

Netwrix Endpoint Protector and Zscaler Zero Trust Exchange Platform are direct competitors in data protection. Zscaler appears to have the upper hand with better cloud integration and user praise, despite its higher cost.
Features: Netwrix Endpoint Protector supports device and content-aware protection, enforced encryption, and eDiscovery across Windows, macOS, and Linux. Zscaler Zero Trust Exchange Platform offers seamless cloud integration, comprehensive internet security, and easy usability.
Room for Improvement: Netwrix Endpoint Protector needs network-level DLP enhancements and better policy granularity on macOS and Linux. Zscaler's high costs and limitations in granular SSL inspection present challenges. Improvements in external access and SaaS integration are suggested.
Ease of Deployment and Customer Service: Netwrix is versatile with on-premises support for Windows, Mac, and Linux but is noted for occasional inefficiencies in customer support. Zscaler's hybrid and cloud deployment models offer seamless integration, with its customer support generally receiving higher accolades.
Pricing and ROI: Netwrix Endpoint Protector is budget-friendly though its value is sometimes questioned against more feature-rich competitors. Zscaler, while expensive, justifies its cost through a tailored zero trust feature set, providing a satisfactory ROI through enhanced security and compliance.
When I see that I am trying to cut costs, for example, even when replacing Prisma, we have managed to save about over half a million dollars a year.
We don't have to purchase many components such as load balancers and proxy servers that were necessary in traditional setups.
I never needed to contact the vendor for technical support because we faced very few issues.
I would rate the technical support for Netwrix Endpoint Protector as a nine because we have trained engineers, and I am also trained.
Sometimes, support takes time since the solution has some bugs that need fixing.
They have provided the numbers and contact supports, and it is almost immediate.
Everything starts from the endpoint, and we maintain the Endpoint DLP in many cases while working alongside existing DLP systems.
This solution is scalable because prior to onboarding it, we took references from the vendor, the implementation vendor, and the CoSoSys team.
The only limitation I was mentioning is that it was unable to identify the sources of vulnerability, which they are going to embed by the mid of this year.
The product has been around for over 15 years now and is very stable because I started using them from version three.
Stability-wise, the solution is stable; we experienced no downtimes during our two years of usage.
Zscaler Zero Trust Exchange Platform is very stable.
Netwrix is known as the best DLP for Apple Macintosh computers, which is noteworthy.
Not all the policies applied to the Linux clients were as effective as those for Mac and Windows.
Zscaler Zero Trust Exchange Platform probably needs to be more efficient because scanning takes a lot of time.
They might be able to identify if something is missing with Zscaler.
Zscaler Zero Trust Exchange Platform is much, much cheaper when comparing price.
Assuming if there's a breach, we will be able to know exactly where the breach has occurred and what has occurred, and they are quite granular in how they report their information, including their logs.
In the dashboard, one system was utilizing two licenses for a single system.
Netwrix Endpoint Protector works on Linux and macOS to block USB ports, control internet access, and manage other peripheral ports.
We have excellent account management, smooth marketplace engagement, and processing in how my team or organization uses Zscaler Zero Trust Exchange Platform.
Since we started using Zscaler Zero Trust Exchange Platform, it has auto-configuration, and wherever we have deployed the auto-configuration, we have not encountered any problem.
The solution is cloud-based with the latest inspection engines, which I find to be amazing.
| Product | Market Share (%) |
|---|---|
| Zscaler Zero Trust Exchange Platform | 4.4% |
| Netwrix Endpoint Protector | 1.9% |
| Other | 93.7% |


| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 9 |
| Large Enterprise | 6 |
| Company Size | Count |
|---|---|
| Small Business | 16 |
| Midsize Enterprise | 12 |
| Large Enterprise | 42 |
Content Aware Protection
Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.
Device Control
USB & peripheral port control
Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.
Enforced Encryption
Automatic USB encryption
Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.
eDiscovery
Scanning data at rest
Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans
Zscaler Zero Trust Exchange enhances security with seamless cloud-based connectivity and VPN-less operation, offering integration with multiple identity providers and advanced security features, suitable for remote work environments.
Zscaler Zero Trust Exchange provides secure, adaptive connectivity without traditional VPNs, allowing organizations to replace legacy systems and bolster remote work security. The platform offers cloud-based protection, single sign-on, dynamic URL categorization, and scalable solutions. While advanced security features like DLP and threat protection enhance data protection, users may face issues with speed, connectivity, and some customization options. Integration challenges, latency due to multi-tenant hosting, reporting delays, and licensing costs require consideration. It supports secure internet access and private application security, ensuring traffic control and data compliance.
What are the key features of Zscaler Zero Trust Exchange?
What are the benefits of using Zscaler Zero Trust Exchange?
Zscaler Zero Trust Exchange is deployed across industries to secure remote access and enforce zero trust principles. Organizations in finance, healthcare, and technology sectors utilize it for secure internet access and visibility into cloud applications, enhancing performance and compliance in dynamic environments.
We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.