Netwrix Endpoint Protector and Trellix DLP compete in the data loss prevention category. Trellix DLP seems to have the upper hand due to its integrated toolset and extensive feature set, offering a single console for endpoint security and additional enhancement features like AI/ML analytics.
Features: Netwrix Endpoint Protector provides Device Control, Content-Aware Protection, and role-based access, supporting Windows, macOS, and Linux. It offers granular policy management to prevent unauthorized data sharing and system access. Trellix DLP features comprehensive DLP capabilities and integration, providing a single console for endpoint security combined with AI/ML analytics, enhancing data protection efficiency.
Room for Improvement: Netwrix Endpoint Protector needs network-level DLP enhancements and more customization options, especially for Linux. Users report issues with installation on older systems and desire improved policy management. Trellix DLP lacks Linux compatibility and multiple architecture support. Its UI could be more user-friendly, and users request better encryption support in cloud solutions and quicker support response times.
Ease of Deployment and Customer Service: Netwrix Endpoint Protector supports on-premises and public cloud solutions, excelling in diverse environments with strong customer support. However, improvements are needed in the installation process and support responsiveness. Trellix DLP also supports on-premises and hybrid cloud deployments, noted for ease of deployment but concerns exist over the heavy setup workload and the need for better customer service and communication.
Pricing and ROI: Netwrix Endpoint Protector is seen as budget-friendly with reasonable pricing, though some users noted unexpected price increases. It offers ROI by aiding compliance and management simplicity. Trellix DLP's pricing is variable and considered expensive by some, yet provides significant ROI through comprehensive protection and operational efficiency.
The benefits our customers see from using Trellix DLP include cost reduction, given its competitive pricing in India.
I would rate the technical support for Netwrix Endpoint Protector as a nine because we have trained engineers, and I am also trained.
We received prompt technical support and remote sessions when necessary.
Trellix's technical support deserves a perfect rating, and I would rate it ten out of ten compared to other solutions.
The support from both the vendor and Trellix is excellent.
Everything starts from the endpoint, and we maintain the Endpoint DLP in many cases while working alongside existing DLP systems.
Trellix DLP is very scalable, especially with the cloud version as everything is managed in the cloud.
It's a bit of a fallback, and I know they are working on improving scalability.
I would rate the scalability of Trellix DLP between eight to nine out of ten.
The product has been around for over 15 years now and is very stable because I started using them from version three.
With the move to cloud provisioning, that is not a big problem anymore due to scalability on Trellix's side.
The agents are the main issue as they can behave inconsistently across different versions of operating systems.
Product stability is not a major concern; I would rate it 99% stable.
Netwrix is known as the best DLP for Apple Macintosh computers, which is noteworthy.
Having someone within a region who understands the countries and how they approach data and information security is sometimes where the problem lies.
Improved compatibility with Mac OS is needed due to ineffective policy applications.
The product also faces challenges with high CPU and memory utilization, impacting endpoint performance.
It used to be in the middle, tending towards the high end, especially in South Africa, where we need to convert from dollars to rands, making things very expensive quickly.
The solution is currently affordable and not considered expensive.
Assuming if there's a breach, we will be able to know exactly where the breach has occurred and what has occurred, and they are quite granular in how they report their information, including their logs.
Netwrix Endpoint Protector works on Linux and macOS to block USB ports, control internet access, and manage other peripheral ports.
Trellix products are manageable through a centralized control center, meeting requirements from frameworks like PCI DSS.
Additionally, it supports integration with third-party solutions and agents, providing a versatile and user-friendly management experience.
These features are very useful for protecting company confidential data from being copied to another remote location or other sites.
Content Aware Protection
Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.
Device Control
USB & peripheral port control
Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.
Enforced Encryption
Automatic USB encryption
Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.
eDiscovery
Scanning data at rest
Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans
Trellix DLP is the ultimate data loss prevention (DLP) solution, safeguarding organizations' sensitive data from unauthorized access, disclosure, or alteration. This robust system monitors and regulates data flows across networks, emails, and the web, identifying and shielding various data types such as financial, personal, intellectual property, and regulated data. Employing encryption, access control, DLP policies, and monitoring, it secures data both at rest and in transit, ensuring compliance with data security regulations and industry standards. With customizable deployment options, including on-premises, cloud-based, and hybrid, Trellix DLP offers comprehensive protection and rapid response to data loss incidents.
We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.