Netwrix Endpoint Protector is a data loss prevention tool which assists businesses of all sizes with data encryption and file scanning. Key features of the platform include compliance management and reporting, policy management, device control, and sensitive data identification.
Netwrix Endpoint Protector is a data loss prevention tool which assists businesses of all sizes with data encryption and file scanning. Key features...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Stop ransomware with policy-driven endpoint protection. ThreatLocker enables organizations of all sizes with Zero Trust controls such as application allowlisting, Ringfencing, elevation and storage controls, as well as operational alerts.
Stop ransomware with policy-driven endpoint protection. ThreatLocker enables organizations of all sizes with Zero Trust controls such as application...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

US$0.01

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.4 /5
(8)

Ease of Use

4/ 5

Features

4.3/ 5

Customer Service

4.3/ 5

Value for Money

4/ 5

Overall rating

4.9 /5
(81)

Ease of Use

4.5/ 5

Features

4.8/ 5

Customer Service

4.9/ 5

Value for Money

4.8/ 5

Total features 17

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Audit Trail
  • Automatic Backup
  • Backup and Recovery
  • Behavioral Analytics
  • Compliance Management
  • Compliance Tracking
  • Configuration Management
  • Continuous Monitoring
  • Customizable Reports
  • Data Security
  • Data Storage Management
  • Device Management
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • File Transfer
  • Firewalls
  • HIPAA Compliant
  • Issue Management
  • Monitoring
  • Network Security Software
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Creation
  • Policy Management
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Real-Time Updates
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Secure Login
  • Security Auditing
  • Sensitive Data Identification
  • Server Monitoring
  • Summary Reports
  • Third-Party Integration
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Whitelisting/Blacklisting
  • Workflow Management

Total features 51

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Audit Trail
  • Automatic Backup
  • Backup and Recovery
  • Behavioral Analytics
  • Compliance Management
  • Compliance Tracking
  • Configuration Management
  • Continuous Monitoring
  • Customizable Reports
  • Data Security
  • Data Storage Management
  • Device Management
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • File Transfer
  • Firewalls
  • HIPAA Compliant
  • Issue Management
  • Monitoring
  • Network Security Software
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Creation
  • Policy Management
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Real-Time Updates
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Secure Login
  • Security Auditing
  • Sensitive Data Identification
  • Server Monitoring
  • Summary Reports
  • Third-Party Integration
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Whitelisting/Blacklisting
  • Workflow Management
Not provided by vendor
  • Auth0
  • ConnectWise PSA
  • Datto RMM
  • HaloPSA
  • IT Glue
  • Kaseya BMS
  • Okta
  • ServiceNow
  • Splunk Enterprise