

Netwrix Endpoint Protector and Zscaler Zero Trust Exchange Platform compete in the data protection category. Based on feature richness and cloud integration, Zscaler seems to have the upper hand due to its robust internet traffic security and ease of deployment in cloud environments.
Features: Netwrix Endpoint Protector offers distinguished cross-platform DLP features, including USB control, Content-Aware Protection, and effective data transfer prevention. Zscaler excels with its seamless cloud application integration, advanced internet traffic security features, and extensive cloud-based security measures that justify its higher cost for many users.
Room for Improvement: Netwrix Endpoint Protector users suggest improvements in policy management, Linux support, and deployment processes. Zscaler customers point to high costs, interface intuitiveness, and network dependency issues impacting performance as areas needing enhancement.
Ease of Deployment and Customer Service: Netwrix Endpoint Protector is primarily used on-premises with detailed support, though response times vary. Zscaler is favored in cloud and hybrid settings, recognized for responsive and knowledgeable support, despite occasional delays.
Pricing and ROI: Netwrix Endpoint Protector is seen as competitively priced, offering good ROI in compliance and data protection. In contrast, Zscaler's higher pricing aligns with its comprehensive features and scalability, delivering a positive ROI, especially for large-scale cloud deployments.
We don't have to purchase many components such as load balancers and proxy servers that were necessary in traditional setups.
I would rate the technical support for Netwrix Endpoint Protector as a nine because we have trained engineers, and I am also trained.
I never needed to contact the vendor for technical support because we faced very few issues.
Sometimes, support takes time since the solution has some bugs that need fixing.
Everything starts from the endpoint, and we maintain the Endpoint DLP in many cases while working alongside existing DLP systems.
This solution is scalable because prior to onboarding it, we took references from the vendor, the implementation vendor, and the CoSoSys team.
The product has been around for over 15 years now and is very stable because I started using them from version three.
Stability-wise, the solution is stable; we experienced no downtimes during our two years of usage.
Netwrix is known as the best DLP for Apple Macintosh computers, which is noteworthy.
Not all the policies applied to the Linux clients were as effective as those for Mac and Windows.
They might be able to identify if something is missing with Zscaler.
Assuming if there's a breach, we will be able to know exactly where the breach has occurred and what has occurred, and they are quite granular in how they report their information, including their logs.
License utilization was a concern as when we were changing the hostname from asset category to asset tag and from personal hostnames to asset tags, it started taking multiple licenses.
Netwrix Endpoint Protector works on Linux and macOS to block USB ports, control internet access, and manage other peripheral ports.
We have excellent account management, smooth marketplace engagement, and processing in how my team or organization uses Zscaler Zero Trust Exchange Platform.
The solution is cloud-based with the latest inspection engines, which I find to be amazing.
| Product | Market Share (%) |
|---|---|
| Zscaler Zero Trust Exchange Platform | 4.4% |
| Netwrix Endpoint Protector | 1.9% |
| Other | 93.7% |


| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 9 |
| Large Enterprise | 6 |
| Company Size | Count |
|---|---|
| Small Business | 16 |
| Midsize Enterprise | 12 |
| Large Enterprise | 41 |
Content Aware Protection
Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.
Device Control
USB & peripheral port control
Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.
Enforced Encryption
Automatic USB encryption
Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.
eDiscovery
Scanning data at rest
Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans
Zscaler Zero Trust Exchange enhances security with seamless cloud-based connectivity and VPN-less operation, offering integration with multiple identity providers and advanced security features, suitable for remote work environments.
Zscaler Zero Trust Exchange provides secure, adaptive connectivity without traditional VPNs, allowing organizations to replace legacy systems and bolster remote work security. The platform offers cloud-based protection, single sign-on, dynamic URL categorization, and scalable solutions. While advanced security features like DLP and threat protection enhance data protection, users may face issues with speed, connectivity, and some customization options. Integration challenges, latency due to multi-tenant hosting, reporting delays, and licensing costs require consideration. It supports secure internet access and private application security, ensuring traffic control and data compliance.
What are the key features of Zscaler Zero Trust Exchange?
What are the benefits of using Zscaler Zero Trust Exchange?
Zscaler Zero Trust Exchange is deployed across industries to secure remote access and enforce zero trust principles. Organizations in finance, healthcare, and technology sectors utilize it for secure internet access and visibility into cloud applications, enhancing performance and compliance in dynamic environments.
We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.