---
description: Review of Netwrix Endpoint Protector Software: system overview, features, price and cost information. Get free demos and compare to similar programs.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Netwrix Endpoint Protector | Reviews, Pricing & Demos - SoftwareAdvice GB
---

Breadcrumb: [Home](/) > [Endpoint Protection Software](/directory/4777/endpoint-protection-software/software) > [Netwrix Endpoint Protector](/software/11310/endpoint-protector-4)

# Netwrix Endpoint Protector

Canonical: https://www.softwareadvice.co.uk/software/11310/endpoint-protector-4

Page: 1 / 2\
Next: [Next page](https://www.softwareadvice.co.uk/software/11310/endpoint-protector-4?page=2)

> Endpoint Protector by CoSoSys is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, and Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) platforms. The solution protects from data leaks, theft, and exfiltration, it minimizes the risk of insider threats and helps companies to reach compliance with data protection regulations such as the GDPR, CCPA, PCI DSS, HIPAA, and more.&#10;&#10;&#10;It features specialized modules that clients can pick and choose from based on their needs: Device Control (USB and peripheral port control), Content Aware Protection (safeguards data in motion), eDiscovery (scans data at rest), and Enforced Encryption (secures USB storage devices).&#10;&#10;&#10;With the eDiscovery feature, data at rest stored on employees’ endpoints can be scanned based on specific file types, predefined content, file names, regular expressions or compliance profiles for regulations such as HIPAA, GDPR, and NIST. Based on the scan results, remediation actions like encrypting and deleting data can be taken.&#10;&#10;&#10;Support is offered through online help portal.
> 
> Verdict: Rated **4.4/5** by 8 users. Top-rated for **Likelihood to recommend**.

-----

## Quick Stats & Ratings

| Metric | Rating | Detail |
| **Overall** | **4.4/5** | 8 Reviews |
| Ease of Use | 4.0/5 | Based on overall reviews |
| Customer Support | 4.3/5 | Based on overall reviews |
| Value for Money | 4.0/5 | Based on overall reviews |
| Features | 4.3/5 | Based on overall reviews |
| Recommendation percentage | 80% | (8/10 Likelihood to recommend) |

## About the vendor

- **Company**: Netwrix
- **Location**: Irvine, US
- **Founded**: 2006

## Commercial Context

- **Pricing model**:  (Free Trial)
- **Pricing Details**: Contact CoSoSys for pricing details.
- **Target Audience**: 2–10, 11–50, 51–200, 201–500, 501–1,000, 1,001–5,000, 5,001–10,000, 10,000+
- **Deployment & Platforms**: Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop), Windows (On-Premise), Linux (On-Premise)
- **Supported Languages**: English
- **Available Countries**: Australia, Canada, France, Germany, India, Ireland, Israel, Italy, Malaysia, Mexico, Netherlands, New Zealand, Philippines, Romania, Singapore, South Africa, Türkiye, United Arab Emirates, United Kingdom, United States

## Features

- Alerts/Escalation
- Alerts/Notifications
- Automatic Backup
- Compliance Management
- Compliance Tracking
- Data Storage Management
- Device Management
- Encryption
- Endpoint Protection Software
- File Transfer
- HIPAA Compliant
- Password Management
- Policy Management
- Real-Time Notifications
- Real-Time Reporting
- Risk Alerts
- Sensitive Data Identification
- Whitelisting/Blacklisting

## Support Options

- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat

## Category

- [Endpoint Protection Software](https://www.softwareadvice.co.uk/directory/4777/endpoint-protection-software/software)

## Related Categories

- [Computer Security Software](https://www.softwareadvice.co.uk/directory/4528/security/software)
- [Data Loss Prevention Software](https://www.softwareadvice.co.uk/directory/4270/data-loss-prevention/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.uk/directory/4777/endpoint-protection-software/software)

## Alternatives

1. [ESET Endpoint Security](https://www.softwareadvice.co.uk/software/134149/eset-endpoint-security) — 4.7/5 (1169 reviews)
2. [Safetica](https://www.softwareadvice.co.uk/software/427221/safetica-nxt) — 4.7/5 (141 reviews)
3. [NinjaOne](https://www.softwareadvice.co.uk/software/349671/ninjarmm) — 4.7/5 (282 reviews)
4. [Cypherdog Encryption](https://www.softwareadvice.co.uk/software/368999/cypherdog-e-mail-encryption) — 4.8/5 (103 reviews)
5. [BLACKbox](https://www.softwareadvice.co.uk/software/368197/blackbox) — 4.5/5 (49 reviews)

## Reviews

### "Endpoint Protector is a great enterprise solution for data loss prevention needs" — 4.0/5

> **Verified Reviewer** | *9 February 2021* | Information Technology & Services | Recommendation rating: 8.0/10
> 
> **Pros**: Endpoint Protector has compatibility with all major operating systems. Endpoint Protector's granularity on who or which computer gets what policies makes it easy to apply Endpoint Protector to many use cases.
> 
> **Cons**: The flow of the user interface could use some work and unification. It takes a bit to get used to and there's a few breaks in the flow that I find a bit annoying at times.
> 
> We needed to unify our data loss prevention solution and Endpoint Protector checked all our key requirements and more. Support is very responsive and the rollout was super easy.

-----

### "Endpoint review" — 4.0/5

> **Bokang** | *11 July 2024* | Legal Services | Recommendation rating: 10.0/10
> 
> **Pros**: User friendly as the text and labeling are very discriptive.
> 
> **Cons**: A lot of tabs can be overwhelming which needs a getting used to.
> 
> Excellent service which needs time and practice to get used to but highly functional.

-----

### "If you are looking for a product that protects source code, this is not for you" — 4.0/5

> **Gustavo** | *18 February 2021* | Computer Software | Recommendation rating: 5.0/10
> 
> **Pros**: Easy to use and configure, agents GPO deployment
> 
> **Cons**: Lot’s and lot’s of false positives when trying to check for code leaks, so many in fact, that it make it unusable for this purpose
> 
> Not happy, For example set up rules to prevente html code leaks. And it doesn’t work, because if you double click an html file and the browser opens it, then EPP think you are trying to leak it via web browser and block it, this is absurd

-----

### "Data Security Defined" — 5.0/5

> **Gatu** | *18 February 2021* | Legal Services | Recommendation rating: 8.0/10
> 
> **Pros**: Client Data and information is well secured
> 
> **Cons**: Not cloud based for ease of deployment for remote users
> 
> Experience is Good, one general view of attempted transfer of files across users

-----

### "Endpoint Protector product review" — 4.0/5

> **Kofi Brako** | *22 March 2023* | Design | Recommendation rating: 7.0/10
> 
> **Pros**: I would say that the device control capabilities are really good. The device control section offers various types of device access control, which can be tailored to suit our specific needs and requirements.
> 
> **Cons**: For now I don't have negative reviews. I guess I will have to keep using for a little longer.
> 
> The customization options are extensive, allowing us to fine-tune the device control settings to our liking. I would recommend.

-----

Page: 1 / 2\
Next: [Next page](https://www.softwareadvice.co.uk/software/11310/endpoint-protector-4?page=2)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/software/11310/endpoint-protector-4)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/software/11310/endpoint-protector-4> |
| en | <https://www.softwareadvice.com/security/endpoint-protector-4-profile/> |
| en-AU | <https://www.softwareadvice.com.au/software/11310/endpoint-protector-4> |
| en-GB | <https://www.softwareadvice.co.uk/software/11310/endpoint-protector-4> |
| en-IE | <https://www.softwareadvice.ie/software/11310/endpoint-protector-4> |
| en-NZ | <https://www.softwareadvice.co.nz/software/11310/endpoint-protector-4> |
| fr | <https://www.softwareadvice.fr/software/11310/endpoint-protector-4> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.uk/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"Netwrix Endpoint Protector","description":"Endpoint Protector by CoSoSys is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, and Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) platforms. The solution protects from data leaks, theft, and exfiltration, it minimizes the risk of insider threats and helps companies to reach compliance with data protection regulations such as the GDPR, CCPA, PCI DSS, HIPAA, and more.\n\n\nIt features specialized modules that clients can pick and choose from based on their needs: Device Control (USB and peripheral port control), Content Aware Protection (safeguards data in motion), eDiscovery (scans data at rest), and Enforced Encryption (secures USB storage devices).\n\n\nWith the eDiscovery feature, data at rest stored on employees’ endpoints can be scanned based on specific file types, predefined content, file names, regular expressions or compliance profiles for regulations such as HIPAA, GDPR, and NIST. Based on the scan results, remediation actions like encrypting and deleting data can be taken.\n\n\nSupport is offered through online help portal.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/4fbcfee0-907f-4868-b7e2-9eddd786cc36.png","url":"https://www.softwareadvice.co.uk/software/11310/endpoint-protector-4","@type":"SoftwareApplication","@id":"https://www.softwareadvice.co.uk/software/11310/endpoint-protector-4#software","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"aggregateRating":{"@type":"AggregateRating","bestRating":5,"ratingCount":8,"ratingValue":4.4},"operatingSystem":"Cloud, Apple, Windows, Windows on premise, Linux on premise"},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Endpoint Protection Software","position":2,"item":"/directory/4777/endpoint-protection-software/software","@type":"ListItem"},{"name":"Netwrix Endpoint Protector","position":3,"item":"/software/11310/endpoint-protector-4","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/software/11310/endpoint-protector-4#breadcrumblist"}]}
</script>
