It serves as a tool for ensuring compliance and facilitating security audits and it functions as a protective measure against unauthorized data transfers, whether through email or USB devices. The primary focus revolves around maintaining compliance with regulations and safeguarding sensitive information from unauthorized transfers.
Director /Founder at a energy/utilities company with 51-200 employees
A robust data loss prevention offering effective internal data leakage prevention, simplified compliance management and user-friendly customization options
Pros and Cons
- "Its robust security audit and compliance functionalities prove especially beneficial for businesses in sectors like BFSI (Banking, Financial Services, and Insurance) and Information Technology."
- "The only aspect that prevents it from being a perfect solution is the occasional slower response time."
What is our primary use case?
How has it helped my organization?
The primary advantage lies in preventing internal data leakage, effectively thwarting any unauthorized data transfer within the organization. Additionally, the audit functionality is invaluable, particularly given the mandatory compliance with data security laws, a requisite for every company, especially in India.
What is most valuable?
Its robust security audit and compliance functionalities prove especially beneficial for businesses in sectors like BFSI (Banking, Financial Services, and Insurance) and Information Technology. Also, the flexibility to independently set, modify, and adapt data security policies is a crucial feature, allowing users to tailor the protection measures according to their specific needs.
What needs improvement?
The only aspect that prevents it from being a perfect solution is the occasional slower response time.
Buyer's Guide
Netwrix Endpoint Protector
November 2024
Learn what your peers think about Netwrix Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
For how long have I used the solution?
I have been working with it for eight months now.
What do I think about the stability of the solution?
The product is highly stable, with no reported issues.
What do I think about the scalability of the solution?
It provides excellent scalability capabilities.
How was the initial setup?
The initial setup is neither overly simplistic nor excessively complex. While it may not be effortlessly intuitive, it doesn't fall into the category of being highly intricate either. The process requires some time, patience, and a basic understanding, as individuals may find it initially challenging. This is often attributed to the unfamiliarity of information technology teams in various companies with data loss prevention solutions.
What about the implementation team?
The deployment process typically begins with a two-way proof of concept on five or six endpoints within the company. Once the POC is completed, addressing most bugs, difficulties, and fine-tuning keywords for Content Aware, the stage is set. The continuous refinement of keywords is crucial during this phase. Following the POC, any remaining issues or customizations are ironed out. Actual deployment, which usually spans about four to five days within a week, is not overly time-consuming. Larger companies may require more time and a larger team for deployment. However, in the case of smaller-sized companies, specifically those with user counts ranging from five hundred to one thousand, a two-member team is generally sufficient. The training process requires an investment of approximately three to four months for the client or customer team to familiarize themselves with the solution. Although it tends to become more straightforward with practice, the initial learning period spans around three months.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable for this particular market.
What other advice do I have?
My recommendation for Kaspersky is highly positive. It supports all platforms, including Windows, Linux, and Mac. This broad compatibility across three different operating systems is a significant advantage. If you're someone using multiple platforms, Kaspersky proves to be an excellent and versatile option. Overall, I would rate it eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
system administrator at INSIGHT CREDIT UNION
Clipboard granularity works great, enabling me to see copying and pasting to specific exit points, and report on it and block it
Pros and Cons
- "Compared to a lot of the USB management systems out there, Endpoint Protector is the only one that comes with true USB management and the DLP side of it. I'm pretty impressed because I've used several solutions with DLP and USB management, and I've never seen granularity like this solution has."
- "One of the areas where there is room for improvement is support. It takes time for them to respond. They need to respond on time. Instead of sending an email, I think it would be very helpful to say, 'Let's set up a WebEx to see what's really going on,' instead of the back and forth of email."
What is our primary use case?
I was looking for a DLP solution and Endpoint Protector happened not only to help with that, but also with the USB management piece. As a credit union we have a lot of sensitive data, so we need to be able to see it at rest and block it, and not only on-premises, but off-premises as well. A lot of people work remotely now and this solution is really working for me because once the endpoint is on there, I'm still in control.
How has it helped my organization?
I've seen, through all my policies, how exit points get blocked. The eDiscovery is one of the important things in Endpoint Protector. That's been working a lot for me, especially with the remote users. The eDiscovery allows me to see data outside of the network.
I have policies right now with eDiscovery for social security number, credit card, member number, and I created a duplicate SSN. So it's finding anything where that agent is installed, anything from the computer. It's finding all that data and it's reported to me.
What is most valuable?
I don't have a single most valuable feature. Every feature is really working for me. One of the reasons I bought it was for the USB block, but that's not as much a use case anymore since I have a lot of people working remotely. It's the DLP part that is more important to me right now, to pinpoint the data that's getting moved.
The granularity enables me to not only see a file, but to read inside the file and pull out the data inside it. The granularity is really pretty good on that. It's very important. Let's say somebody just exported a file or emailed a file or uploaded a file on the internet. Seeing the inside of the file is really important to me. Whether it's encrypted or not, I still can see inside the file.
I'm the only admin on it, but the role-based access is fine. I have one user that I give access to so he can just see device control and that's it. That's all I need him to see. I was able to do that, so I'm pretty happy with the role-based access.
I use the solution's clipboard granularity feature to monitor copying and pasting to specific exit points, and it works great. People are trying to get the data any way they can, from the clipboard and things like that. I'm able to see it, report on it, and block it.
For how long have I used the solution?
I've been using Endpoint Protector for going on two years now.
What do I think about the stability of the solution?
I'm pretty impressed with its stability.
What do I think about the scalability of the solution?
I don't see any issues or limitations with scalability. As long as you have the license, everything should be fine.
I'm managing about 300 devices right now.
How are customer service and technical support?
One of the areas where there is room for improvement is support. It takes time for them to respond. They need to respond on time. Instead of sending an email, I think it would be very helpful to say, "Let's set up a WebEx to see what's really going on," instead of the back and forth of email.
Which solution did I use previously and why did I switch?
I didn't replace any solution with this one. I was looking for a USB management solution. I have competitors like ManageEngine, but when I happened to find Endpoint Protector, with the USB and the DLP side of it in one solution, it was good to have that in one platform. I was going to have to find another DLP solution to be able to manage all this.
How was the initial setup?
The initial setup was straightforward for me. They have good documentation, so if you follow everything it should be fine.
My deployment took a month. The implementation strategy for the solution was to set it up, deploy it to a couple of test machines, and see how it was behaving. Once that was done, I deployed it to everybody.
It doesn't require any maintenance on my side, other than when the updates come available. I get them installed and that's it.
What about the implementation team?
I deployed myself.
What was our ROI?
I have definitely seen return on the investment when it comes to satisfying my auditors. I can show them I'm looking at all these things. And I'm protecting the credit union at the same time. It's really all worth it.
What's my experience with pricing, setup cost, and licensing?
I don't have any issue with the licensing and pricing. I would love for it to be cheaper, but at the same time I'm getting a lot from it.
Which other solutions did I evaluate?
Compared to a lot of the USB management systems out there, Endpoint Protector is the only one that comes with true USB management and the DLP side of it. I'm pretty impressed because I've used several solutions with DLP and USB management, and I've never seen granularity like this solution has.
I haven't seen any solution like Endpoint Protector. Everybody says, "USB management: We can control, we can block, etc." And you have other solutions that are DLP only. Having it all in one place is really helpful. Not only do I have the USB management side, but I can come back and say, "All right, what's in that USB? What sensitive data is in there?"
What other advice do I have?
I'm in a Windows environment, but I see it does MacOS, Windows, open sources. It has all of that on the platform.
I'm not using the EasyLock USB Enforced Encryption app to automatically encrypt confidential data transferred to USB storage devices. I'm more monitoring it. But I have the option of force it to encrypt.
Overall, I've never seen a solution with this much granularity. I didn't expect that. I did the demo, but it was only when I actually put in my environment and saw things and said, "Oh, wow." The reporting and the analysis have provided a lot of lessons learned. I didn't think I could get that much information.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Netwrix Endpoint Protector
November 2024
Learn what your peers think about Netwrix Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Assistant It Manager at New system vietnam
Prevents 99% of ransomware
Pros and Cons
- "Endpoint Protector's best features are its protection and user-friendliness."
- "Endpoint Protector would be improved with more DLP templates."
What is our primary use case?
I use Endpoint Protector to protect our end server.
What is most valuable?
Endpoint Protector's best features are its protection and user-friendliness.
What needs improvement?
Endpoint Protector would be improved with more DLP templates.
For how long have I used the solution?
I've been using Endpoint Protector for two to three months.
What do I think about the stability of the solution?
Endpoint Protector works perfectly.
What do I think about the scalability of the solution?
Endpoint Protector is scalable.
How was the initial setup?
The initial setup is easy with a private cloud.
What other advice do I have?
Endpoint Protector has machine learning and AI, and it prevents 99% of ransomware. I would give Endpoint Protector a rating of nine out of ten.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
IT Manager at a marketing services firm with 51-200 employees
Helpful support, intuitive interface, and it effectively protects our confidential graphics files
Pros and Cons
- "The software is easy to use and the dashboard is intuitive."
- "It would be helpful if they offered discounted pricing for long-term contracts to serve customers who are interested in committing for periods of three years, five years, or longer."
What is our primary use case?
We store graphics files on our computers and they are confidential, so we implemented this product to block all of the computers from being able to send the data outside of our organization.
We use it to block USB ports so that people cannot connect an external hard drive, flash drive, or anything else that people can use to take files off of the system. Essentially, it blocks data transfer.
How has it helped my organization?
We only have two policies. The first is to block everything and the second one allows for Wi-Fi and Bluetooth connections.
This product does give us multiple choices for blocking data exit points. Without giving specifics, I can say that I know we have better security because of it.
We have Mac and PC machines, and it is very easy to manage both types. There is no noticeable difference in features between Mac and Windows machines.
We use role-based access for administering this solution, but as we are a small company, it is only insofar as having an administrative role that can perform any of the functions when needed. Some people can unblock certain policies, but we have a single administrator that can do everything.
What is most valuable?
The most valuable feature is blocking data transfer.
The software is easy to use and the dashboard is intuitive.
For how long have I used the solution?
I have been using Endpoint Protector since I joined the company five years ago. I believe that they were using it for one or two years prior to that.
What do I think about the stability of the solution?
Stability-wise, it is very good and very safe. It seems to work fine.
What do I think about the scalability of the solution?
We have approximately 117 endpoints and for the time being, I don't think that we will be expanding. We already have all of our computers.
How are customer service and technical support?
I have not used technical support often, but every time I have, it was perfect. They have good support and they have helped me very well.
Which solution did I use previously and why did I switch?
Several years ago, we used ESET but we found that it only logged the files that were transferred via the ports. This was not what we wanted to do, so we canceled the license and implemented Endpoint Protector instead for blocking the ports.
What's my experience with pricing, setup cost, and licensing?
When I last renewed the license it was for a two-year term, and they gave me the second year at half price. It was a very nice gesture. Normally, I renew my license annually and I was happy to get a discount for committing to two years. There are no costs in addition to the standard licensing fees.
It would be helpful if they offered discounted pricing for long-term contracts to serve customers who are interested in committing for periods of three years, five years, or longer. I have been with the same company for five years, it was installed when I arrived, and we are going to continue using it in the future. Perhaps after a company has completed their first year, they should propose longer contracts to them.
What other advice do I have?
My advice for anybody who is considering this product is that if they want something to protect data on both Macs and PCs then this is a very good choice. I have never worked with a product that is this easy to use.
In summary, this is a good product and for now, I think that it has everything we need. It seems to be a perfect match for us.
I would rate this solution a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
BDM at Hercules Infotech Pvt Ltd
Has an easy setup process and good technical support services
Pros and Cons
- "The product's most valuable feature is its ability to support Linux operating systems."
- "CoSoSys Endpoint Protector's network-level DLP and integration with mail servers need improvement."
What is most valuable?
The product's most valuable feature is its ability to support Linux operating systems.
What needs improvement?
CoSoSys Endpoint Protector's network-level DLP and integration with mail servers need improvement.
For how long have I used the solution?
We have been using CoSoSys Endpoint Protector for five or six years.
What do I think about the stability of the solution?
We never encountered any bugs or issues. The product has been running for many years since we set it up with the server.
What do I think about the scalability of the solution?
We have 10 CoSoSys Endpoint Protector users in our organization.
How are customer service and support?
The technical support services are good.
How was the initial setup?
CoSoSys Endpoint Protector can be deployed on the cloud and on-premises. It takes 15 minutes to set up the server and get it running. The process is easy.
What was our ROI?
The product is worth the investment.
What's my experience with pricing, setup cost, and licensing?
The product has average pricing.
What other advice do I have?
The product supports Linux systems and multiple source codes. I advise others to go for it. I rate it a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: customer/partner
Assistant Manager at Bharti Airtel Limited
A stable solution that scans all documents residing on desktops, laptops, and servers, identifying and localizing IPs
Pros and Cons
- "The console is friendly and it supports Mac."
- "They have many predefined classifiers in terms of data identifiers, and they should improve this."
What is our primary use case?
It was the unique seventy-point I used for Linux devices.
What is most valuable?
The console is friendly and it supports Mac.
What needs improvement?
They have many predefined classifiers in terms of data identifiers, and they should improve this.
As per the market perspectives, the data is driven and the usage is totally modernized. Digitally, there are lots of inventions and the data usage depends on the cloud.
For how long have I used the solution?
I have been using CoSoSys Endpoint Protector for six months.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable.
How was the initial setup?
The initial setup is easy.
What's my experience with pricing, setup cost, and licensing?
The pricing depends on the customers.
What other advice do I have?
I rate the overall solution a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Specialist at TresVista Financial Services Pvt. Ltd.
User-friendly, simple-to-use interface, good support, and protects us from data leakage
Pros and Cons
- "The interface is pretty user-friendly, neatly explained, and simple to use."
- "We are currently facing an issue where it is blocking the Winman software, which is something that we don't want to happen because we use it in our accounts department to pay taxes."
What is our primary use case?
We use this product to protect our Mac and Windows 10 endpoints.
Our main purpose is to block the uploading of Excel and PowerPoint files. We also use it to block USB devices and other peripherals that users connect to the system.
How has it helped my organization?
This product performs well and multiple things have been blocked by it.
By raising discovered issues with our team members, they are doing their part in terms of resolving them.
Endpoint Protector provides a single platform to support our Windows and Mac machines. We do not have any Linux machines in our environment. Managing DLP for our machines in this hybrid environment is pretty simple, as the product is user-friendly and we can easily find what we need.
The fact that this solution supports different operating systems is very important to us because we want to ensure that there is no data leakage.
We have one or two Macs in our organization, with the majority of people using Windows 10 machines. We haven't seen any difference in the support that this product offers for either operating system.
What is most valuable?
The Device Control feature and tools are very nice. It can also be used for containers. We have blocked multiple financial components using these features and rely on the upload and block policies. For example, we have blocked Google Drive uploads, as well as the upload functionality for other cloud spaces.
The interface is pretty user-friendly, neatly explained, and simple to use.
We are able to lock down a wide variety of USB devices, which is important to us because none of our users can connect a USB drive or other device to the machine. By preventing this, there won't be data leakage. We have experienced this in the past and we are now able to control it through the use of device policies.
The technical support that they provide works well.
We use the RDP remote desktop option to prevent copy and paste operations to remote systems. If anyone tries to copy and paste between a remote system and a local system then they will not be able to do it. This works well and it makes our operations more secure.
What needs improvement?
We are currently facing an issue where it is blocking the Winman software, which is something that we don't want to happen because we use it in our accounts department to pay taxes.
There is no option or support available for DriveHQ.
For how long have I used the solution?
We have been using Endpoint Protector for between seven and eight years.
What do I think about the stability of the solution?
This product is pretty stable.
What do I think about the scalability of the solution?
It is easy to scale. Across the organization, we have more than 900 users with Endpoint Protector deployed on their machines.
We plan to soon increase the number of licenses that we have. Our intention is to start deploying on our laptops, which will bring us to a total of approximately 1,500 licenses.
How are customer service and technical support?
We have been in touch with technical support and our experience has been pretty nice.
How was the initial setup?
This solution was easy to deploy but it was implemented before I joined the company so I don't know how long the process took.
No major upgrades have been required since I have been working with it.
What about the implementation team?
We have an in-house person who is responsible for servers, and he deployed Endpoint Protector. The process is not complex and only one person is required.
We have three system engineers, three senior system engineers, and one assistant manager in charge of maintenance.
Which other solutions did I evaluate?
We looked at a DLP product by Forcepoint but our current solution was working pretty well, so we opted not to switch.
What other advice do I have?
This is a product that has improved over time. For example, in the past, there was no option to view the ports that were not added to your list. This is now supported and some of the problems we were facing have been stopped. Another example is that we are now able to block Teams and it works pretty well, whereas, in the past, we could not block uploads or downloads with Teams.
Endpoint Protector has other features that we do not use, such as encryption. Instead, we deployed Sophos Encryption approximately six months ago for this purpose.
The biggest lesson that I have learned from using this product is how to block uploads and downloads, as well as how to lock devices on users' machines. My advice for anybody who is considering it is that it is pretty simple to use. It's a friendly environment and it's easy to block devices, uploads, and other security issues.
In summary, we have not faced many issues with Endpoint Protector and it is fulfilling our requirements, as we wanted.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
IT Manager of Information Technology Operations Manager at astrafaelcomsys.com
A versatile and user friendly solution with great customer support
Pros and Cons
- "The role-based access features for the teams that administer it is good."
- "Customization could be a lot better."
What is our primary use case?
I use the Endpoint Protector to monitor what the users or employees are doing. I monitor employee data like what they are sending, who they are sending it to, and what kind of data they're sending.
If I want to check that data, I can download it. I am checking the backup of the Endpoint Protector data weekly. If I want to monitor previous things, I can do that with the backup of the software.
It's important to create policies to protect my company data. If I create a policy that only our attachments go through our domain, only our attachments get through and not from Google, Yahoo, and others. It's blocking attachments effectively while providing me with an alert if I included an alert policy.
What is most valuable?
Endpoint Protector by CoSoSys has some valuable features. The role-based access features for the teams that administer it is good.
The granularity of the policies is good. The versatility of exit points is good. It also supports both macOS and Windows.
What needs improvement?
A lot of things can be improved. Especially customization could be a lot better.
Sometimes there are issues like when I write a policy to block finance sites. It also blocks the banking sites I have not included. Sometimes it also blocks commands I send to the machine while using Matrix software.
Whenever this happens, I have to go into the software and choose the packet inspection option or something similar. Then I have to send the command again to the machine, and if it doesn't work, I have to contact the support team. These are some of the issues I have dealt with.
For how long have I used the solution?
I have been using the Endpoint Protector by CoSoSys for over six months.
What do I think about the stability of the solution?
The stability, reliability, and availability of Endpoint Protector by CoSoSys is good.
What do I think about the scalability of the solution?
Endpoint Protector by CoSoSys is scalable and that's why we use it.
How are customer service and technical support?
The support is excellent. I got responses promptly, just like the vendor stated. If I email or call support, they are ready to assist me.
Which solution did I use previously and why did I switch?
Previously, we used Symantec Endpoint Protection, but the customer support wasn't good. I also inquired about Symantec Endpoint Protection and found out from our local vendors that the support wasn't good, and they recommended CoSoSys.
I installed CoSoSys in my system and tested it for two to three days. I made some policies like data blocking policies, mail blocking policies, attachment blocking policies, and all kinds of policies we need in our company. I tested it and felt very good about it and purchased the license.
How was the initial setup?
The initial setup and deployment are very easy. You can download the database directly, and you can purchase the license. After that, you can download the ETP client to install it. That's all you have to do.
The deployment takes about two hours. The company had a deployment plan and strategy, and I did the rest.
What about the implementation team?
I implemented the Endpoint Protector by CoSoSys all by myself.
What's my experience with pricing, setup cost, and licensing?
The price of Endpoint Protector by CoSoSys is more or less the same as other competing solutions.
Which other solutions did I evaluate?
I have installed Symantec Endpoint Protection previously, and the response wasn't good. That's why I moved to CoSoSys DLP. Before CoSoSys DLP, I checked another software, but I found it wasn't a DLP.
What other advice do I have?
If you need a good DLP software to protect your data, I recommend that you go for CoSoSys without any second thought.
Endpoint Protector by CoSoSys is a versatile solution. The important thing is to protect the data, and it does that well. I have blocked all USB connections from the users via CoSoSys Endpoint Protector.
It's very easy to use, just download the database from the internet directly, and after getting the license key, we can install and connect to the internet. Once you purchase the license, it's very easy, and 4GB of RAM and 150GB hard disk is enough for this data.
On a scale from one to ten, I would give Endpoint Protector by CoSoSys a ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Download our free Netwrix Endpoint Protector Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Data Loss Prevention (DLP)Popular Comparisons
Zscaler Zero Trust Exchange Platform
Microsoft Purview Data Loss Prevention
Forcepoint Data Loss Prevention
Symantec Data Loss Prevention
Digital Guardian
Code42 Incydr
Safetica ONE
Trend Micro Integrated Data Loss Prevention
McAfee Total Protection for Data Loss Prevention
Trellix DLP
GTB Technologies Inspector
Cyberhaven
Zecurion DLP
Buyer's Guide
Download our free Netwrix Endpoint Protector Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Symantec Endpoint vs. McAfee Complete Endpoint Protection: Technical Comparison Between Data Loss Protection Solutions
- When should companies use SSL Inspection?
- What software solution would you recommend to monitor user machines?
- What is the difference between "data protection in transit" vs "data protection at rest"?
- Looking for recommendations and a pros/cons template for software to detect insider threats
- Endpoint DLP for Mac Network
- Best alternatives to Digital Guardian for data protection?
- What is Cognitive Cybersecurity and what is it used for?
- Which solution do you prefer: Symantec DLP, Proofpoint DLP, or Microsoft Purview DLP?
- What insider threat detection tool do you recommend to a company with a modest budget?