Try our new research platform with insights from 80,000+ expert users

Mimecast Insider Risk Management and Data Protection vs Netwrix Endpoint Protector comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 11, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Data Loss Prevention (DLP)
21st
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Email Security (20th), Secure Web Gateways (SWG) (15th), Cloud Access Security Brokers (CASB) (11th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (13th), Access Management (12th), Bot Management (3rd), ZTNA as a Service (8th), ZTNA (3rd), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Mimecast Insider Risk Manag...
Ranking in Data Loss Prevention (DLP)
17th
Average Rating
9.0
Reviews Sentiment
7.4
Number of Reviews
78
Ranking in other categories
No ranking in other categories
Netwrix Endpoint Protector
Ranking in Data Loss Prevention (DLP)
14th
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
29
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Data Loss Prevention (DLP) category, the mindshare of Cloudflare One is 1.7%, up from 1.3% compared to the previous year. The mindshare of Mimecast Insider Risk Management and Data Protection is 2.8%, up from 1.7% compared to the previous year. The mindshare of Netwrix Endpoint Protector is 2.0%, down from 2.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Loss Prevention (DLP) Mindshare Distribution
ProductMindshare (%)
Netwrix Endpoint Protector2.0%
Mimecast Insider Risk Management and Data Protection2.8%
Cloudflare One1.7%
Other93.5%
Data Loss Prevention (DLP)
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
Chuck_Mackey - PeerSpot reviewer
Director, Cybersecurity Consulting at a tech services company with 51-200 employees
Provides comprehensive visibility and protection, helps in identifying the gaps in security, and comes with excellent onboarding support
In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization. We ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious. It would just turn away. The agents were not being distributed. It was just churning and churning and churning. When we were looking for specific categories of data, it was getting bogged down, but that was not even so much Code42, although some of it was their issue. It really has to do with the overall infrastructure and what the organization is prepared to do. If the infrastructure or the networking is a little hinky or you don't have a really finely tuned network infrastructure environment and your patches aren't up to date on your servers and your endpoints, it could get a little sticky. Other than that, it was okay. We really didn't have much problem beyond that. It took a couple of days to sort that out, but it was no big deal.
Sivakumar Mahathevan - PeerSpot reviewer
Head of Sales and Technical - Malaysia at Halodata
Provides robust compliance with advanced threat protection and user-friendly interfaces
The features of Netwrix Endpoint Protector that I have found most valuable so far are the two main key modules which are Content Aware Protection (CAP) and Device Control (DC), which is the hottest selling item from my perspective as a consultant. I find CAP and DC valuable because they are very granular in nature and it's easily understood and easily configured. That's why it's easy for us to actually position this product to any organizations with no complications. My impression on the multi-layered protection features of this solution is quite positive because now they've expanded to more things in the DLP itself, that are as good as an enterprise DLP solution. Therefore, I feel that in terms of its pricing values and so on, it is very competitive. I assess the value of the comprehensive reporting and auditing capabilities provided by Netwrix Endpoint Protector as very good because I am a user myself prior to this, before becoming a reseller and now a distributor. I am actually a walking dictionary for this particular product. The comprehensive reporting and auditing capabilities are quite granular in terms of gaining insights. We can actually deep dive into quite a lot of things and find a lot of information that they already have. Assuming if there's a breach, we will be able to know exactly where the breach has occurred and what has occurred, and they are quite granular in how they report their information, including their logs. Therefore, they conform to all compliance regulatory bodies too. My impression of the centralized management console feature of Netwrix Endpoint Protector is that it is one of the simplest centralized monitoring features that even a kid would understand, which is what we need in today's world—nothing complicated. My impression of the data encryption and control over portable storage devices features of this solution is that they are very good, especially the device controls, which I really enjoy using, particularly when it comes to portable devices USBs and the encryption tools that they have, which is another module called E-lock, or enforce encryption, that they do have. They are well-protected along those lines.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloudflare Access is a stable solution."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"Cloudflare is simple to use."
"The simplicity of the solution is its valuable features as almost no effort was needed to learn the configurations. It is also one of the cheapest firewalls available in this category."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"It will take the blow rather than our applications should an attack occur."
"What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection."
"Cloudflare Zero Trust Platform removes the risk of exposing the applications to the public."
"CrashPlan is one of the top three software implementations I have ever been involved with in 15 years."
"The solution is very stable. Very rarely do we have any issues with it. We don't have to deal with bugs or glitches. It doesn't crash or freeze. We find it to be reliable."
"Numerous real world restorations on servers and laptops, central administration ensures we see who isn't backed up before they lose data."
"This product is great for data recovery."
"We have confidence that any files stored on a PC or a Mac for any length of time will be backed up and available to be restored."
"Customer Service: Best support portal I have ever used."
"ROI was immediate since we didn't have any way to monitor remote users backups and was able to recover accidentally deleted files within the first week."
"I can recommend CrashPlan to anyone."
"Compared to a lot of the USB management systems out there, Endpoint Protector is the only one that comes with true USB management and the DLP side of it. I'm pretty impressed because I've used several solutions with DLP and USB management, and I've never seen granularity like this solution has."
"I like the data protection feature. Our users were working on a client's CRM application with a lot of client-related EIA information. We did not want the users to be able to send any of this data outside. I also like its ability to protect against data leaks via emails and social media. I like that you can deploy it quickly, and it requires no training."
"CoSoSys can control most of this part and it has absolutely, 100% helped to reduce important data from going out of our organization."
"It also provides us with the ability to lock down a wide variety of USB devices, which is pretty important because we don't want certain data accessed. It does a really good job when it comes to the versatility of the exit points it supports, making sure that important data does not leave our organization."
"The versatility regarding the exit point Endpoint Protector supports in making sure that important data doesn't leave our organization is vital for us. In the industry that we're in, data breaches are a significant concern. While our staff is contractually required to maintain confidentiality and they're all very aware that they shouldn't try and transfer company data of different classifications elsewhere to non-company devices, there's a risk."
"The device control is a big deal for us because we can actually lock out removable drives and different types of hardware. It allows us to have better control over what end-users plug into their computers, and we can have deny lists and tighten our security posture."
"Compared to a lot of the USB management systems out there, Endpoint Protector is the only one that comes with true USB management and the DLP side of it, and I've never seen granularity like this solution has."
"There are a lot of features, but the main feature is that I can use a device serial number to unlock any particular machine or for all machines. If I have a phone, like a Samsung phone, I can whitelist that specific phone for full access wherever it is plugged into any of our devices. This is the same with a USB, because most USBs come in bulk and have the same serial number. I can then whitelist that particular USB to be read-write with full access."
 

Cons

"Lacks a VPN feature to provide a secure connection to the data center."
"Cloudflare One is not very powerful, but for what we require, it is basic and sufficient."
"The initial onboarding was causing us some confusion."
"They don't have a person to provide support for customers using the solution under their free plan."
"The initial onboarding was causing us some confusion."
"The free plan has limitations. For example, I can only set up three rules, and the application firewall is unavailable."
"Cloudflare Zero Trust Platform needs to improve its documentation. It took time to do the implementation."
"Our customers no longer use Cloudflare because its service is subpar."
"Upgrade process a bit time consuming, but worth the time."
"Hey, Code 42! Isn't it time that we lose the Java dependency??"
"It's a bit thick, so it takes time for admins to utilize full capabilities of the product."
"It's very user friendly...when it works."
"CrashPlan deployment and integration with existing systems was easy, but the interface could be more helpful to non-tech savvy users."
"Not available for iPads yet."
"In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization; we ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious."
"In the places we have slower connections it has a time out problem."
"The areas of Netwrix Endpoint Protector that need to be improved include a desire for more graphical interfaces in their systems, as many people today would prefer to see graphical formats for data presentation."
"Because it is only an Endpoint Protector at this point in time, it does not have a network DLP component. There's only an endpoint DLP component. In the future, it would be good if a network DLP component could be embedded and extended to have network DLP capabilities."
"Because it is only an Endpoint Protector at this point in time, it does not have a network DLP component."
"One of the areas where there is room for improvement is support. It takes time for them to respond. They need to respond on time. Instead of sending an email, I think it would be very helpful to say, 'Let's set up a WebEx to see what's really going on,' instead of the back and forth of email."
"In Linux a user can remove a getent anytime. There is no control there on the file structure in Linux. So if this solution could give us information on what users removed in the dashboard, it would help us."
"Endpoint Protector would be improved with more DLP templates."
"When we started, the price was reasonable, but it has been increasing over time."
"Not all the policies applied to the Linux clients were as effective as those for Mac and Windows."
 

Pricing and Cost Advice

"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The solution's pricing lacks transparency."
"The prices are slightly expensive."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"Cloudflare Zero Trust Platform's pricing is good."
"The solution is not that expensive."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"They were the best solution and surprisingly enough, the cheapest."
"The pricing is reasonable. It's my understanding that the cost is about $7 for unlimited storage in the cloud per server."
"It used to be a good solution for SOHO in particular as it had unlimited storage for a reasonable price. However, their pricing model has changed and they are now primarily targeting enterprise users."
"It was expensive. It was more expensive than Eureka, and it was more expensive than Barracuda Backup, but what we got was a full team. They didn't come in and nickel and dime us. They provided the assistance we needed. They didn't say that they need to charge us for something or it is going to take another statement of work. It was all bundled into it... We pay for the software maintenance. It is probably 18% or 20% of the license fee for rev releases."
"It is 100% worth the cost to get and keep the support, especially when setting it up."
"The price of Endpoint Protector by CoSoSys is more or less the same as other competing solutions."
"For what it's doing, the cost is somewhat high for us, but it's the cost of doing business with the clients that we have."
"The pricing depends on the customers."
"[The pricing] is reasonable compared to what's out there."
"We found the pricing pretty attractive. However, volume-based pricing wasn't available."
"The pricing is reasonable for this particular market."
"The solution’s pricing is a normal industry standard and depends on customers and salespersons."
"Pricing is quite reasonable. For smaller organizations, it lets them get into the product domain, whereas a lot of vendors won't even talk to them. CoSoSys is just about at that sweet spot of being serious enough that you have to budget for it, but at the same time, affordable enough that the value is well worth it."
report
Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
885,264 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
13%
Comms Service Provider
10%
Computer Software Company
8%
Financial Services Firm
7%
Manufacturing Company
12%
Performing Arts
6%
Outsourcing Company
6%
Financial Services Firm
6%
Financial Services Firm
11%
University
10%
Computer Software Company
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise11
By reviewers
Company SizeCount
Small Business24
Midsize Enterprise24
Large Enterprise30
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise9
Large Enterprise6
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What is your primary use case for Code42 Incydr?
Data Leakage Protection on large scale environments. This can be to protect against leakage on endpoints and servers ...
What is your experience regarding pricing and costs for Endpoint Protector?
When we started, the price was reasonable, but it has been increasing over time. I rate the price as four, indicating...
What needs improvement with Endpoint Protector?
The licensing issue was eventually resolved by the team, but the Linux client issue persisted. Not all the policies a...
What is your primary use case for Endpoint Protector?
Our main use case involved compliance requirements stating that we wanted to have DLP functionality on our endpoint d...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
Mimecast Incydr, Code42 Next-Gen DLP, Code42 Next-Gen Data Loss Protection, Code42 Forensic File Search, Code42 Backup + Restore
CoSoSys Endpoint Protector
 

Overview

 

Sample Customers

23andMe
Adobe, Okta, Samsung, Taylormade, Boston University, Lending Club, North Highland, Stanford University, Ping Identity, Qualcomm, Pandora.
Samsung, Toyota, Philips, Zeppelin, Western Union, eBay
Find out what your peers are saying about Mimecast Insider Risk Management and Data Protection vs. Netwrix Endpoint Protector and other solutions. Updated: March 2026.
885,264 professionals have used our research since 2012.