faced issues which shouldn't be related to this product. This product is purely a DLP, so it should only protect my data. I don't know what is happening with their agent or what is happening with the software, but it messes up my endpoint. For example, people are facing bandwidth issues. Before I deployed this on an endpoint, people were getting internet speeds of 40 or 50 Mbps. After deploying it, that would come down to 10 Mbps. And if I uninstalled the agent, it would go back to 50 Mbps."

What is our primary use case?

We primarily use the solution for DLP. 

What is most valuable?

I have not found any valuable features.

What needs improvement?

I bought it for my Windows, Linux, and Mac platform. Frankly speaking, I'm not happy with the product. The reason is that they have not tested the product in their environment. You can't really install it on any endpoint, because you never know what will happen.

I have faced issues which shouldn't be related to this product. This product is purely a DLP, so it should only protect my data. I don't know what is happening with their agent or what is happening with the software, but it messes up my endpoint. For example, people are facing bandwidth issues. Before I deployed this on an endpoint, people were getting internet speeds of 40 or 50 Mbps. After deploying it, that would come down to 10 Mbps. And if I uninstalled the agent, it would go back to 50 Mbps.

In my experience, they claim their product is very good, but I don't think so.

Software should be such that if you deploy it on any machine, it should not come up with issues. If it is blocking things I can understand that the engine behind the software is very good. But it is blocking things that are not required to be blocked.

The major challenge was my Linux environment, and that is why I took this product—to get it deployed on my Linux machine. But if I want to deploy it on Linux 1, 2, or 20, or some other Linux distribution, I need to reach out to the support team to get the agents. If I have paid for licenses, they should be on the portal so I can download all the different versions freely.

If I want to install it on any machine, I need to give the version of that machine and they will give me the agent. You don't know whether that agent is the latest one or not. And if you face challenges you have to go back to the support team again and say, "I have deployed it and I'm facing this issue." They will give you another version. I can't tell you all the challenges we have faced. I have not deployed it on a single Linux machine, and it was for Linux that I bought this product. I have just put it on Windows, because on Windows I am facing fewer issues compared to Mac and Linux.

It is not a straightforward installation or a straightforward configuration, for me or the end-user.

For how long have I used the solution?

I bought Endpoint Protector six months back.

What do I think about the stability of the solution?

If you talk about the server on which the application is running it's very stable. But if you talk about the agents, I have already explained how many issues I'm facing.

How are customer service and technical support?

Whenever we contacted support they would give us a resolution and we would apply it. One issue would get resolved but another issue would come up. It's like they considered us as a tester of their application.

In our company, we provide infrastructure services. People have their own environments on their endpoints. If they come across issues, every time we talk to support they tell us to show them the environment. It is not easy for us to get a developer to give control of his or her machine to CoSoSys support in order to showcase the issue.

I mentioned one point to the support team: "Please provide us the latest version of your product." That is how it happens with all products. If your company has come up with an updated version, you should reach out to your customers. Either publish it on your website, saying that you have a new version or new agent, or send an email to all your customers. When I put this comment on the ticket, the feedback I got from a support engineer was, "Please mention this to your account manager." He should not have said that. The support team should have gone to the management team and told them about the feedback they were getting from the customer. They should have said to management, "We need to incorporate these things into the system."

I never ever tell my clients to reach out to my management if they have issues. I'm here to address those issues. If I'm unable to do that, then I will reach out to my management to tell them this customer is facing these issues and we need to address them as a high-priority.

After that, I reached out to my account manager from whom I bought this product and I told him to escalate this issue. I said, first of all, that the tech team should reach out to the customer with the latest version. And secondly, that the support guy who told me to reach out to management should not have done that. The account manager escalated it to someone but I didn't get a call back on that topic.

It's a very serious matter. I was expecting a response from the account manager or from some senior person, but I never ever heard anything from the company.

It has not been so easy to get the support that I paid for. I should get prompt support during that year.

Which solution did I use previously and why did I switch?

A colleague who works with another company bought this product and he told me about it. The one thing I liked about this product was because it is for Mac, Linux, and Windows. If you go for other companies like Forcepoint or Symantec Endpoint Protection, they only give you a solution for Windows and Mac. In our company, we are about 60 percent Linux, 30 percent Windows, and 10 percent Mac.

How was the initial setup?

The server setup is very easy. They have an appliance and you just decide where you want to set it up. They give you some image files. You attach that file to your server and your server is ready. After that, you need to put your own efforts into the configuration, because with these guys the support is pathetic.

What's my experience with pricing, setup cost, and licensing?

If they gave it to me for free for the next year I would not go for this product. Pricing is one thing, but if they are not giving me a full, usable product, pricing hardly matters.

Which other solutions did I evaluate?

I have seen a demo of Forcepoint. Although it is not meant for Linux, rather for Windows and Mac, it is very easy to use. I'm thinking that if I had bought Forcepoint at least I would be okay with my Windows and Mac. Now I'm worried about all the three operating systems and I have paid a very handsome amount for the product.

In my previous company I was using Symantec and that is a wonderful product. But Linux was the challenge.

What other advice do I have?

I'm just waiting for the renewal. I will not use it again in the future.

DLP means blocking something, and I have not blocked anything. If you look at my configuration, I'm just reporting things in case something happens so I can fetch the logs and show them to management. But I don't want to face an embarrassing situation in front of management, because we are in the software service. We have proper SLAs. But if management comes to me and says, "Why didn't you guys block this?" I will not have any answer.

If I knew that support was fantastic, that if I did something and I got stuck I could reach out to support and they would help me out immediately, then I would try. But if I deploy something and I come across some issues, I don't know how much time these guys will take: two days, three days, or five days. They have no SLA. We are a startup but we have proper SLAs with our end-users and clients.

If CoSoSys made some improvements in their product and to their support, no doubt it could be very good. The product is forward-looking, in my opinion, which is a requirement nowadays. But because of the pathetic support and their internal team not doing proper testing of their product... Previously, people used to work only on Windows. But now people are mainly working on Mac or Linux. And now, because of the COVID-19 situation, people are working from home and it is necessary to deploy this product on endpoints to save company data.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
SomnathMukherjee - PeerSpot reviewer
IT consultant at Independent Consultant
Real User
A data protection solution with useful protection against data leaks via email or social media
Pros and Cons
  • "I like the data protection feature. Our users were working on a client's CRM application with a lot of client-related EIA information. We did not want the users to be able to send any of this data outside. I also like its ability to protect against data leaks via emails and social media. I like that you can deploy it quickly, and it requires no training."
  • "It would be better if they had an inbound restriction feature. For example, I work out of my home from my personal computer. All my policies can be deployed while working. When I am done, I should be able to use my machine as my personal machine, and all these policies should be waived. In the next release, I want time bound restriction of the policies because most of these users were working out of home and using their personal computers."

What is our primary use case?

We used Endpoint Protector for the users who were primarily working from home. These workers were contact agents who work on compliant applications, and the potential for client data to be exposed was significant.

What is most valuable?

I like the data protection feature. Our users were working on a client's CRM application with a lot of client-related EIA information. We did not want the users to be able to send any of this data outside. I also like its ability to protect against data leaks via emails and social media. I like that you can deploy it quickly, and it requires no training.

What needs improvement?

It would be better if they had an inbound restriction feature. For example, I work out of my home from my personal computer. All my policies can be deployed while working. When I am done, I should be able to use my machine as my personal machine, and all these policies should be waived. In the next release, I want time bound restriction of the policies because most of these users were working out of home and using their personal computers.

For how long have I used the solution?

I used Endpoint Protector for about six months.

What do I think about the stability of the solution?

Endpoint Protector is a stable solution. I didn't face any issues during my time at the organization.

On a scale from one to ten, I would give stability a nine.

What do I think about the scalability of the solution?

I was told that Endpoint Protector was a scalable solution. We have 1500 users, and I was told we could quickly scale to 5000 users.

How was the initial setup?

The initial setup was pretty straightforward. It took us some time to deploy this solution as the users were in different parts of the country. Once we connected with them, deploying this solution took about ten minutes.

On a scale from one to ten, I would give the initial setup a nine.

What about the implementation team?

A third-party vendor or partner helped us implement this solution. They were very helpful and were available during and after deployment.

What's my experience with pricing, setup cost, and licensing?

We found the pricing pretty attractive. However, volume-based pricing wasn't available.

On a scale from one to ten, I would give pricing a seven.

What other advice do I have?

I advise potential users to figure out the actual use case for deployment. For example, will it be for a corporate network or remote users? This is because the policies you will deploy will be different.

On a scale from one to ten, I would give Endpoint Protector a nine.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1518660 - PeerSpot reviewer
IT Manager at a tech vendor with 11-50 employees
Real User
Easy to set up, good reporting, and provides valuable insight into users' activities
Pros and Cons
  • "The most valuable feature is device control."
  • "I would like to see an alert feature that when a system is started, it checks to make sure that the client has the most up-to-date policies."

What is our primary use case?

We use Endpoint Protector as our data loss prevention solution for Windows, Linux, and Mac machines. Our clients work from outside of our building and in different locations, and we need to use this product to keep our data secure.

How has it helped my organization?

There are many benefits to using this solution.

In terms of the granularity of policies that we can create, this is a good product. We have created two policies that are used on Windows, Linux, and our Mac machines. The first is related to screen sharing, and the second is responsible for blocking files in email attachments.

This functionality is important to us. At the end of the day, we get reports about files, the users, and what they are doing. Preventing screen sharing with unknown people, or accepting files from somebody who is not known, are both things that I want to prevent.

We get detailed reports that identify our clients and we can see how each of them is spending their day at the office. Essentially, we have good visibility of the traffic on our endpoints.

To this point, I have not needed to lock down a variety of different USB devices. I have not used, for example, a card reader. I have only used it to lock down USB storage devices. In the future, I may use more of these features.

I have had no difficulty with using this solution in our hybrid environment that includes Windows, Linux, and Mac machines. There is no difference in features between the different platforms. There are differences such as the web browser that is used. For example, in Windows, we use Chrome, whereas, with Mac, we use Safari. Certain things are different based on the software but otherwise, everything is the same.

What is most valuable?

The most valuable feature is device control. If you have the wrong devices connected to the network then it may cost you, and this product allows you to control them. For example, you can prevent users from using an external hard disk, which is something that I like.

There is a clipboard feature to ensure that a user cannot print their screen or take a screenshot. This is one of the reasons that we feel secure when using this product.

The users are happy with using this solution on a daily basis. 

What needs improvement?

I would like to see an alert feature that when a system is started, it checks to make sure that the client has the most up-to-date policies. Before the policies are updated, nothing can be done on the system.

For how long have I used the solution?

We have been using Endpoint Protector for one year.

What do I think about the stability of the solution?

This is a stable product and we haven't had any problems with it.

What do I think about the scalability of the solution?

We have between 50 and 60 people in our organization.

How are customer service and technical support?

Within the past month or two, I have experienced problems and contacted technical support by email. They immediately responded and gave me suggestions on how to improve our security.

Normally, I send the support team an email and they answer within 24 hours. They analyze the problem and try to determine why it has occurred. They ask end-to-end questions such as what I was doing at the time, which allows them to assess and analyze all of the relevant points.

Which solution did I use previously and why did I switch?

This is the first DLP solution that we have used.

How was the initial setup?

The initial setup is very easy and there is nothing difficult about it.

Our deployment took one month and we didn't know anything about the product in advance. We didn't know exactly how it would work or which features would be added. The vendor explained everything to us after that.

What's my experience with pricing, setup cost, and licensing?

The minimum number of licenses they sell is 50 or 150 users. They do not sell, for example, a package of 10 licenses. It would be helpful if you could purchase a smaller number of licenses at one time.

Which other solutions did I evaluate?

We did not evaluate other such solutions before selecting this one.

What other advice do I have?

My advice for anybody who is considering this product is that it's user-friendly, and everyone can easily understand the details about how it works.

I am 100% confident in the security that I get from this product.

Overall, I think that our requirements for basic control, including application control, have been met. I'm happy with the current product and I like the feature set. That said, if they provide additional features in the future then we will use them.

I would rate this solution a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Download our free Netwrix Endpoint Protector Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2025
Product Categories
Data Loss Prevention (DLP)
Buyer's Guide
Download our free Netwrix Endpoint Protector Report and get advice and tips from experienced pros sharing their opinions.