No more typing reviews! Try our Samantha, our new voice AI agent.
Netwrix Endpoint Protector Logo

Netwrix Endpoint Protector pros and cons

Vendor: Netwrix
4.2 out of 5

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Netwrix Endpoint Protector's most valuable features include Device Control, Content-Aware Protection, Enforced Encryption, and eDiscovery.
The ability to use a device serial number to unlock specific machines or allow full access to particular devices, such as phones and USBs, is a highlight.
Versatility in locking down USB devices and supporting exit points ensures data security within organizations.
Granularity in policy creation and management provides flexibility, with the ability to handle users both inside and outside the organization.
Netwrix Endpoint Protector supports Linux and macOS for USB port blocking, internet access control, and peripheral ports management.

CONS

If CoSoSys develops a suite of Host DLP, Network DLP, and SaaS DLP, it would address all DLP aspects.
There are significant challenges with uninstalling and reinstalling Netwrix Endpoint Protector, especially on older systems like XP and Windows 10, leading to registry issues and the need for manual adjustments.
Response times from support could be improved, as they often rely on email rather than direct communication like WebEx setup.
Network-level DLP and mail server integration in CoSoSys Endpoint Protector require enhancements.
The system would benefit from a feature allowing users to manually add applications for monitoring without relying on vendor support.
 

Netwrix Endpoint Protector Pros review quotes

Sivakumar Mahathevan - PeerSpot reviewer
Head of Sales and Technical - Malaysia at Halodata
Jun 18, 2025
The Data Loss Prevention (DLP) Netwrix Endpoint Protector product is one of the easiest DLPs that can be installed, and I think that we have successfully deployed many of these in the Asia Pacific region.
SB
Senior System Administrator at Exotel Techcom Pvt. Ltd
Aug 28, 2025
When the implementation occurred, we were functional within a month, with no need for follow-up support.
Mohammad Amir Hossain - PeerSpot reviewer
Head of IT Infrastructure at a tech vendor with 10,001+ employees
Dec 5, 2024
Netwrix Endpoint Protector works on Linux and macOS to block USB ports, control internet access, and manage other peripheral ports.
Learn what your peers think about Netwrix Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
893,221 professionals have used our research since 2012.
SunnyKumar - PeerSpot reviewer
Senior IT Engineer at Instawork
Sep 26, 2023
The core of its value lies in obtaining logs remotely and exercising control over what employees can or cannot use.
SB
Director /Founder at Touchstone Machine Tap
Nov 10, 2023
Its robust security audit and compliance functionalities prove especially beneficial for businesses in sectors like BFSI (Banking, Financial Services, and Insurance) and Information Technology.
Naman Verma. - PeerSpot reviewer
Security Delivery Specialist at a consultancy with 10,001+ employees
Sep 26, 2023
All of the features are effective, but the highlight feature of the product was the data layer inspection. When we talk about a DLP product, data packet inspection is very important. Securing data at rest is easy, but securing data in transit is challenging. We used it comprehensively to secure end drives, data transfers, secure hard drives, and end-user machines. It proved monumental in our operations.
it_user1549800 - PeerSpot reviewer
Information Technology Security Engineer at a comms service provider with 10,001+ employees
Apr 7, 2021
The search for keywords is very important in our security operations because one of the key use cases we had was for the ability to search keyword-based on an internal database of keywords that have been submitted by other project managers within the company that's around intellectual property. The ability to search on keywords was part of that.
Shiv Ram - PeerSpot reviewer
Assistant Manager at Bharti Airtel Limited
Sep 24, 2023
The console is friendly and it supports Mac.
SomnathMukherjee - PeerSpot reviewer
IT consultant at Independent Consultant
Mar 15, 2023
I like the data protection feature. Our users were working on a client's CRM application with a lot of client-related EIA information. We did not want the users to be able to send any of this data outside. I also like its ability to protect against data leaks via emails and social media. I like that you can deploy it quickly, and it requires no training.
it_user1579650 - PeerSpot reviewer
Senior Engineer at GIG kuwait
May 18, 2021
It is fantastic in terms of the granularity of the policies. It has many built-in policies, and we can add or create more policies as well. It is perfect, and it gives us more options. We have some users who go outside and then come inside. With EPP, we can even control those users who are outside. If they need to access the media that we are using right now, we can provide OTP messages so that they can access the media even when they are outside of their organization. With our previous solution, we were facing some issues in doing this.
 

Netwrix Endpoint Protector Cons review quotes

Sivakumar Mahathevan - PeerSpot reviewer
Head of Sales and Technical - Malaysia at Halodata
Jun 18, 2025
The areas of Netwrix Endpoint Protector that need to be improved include a desire for more graphical interfaces in their systems, as many people today would prefer to see graphical formats for data presentation.
SB
Senior System Administrator at Exotel Techcom Pvt. Ltd
Aug 28, 2025
Not all the policies applied to the Linux clients were as effective as those for Mac and Windows.
Mohammad Amir Hossain - PeerSpot reviewer
Head of IT Infrastructure at a tech vendor with 10,001+ employees
Dec 5, 2024
In Linux, it is difficult to control uninstallation. Users can uninstall it at any time, and we can only monitor that it is uninstalled.
Learn what your peers think about Netwrix Endpoint Protector. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
893,221 professionals have used our research since 2012.
SunnyKumar - PeerSpot reviewer
Senior IT Engineer at Instawork
Sep 26, 2023
It would be helpful to implement filtering mechanisms so that we can sort and view the data based on software and vendor, providing more clarity and ease in analysis.
SB
Director /Founder at Touchstone Machine Tap
Nov 10, 2023
The only aspect that prevents it from being a perfect solution is the occasional slower response time.
Naman Verma. - PeerSpot reviewer
Security Delivery Specialist at a consultancy with 10,001+ employees
Sep 26, 2023
Endpoint Protector, in particular, had some features to be desired for the Mac operating system.
it_user1549800 - PeerSpot reviewer
Information Technology Security Engineer at a comms service provider with 10,001+ employees
Apr 7, 2021
I would rate the role-based access features for administrators a six out of ten. There's work to be done on the granularity of roles that can be assigned to an administrator but there is role-based administrator access present. That's why it's not a zero rating.
Shiv Ram - PeerSpot reviewer
Assistant Manager at Bharti Airtel Limited
Sep 24, 2023
They have many predefined classifiers in terms of data identifiers, and they should improve this.
SomnathMukherjee - PeerSpot reviewer
IT consultant at Independent Consultant
Mar 15, 2023
It would be better if they had an inbound restriction feature. For example, I work out of my home from my personal computer. All my policies can be deployed while working. When I am done, I should be able to use my machine as my personal machine, and all these policies should be waived. In the next release, I want time bound restriction of the policies because most of these users were working out of home and using their personal computers.
it_user1579650 - PeerSpot reviewer
Senior Engineer at GIG kuwait
May 18, 2021
We are using it to only apply media restrictions. When we are installing a new agent, we have to install EPP manually on a device. It would be great if the installations can be done from the server instead of me going to each PC or device to implement EPP or using a policy. They should have some sort of system so that a domain admin can install EPP on all PCs from a central manager.