Try our new research platform with insights from 80,000+ expert users
2020-11-27T17:16:00Z

What is your primary use case for Endpoint Protector?

Miriam Tover - PeerSpot reviewer
  • 0
  • 10
PeerSpot user
23

23 Answers

reviewer2587170 - PeerSpot reviewer
Real User
Top 5
2024-10-22T08:43:00Z
Oct 22, 2024
Search for a product comparison
reviewer2200881 - PeerSpot reviewer
Real User
Top 20
2023-11-10T07:26:41Z
Nov 10, 2023
Alexandru Hagea - PeerSpot reviewer
MSP
Top 5
2023-09-27T08:48:00Z
Sep 27, 2023
Naman Verma. - PeerSpot reviewer
Real User
Top 5
2023-09-26T13:58:37Z
Sep 26, 2023
Shiv Ram - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-09-24T08:16:00Z
Sep 24, 2023
SomnathMukherjee - PeerSpot reviewer
Real User
Top 10
2023-03-15T09:24:38Z
Mar 15, 2023
Learn what your peers think about Netwrix Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
Dan Pham Ich - PeerSpot reviewer
Real User
2022-10-12T13:30:46Z
Oct 12, 2022
Sivakumar Mahathevan - PeerSpot reviewer
Reseller
Leaderboard
2022-05-26T10:49:45Z
May 26, 2022
AJ
Real User
2021-05-18T11:04:00Z
May 18, 2021
reviewer1560321 - PeerSpot reviewer
Real User
2021-04-21T17:00:00Z
Apr 21, 2021
SE
Real User
2021-04-13T22:12:00Z
Apr 13, 2021
BH
Real User
2021-04-07T19:13:00Z
Apr 7, 2021
RG
Real User
2021-03-10T21:41:00Z
Mar 10, 2021
reviewer1518660 - PeerSpot reviewer
Real User
2021-02-25T11:57:00Z
Feb 25, 2021
MP
Real User
2021-02-24T21:07:00Z
Feb 24, 2021
reviewer1511745 - PeerSpot reviewer
Real User
2021-02-16T23:41:00Z
Feb 16, 2021
reviewer1497009 - PeerSpot reviewer
Real User
2021-01-27T18:02:00Z
Jan 27, 2021
AA
Real User
2020-12-27T09:22:00Z
Dec 27, 2020
RW
Real User
2020-12-16T06:53:00Z
Dec 16, 2020
SG
Real User
2020-12-09T05:46:00Z
Dec 9, 2020
Mohammad Amir Hossain - PeerSpot reviewer
Real User
2020-12-08T05:42:00Z
Dec 8, 2020
MC
Real User
2020-12-08T05:42:00Z
Dec 8, 2020
DS
Reseller
2020-11-27T17:16:00Z
Nov 27, 2020
Content Aware Protection Scanning data in motion Monitor, control and block file transfers. Detailed control through both content and context inspection. Device Control USB & peripheral port control Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more. Enforced Encryption Automatic USB encryption Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient. ...
Download Netwrix Endpoint Protector ReportRead more