Netwrix Endpoint Protector is a data loss prevention tool which assists businesses of all sizes with data encryption and file scanning. Key features of the platform include compliance management and reporting, policy management, device control, and sensitive data identification.
Netwrix Endpoint Protector is a data loss prevention tool which assists businesses of all sizes with data encryption and file scanning. Key features...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus,...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.4 /5
(8)

Ease of Use

4/ 5

Features

4.3/ 5

Customer Service

4.3/ 5

Value for Money

4/ 5

Overall rating

4.2 /5
(1,807)

Ease of Use

4.2/ 5

Features

4.2/ 5

Customer Service

4.1/ 5

Value for Money

4.0/ 5

Total features 17

  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Application Security
  • Automatic Backup
  • Compliance Management
  • Compliance Tracking
  • Data Security
  • Data Storage Management
  • Device Management
  • Encryption
  • File Transfer
  • HIPAA Compliant
  • Network Provisioning
  • Password Management
  • Policy Management
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Risk Alerts
  • Sensitive Data Identification
  • Threat Intelligence
  • Threat Response
  • Whitelisting/Blacklisting

Total features 8

  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Application Security
  • Automatic Backup
  • Compliance Management
  • Compliance Tracking
  • Data Security
  • Data Storage Management
  • Device Management
  • Encryption
  • File Transfer
  • HIPAA Compliant
  • Network Provisioning
  • Password Management
  • Policy Management
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Risk Alerts
  • Sensitive Data Identification
  • Threat Intelligence
  • Threat Response
  • Whitelisting/Blacklisting