Try our new research platform with insights from 80,000+ expert users

Amazon Macie vs Netwrix Endpoint Protector comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare
Sponsored
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
77
Ranking in other categories
CDN (1st), WAN Optimization (4th), Distributed Denial-of-Service (DDoS) Protection (1st), Managed DNS (1st), Domain Name System (DNS) Security (5th), Cloud Security Posture Management (CSPM) (12th)
Amazon Macie
Average Rating
7.4
Reviews Sentiment
5.2
Number of Reviews
3
Ranking in other categories
Data Loss Prevention (DLP) (16th)
Netwrix Endpoint Protector
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
29
Ranking in other categories
Data Loss Prevention (DLP) (13th)
 

Featured Reviews

HA
Owner at Hga consulting
Has helped manage client domains with streamlined access control and threat visibility
I don't know what areas could be improved with Cloudflare WAF; Cloudflare is constantly improving and adding features to their feature set. They're doing a good job, and as far as DNS and support for any domains that I create or my clients create, it's mandatory for me to make sure that they have Cloudflare as their DNS provider. The Cloudflare load balancing capability hasn't really helped in enhancing my website's uptime and resiliency because we don't really get that much traffic; it's mostly remote users, and web hosting is done by a web hosting service. It doesn't pay to try to host your own website.
reviewer2069877 - PeerSpot reviewer
Vice President at a tech services company with 51-200 employees
Provides real-time alerts and efficient data governance with easy integration
The best features of Amazon Macie include sensitive data identification, particularly for PII, which is pre-built and helpful because we don't have to define it ourselves. Those features are already embedded, which was beneficial. Additionally, some insights and alerts were coming up that were also pre-configured. It's not difficult to do that, but it's more of a build versus buy decision. These features were of great help to us. My experience with Amazon Macie's ability to provide alerts for suspicious activity in real-time has been good. We utilized the alerts for threat detection. Customizable features of Amazon Macie have helped significantly in maintaining fine-grained control over access and usage of sensitive information, offering a good combination of personalized options and out-of-the-box solutions.
Sivakumar Mahathevan - PeerSpot reviewer
Head of Sales and Technical - Malaysia at Halodata
Provides robust compliance with advanced threat protection and user-friendly interfaces
The features of Netwrix Endpoint Protector that I have found most valuable so far are the two main key modules which are Content Aware Protection (CAP) and Device Control (DC), which is the hottest selling item from my perspective as a consultant. I find CAP and DC valuable because they are very granular in nature and it's easily understood and easily configured. That's why it's easy for us to actually position this product to any organizations with no complications. My impression on the multi-layered protection features of this solution is quite positive because now they've expanded to more things in the DLP itself, that are as good as an enterprise DLP solution. Therefore, I feel that in terms of its pricing values and so on, it is very competitive. I assess the value of the comprehensive reporting and auditing capabilities provided by Netwrix Endpoint Protector as very good because I am a user myself prior to this, before becoming a reseller and now a distributor. I am actually a walking dictionary for this particular product. The comprehensive reporting and auditing capabilities are quite granular in terms of gaining insights. We can actually deep dive into quite a lot of things and find a lot of information that they already have. Assuming if there's a breach, we will be able to know exactly where the breach has occurred and what has occurred, and they are quite granular in how they report their information, including their logs. Therefore, they conform to all compliance regulatory bodies too. My impression of the centralized management console feature of Netwrix Endpoint Protector is that it is one of the simplest centralized monitoring features that even a kid would understand, which is what we need in today's world—nothing complicated. My impression of the data encryption and control over portable storage devices features of this solution is that they are very good, especially the device controls, which I really enjoy using, particularly when it comes to portable devices USBs and the encryption tools that they have, which is another module called E-lock, or enforce encryption, that they do have. They are well-protected along those lines.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The overall experience with Cloudflare is positive, with a rating of eight out of ten."
"I rate its stability a ten out of ten."
"It's a great product because it's scalable, has great coverage, and is mature with good defenses against DDoS attacks."
"I like Cloudflare's application gateway and DDoS protection."
"The most valuable feature of Cloudflare DNS is its global reach and it is always evolving."
"The tool is user-friendly."
"The solution offers the flexibility to control configuration rules."
"The UI is good."
"The tool's performance is good."
"The detailed reports on data privacy risk provided by Amazon Macie are really good and have contributed positively to our data governance strategies."
"The tool gives confidence that our configuration is safe."
"The most valuable aspects of the solution is the device control, which manages any portable device connected to the endpoint, and content-aware protection, which controls data in motion from the endpoint to outside, like when users try to upload data to a web browser or an instant messaging application."
"The device control is a big deal for us because we can actually lock out removable drives and different types of hardware. It allows us to have better control over what end-users plug into their computers, and we can have deny lists and tighten our security posture."
"There are a lot of features, but the main feature is that I can use a device serial number to unlock any particular machine or for all machines. If I have a phone, like a Samsung phone, I can whitelist that specific phone for full access wherever it is plugged into any of our devices. This is the same with a USB, because most USBs come in bulk and have the same serial number. I can then whitelist that particular USB to be read-write with full access."
"There are effectively two areas of DLP to look at from a technical perspective. One is how it performs the pickup of information traversing the system and the other is how the policy engine, which analyzes the data, works. On the first aspect, CoSoSys is probably best of breed for macOS because they're reasonably well-integrated into the operating system. They're looking at the file system operations level, not at the execution level."
"The console is friendly and it supports Mac."
"All of the features are effective, but the highlight feature of the product was the data layer inspection. When we talk about a DLP product, data packet inspection is very important. Securing data at rest is easy, but securing data in transit is challenging. We used it comprehensively to secure end drives, data transfers, secure hard drives, and end-user machines. It proved monumental in our operations."
"It is fantastic in terms of the granularity of the policies. It has many built-in policies, and we can add or create more policies as well. It is perfect, and it gives us more options. We have some users who go outside and then come inside. With EPP, we can even control those users who are outside. If they need to access the media that we are using right now, we can provide OTP messages so that they can access the media even when they are outside of their organization. With our previous solution, we were facing some issues in doing this."
"Compared to a lot of the USB management systems out there, Endpoint Protector is the only one that comes with true USB management and the DLP side of it. I'm pretty impressed because I've used several solutions with DLP and USB management, and I've never seen granularity like this solution has."
 

Cons

"Technical support is not well developed. While there are good engineers, Cloudflare does not offer hands-on technical support to fix customer problems but rather a self-service model."
"An integrated SSO feature would be useful for Cloudflare DNS."
"It should have easier documentation for the configuration. It's very technical and people who aren't technical should also be able to do the configuration."
"We're facing challenges due to an upgrade in the machine learning model. The problem arises from some users abusing the APIs, resulting in an influx of suspicious traffic. Cloudflare's learning model mistakenly identifies this traffic as human. Consequently, it assigns it a higher trust score, akin to legitimate human traffic, causing complications in our architecture. Previously, such traffic would have been categorized as suspicious, enabling us to apply appropriate blocking rules. However, we encounter difficulties distinguishing between genuine and suspicious traffic with the new categorization. Despite these challenges, overall, Cloudflare remains the preferred solution compared to Azure, AWS CloudFront, and Google Cloud Armor."
"It should be easier to collect the logs with companies like Sumo. However, based on my discussions with the salespeople, I understand that's how they make their money. With the enterprise product, they want people doing those kinds of enterprise features to do the logging. They want them to pay a lot of money, and that's where I have an issue with them. That should be a default. You should be able to get the log no matter what. The logging should be universal."
"Areas like how assessment, discovery, and payload are dealt with and how it all comes into your organization can be considered when trying to make suggestions to Cloudflare for improvements."
"There might be helpful if there was some web application firewall feature."
"There should be a specific price list for enterprise-level customers."
"Amazon Macie is expensive."
"If CoSoSys comes up with a suite of Host DLP, along with Network DLP and SaaS DLP, it will cover all of the aspects of a DLP solution."
"I would rate the role-based access features for administrators a six out of ten. There's work to be done on the granularity of roles that can be assigned to an administrator but there is role-based administrator access present. That's why it's not a zero rating."
"They have many predefined classifiers in terms of data identifiers, and they should improve this."
"Sometimes, it should try to focus on one thing rather than multiple things. Endpoint Protector does device control very well, which is why we use that particular function."
"I would like to see an alert feature that when a system is started, it checks to make sure that the client has the most up-to-date policies."
"Currently, for additional applications that need monitoring by the EPP, a request must be made to their technical support. It would be beneficial to add a feature allowing users to manually add applications for monitoring without depending on the vendor."
"In Linux a user can remove a getent anytime. There is no control there on the file structure in Linux. So if this solution could give us information on what users removed in the dashboard, it would help us."
"In Linux, it is difficult to control uninstallation. Users can uninstall it at any time, and we can only monitor that it is uninstalled."
 

Pricing and Cost Advice

"It's a premium model. You can start at zero and work your way up to the enterprise model, which has a very high pricing level."
"The pricing depends on the usage, but the cheapest would be around 5,000 USD a month."
"I give the price a five out of ten."
"In terms of licensing costs, we don't pay for licensing for Cloudflare. We only establish communication, then for peering, Cloudflare takes care of the cross-connection in different data centers."
"The tool is a premium product, so it is very expensive."
"For Cloudflare, I recommend it heavily for small businesses with revenue under a couple of million dollars. Onboarding is easy, and they even have a free plan. This makes it simple for businesses in the $100,000-$500,000 range to try it out and see its value, allowing them to scale up their infrastructure as needed."
"The solution has many features but there are ones that you need to pay for. Sometimes you have to find out which is available for free and which you have to pay for."
"That is one of the great features. I was able to access the majority of the features and services for free."
"You need to pay per usage."
"The price of Endpoint Protector by CoSoSys is more or less the same as other competing solutions."
"It has a fair price. They just changed recently from perpetual licensing. When I bought it, I bought it on perpetual license, then they changed the whole company policy to go to subscription. It was a bit of a shock to us because we haven't upgraded it that many times. However, after speaking to CoSoSys directly, they gave us a very good renewal price."
"Pricing is quite reasonable. For smaller organizations, it lets them get into the product domain, whereas a lot of vendors won't even talk to them. CoSoSys is just about at that sweet spot of being serious enough that you have to budget for it, but at the same time, affordable enough that the value is well worth it."
"We found the pricing pretty attractive. However, volume-based pricing wasn't available."
"The pricing depends on the customers."
"The product has average pricing."
"The pricing is reasonable for this particular market."
"This is a budget-friendly solution that covers all the aspects of host-level DLP."
report
Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
879,853 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
10%
Comms Service Provider
10%
Manufacturing Company
8%
Financial Services Firm
21%
Manufacturing Company
8%
Computer Software Company
8%
Insurance Company
7%
Computer Software Company
10%
Financial Services Firm
10%
Manufacturing Company
10%
University
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business46
Midsize Enterprise8
Large Enterprise25
No data available
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise9
Large Enterprise6
 

Questions from the Community

Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
Cloudflare. We are moving from Akamai prolexic to Cloudflare. Cloudflare anycast network outperforms Akamai static GR...
Which would you choose - Cloudflare DNS or Quad9?
Cloudflare DNS is a very fast, very reliable public DNS resolver. It is an enterprise-grade authoritative DNS service...
What do you like most about Cloudflare?
Cloudflare offers CDN and DDoS protection. We have the front end, API, and database in how you structure applications.
What needs improvement with Amazon Macie?
From my perspective, Amazon Macie can be improved by extending PII to make it more collaborative between the customer...
What is your primary use case for Amazon Macie?
We are trying to use Amazon Macie for pattern matching, which is one of the things that we are doing, along with sens...
What advice do you have for others considering Amazon Macie?
I haven't used the automated data discovery feature of Amazon Macie. We wanted to assess the multi-account management...
What is your experience regarding pricing and costs for Endpoint Protector?
When we started, the price was reasonable, but it has been increasing over time. I rate the price as four, indicating...
What needs improvement with Endpoint Protector?
The licensing issue was eventually resolved by the team, but the Linux client issue persisted. Not all the policies a...
What is your primary use case for Endpoint Protector?
Our main use case involved compliance requirements stating that we wanted to have DLP functionality on our endpoint d...
 

Also Known As

Cloudflare DNS
No data available
CoSoSys Endpoint Protector
 

Overview

 

Sample Customers

Trusted by over 9,000,000 Internet Applications and APIs, including Nasdaq, Zendesk, Crunchbase, Steve Madden, OkCupid, Cisco, Quizlet, Discord and more.
EDMUNDS, AUTODESK
Samsung, Toyota, Philips, Zeppelin, Western Union, eBay
Find out what your peers are saying about Amazon Macie vs. Netwrix Endpoint Protector and other solutions. Updated: December 2025.
879,853 professionals have used our research since 2012.