Try our new research platform with insights from 80,000+ expert users

BigID Next vs Netwrix Endpoint Protector comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 22, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.3
BigID Next offers strong ROI through compliance, data management integration, cost savings, automation, and reduced staffing, avoiding fines.
Sentiment score
7.1
Netwrix Endpoint Protector provides compliance, data security, and reduced IT workload, preventing breaches and satisfying auditors.
It is one of the best tools in the market.
Senior Manager at KPMG
We have seen returns across all three aspects: fewer employees needed, money saved, and time saved with BigID.
Senior Security Consultant at a consultancy with 10,001+ employees
I have seen a return on investment from using BigID, particularly as it is a regulatory and compliance tool that helps avoid potential penalties for non-compliance.
Senior Security Consultant at a consultancy with 10,001+ employees
 

Customer Service

Sentiment score
6.5
BigID Next's support is praised for responsiveness, efficiency, and high customer satisfaction, despite occasional delays and time-consuming initial contact.
Sentiment score
7.7
Netwrix Endpoint Protector support receives mixed reviews, praised for responsiveness, but some cite delays and communication issues.
BigID has one of the best technical support teams.
Senior Manager at KPMG
I would rate the customer support a six because you cannot directly reach out to L3 or L2 support if there's a major issue.
Senior Security Consultant at a consultancy with 10,001+ employees
developing the custom connectors was relatively easy because of the courses I attended at BigID University and the support given by the BigID engineering team.
Senior Security Consultant at a consultancy with 10,001+ employees
I would rate the technical support for Netwrix Endpoint Protector as a nine because we have trained engineers, and I am also trained.
Head of Sales and Technical - Malaysia at Halodata
I never needed to contact the vendor for technical support because we faced very few issues.
Senior System Administrator at Exotel Techcom Pvt. Ltd
 

Scalability Issues

Sentiment score
6.7
BigID Next is scalable with mixed opinions, excelling in large environments but facing data handling and presentation challenges.
Sentiment score
7.3
Netwrix Endpoint Protector is efficient and scalable, though some face challenges with policy management and non-Windows OS compatibility.
I have added very large data sources to the BigID environment, and it remains stable.
Senior Security Consultant at a consultancy with 10,001+ employees
BigID is scalable, allowing you to purchase as many scanners as you want.
Senior Security Consultant at a consultancy with 10,001+ employees
Everything starts from the endpoint, and we maintain the Endpoint DLP in many cases while working alongside existing DLP systems.
Head of Sales and Technical - Malaysia at Halodata
This solution is scalable because prior to onboarding it, we took references from the vendor, the implementation vendor, and the CoSoSys team.
Senior System Administrator at Exotel Techcom Pvt. Ltd
 

Stability Issues

Sentiment score
7.5
BigID Next is often seen as reliable with some stability concerns but praised for data security and ease of use.
Sentiment score
8.2
Netwrix Endpoint Protector is praised for high stability, reliable performance, minimal downtime, and excellent support across environments.
BigID is generally stable, however, there is a noted issue with bulk tagging that can affect scan results.
Senior Associate - IT Governance and Compliance at Fulcrum Digital Inc
The product has been around for over 15 years now and is very stable because I started using them from version three.
Head of Sales and Technical - Malaysia at Halodata
Stability-wise, the solution is stable; we experienced no downtimes during our two years of usage.
Senior System Administrator at Exotel Techcom Pvt. Ltd
 

Room For Improvement

BigID Next needs enhancements in file access, security, automation, UI navigation, deployment, data governance, and support features.
Netwrix Endpoint Protector needs improvements in customization, installation, UI consistency, alert notifications, and network DLP features across platforms.
There is also an issue with incident tagging, where all objects get tagged without an option to untag specific ones, and reverting changes is only possible through MongoDB Central, which can lead to data loss for certain periods.
Senior Associate - IT Governance and Compliance at Fulcrum Digital Inc
I want them to focus on data mapping, assessment, automation workflow, and privacy incident management.
Senior Manager at KPMG
BigID deserves recognition for the data discovery part, which has been wonderful and quite accurate, along with the confidence level process that allows us to fine-tune results for better accuracy from the database.
Assistant Manager - Cyber : Digital Privacy and Trust at Deloitte
Netwrix is known as the best DLP for Apple Macintosh computers, which is noteworthy.
Head of Sales and Technical - Malaysia at Halodata
Not all the policies applied to the Linux clients were as effective as those for Mac and Windows.
Senior System Administrator at Exotel Techcom Pvt. Ltd
 

Setup Cost

BigID Next offers premium, capacity-based pricing; valued by large enterprises for advanced features, less feasible for smaller businesses.
Netwrix Endpoint Protector offers competitive pricing, flexible subscriptions, and aligns costs with features for organizations of various sizes.
BigID might be expensive as it involves various paid services, like data retention and graphic rights management.
Senior Associate - IT Governance and Compliance at Fulcrum Digital Inc
The pricing is competitive in the market, however, I need to ask for the right price.
Senior Manager at KPMG
 

Valuable Features

BigID Next offers a user-friendly design, seamless Microsoft integration, and powerful data discovery, classification, and protection capabilities.
Netwrix Endpoint Protector offers device control, content-aware protection, robust compliance, and security controls for cross-platform data protection.
One of the best features of BigID is its strength in data discovery and governance.
Senior Manager at KPMG
BigID simplifies things by integrating both data protection and data privacy in one environment, making it easier for end users.
Senior Security Consultant at a consultancy with 10,001+ employees
The most valuable feature of BigID is its large number of classifiers, which allow us to scan for specific data such as SSN numbers.
Senior Associate - IT Governance and Compliance at Fulcrum Digital Inc
Assuming if there's a breach, we will be able to know exactly where the breach has occurred and what has occurred, and they are quite granular in how they report their information, including their logs.
Head of Sales and Technical - Malaysia at Halodata
Netwrix Endpoint Protector works on Linux and macOS to block USB ports, control internet access, and manage other peripheral ports.
Head of IT Infrastructure at a tech vendor with 10,001+ employees
License utilization was a concern as when we were changing the hostname from asset category to asset tag and from personal hostnames to asset tags, it started taking multiple licenses.
Senior System Administrator at Exotel Techcom Pvt. Ltd
 

Categories and Ranking

BigID Next
Ranking in Data Loss Prevention (DLP)
7th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Data Governance (6th), Data Privacy Management Software (2nd), Data Security Posture Management (DSPM) (4th), AI Data Analysis (2nd)
Netwrix Endpoint Protector
Ranking in Data Loss Prevention (DLP)
13th
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
29
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Data Loss Prevention (DLP) category, the mindshare of BigID Next is 3.4%, down from 4.5% compared to the previous year. The mindshare of Netwrix Endpoint Protector is 1.9%, down from 3.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Loss Prevention (DLP) Market Share Distribution
ProductMarket Share (%)
BigID3.4%
Netwrix Endpoint Protector1.9%
Other94.7%
Data Loss Prevention (DLP)
 

Featured Reviews

Aniruddha Nath - PeerSpot reviewer
Senior Security Consultant at a consultancy with 10,001+ employees
Data discovery has transformed compliance workflows and automation now speeds up requests and remediation
The best feature that BigID offers is data discovery and classification, which is the most powerful engine. It allows connecting to many different data sources, ranging from cloud to on-premises to structured to unstructured data. If there is no connector available, you can build your own classifiers as well. Regarding the custom classifier option, you can build custom classifiers using regular expressions, and I have done that if you know how to create regular expressions. Custom connectors are something you create to connect to a database where the connector is not available. BigID has positively impacted my organization as it's a very powerful tool, especially with the increasing regulatory compliances for different countries such as GDPR, CCPA, and India's recent DPDPA act. Having these tools in place greatly helps organizations avoid any penal charges for not being compliant with the regulatory compliances. For example, regarding compliance or reduced risks for my clients, the DSAR process I was talking about allows organizations to respond quickly to user data deletion requests under GDPR law, which traditionally has a 30-day or 60-day timeline. In larger organizations, when the number of requests is high, it becomes tedious. However, using DSAR automation with BigID, it's almost instantaneous; instead of 30 days, you can respond in just one day to what users have requested.
Sivakumar Mahathevan - PeerSpot reviewer
Head of Sales and Technical - Malaysia at Halodata
Provides robust compliance with advanced threat protection and user-friendly interfaces
The features of Netwrix Endpoint Protector that I have found most valuable so far are the two main key modules which are Content Aware Protection (CAP) and Device Control (DC), which is the hottest selling item from my perspective as a consultant. I find CAP and DC valuable because they are very granular in nature and it's easily understood and easily configured. That's why it's easy for us to actually position this product to any organizations with no complications. My impression on the multi-layered protection features of this solution is quite positive because now they've expanded to more things in the DLP itself, that are as good as an enterprise DLP solution. Therefore, I feel that in terms of its pricing values and so on, it is very competitive. I assess the value of the comprehensive reporting and auditing capabilities provided by Netwrix Endpoint Protector as very good because I am a user myself prior to this, before becoming a reseller and now a distributor. I am actually a walking dictionary for this particular product. The comprehensive reporting and auditing capabilities are quite granular in terms of gaining insights. We can actually deep dive into quite a lot of things and find a lot of information that they already have. Assuming if there's a breach, we will be able to know exactly where the breach has occurred and what has occurred, and they are quite granular in how they report their information, including their logs. Therefore, they conform to all compliance regulatory bodies too. My impression of the centralized management console feature of Netwrix Endpoint Protector is that it is one of the simplest centralized monitoring features that even a kid would understand, which is what we need in today's world—nothing complicated. My impression of the data encryption and control over portable storage devices features of this solution is that they are very good, especially the device controls, which I really enjoy using, particularly when it comes to portable devices USBs and the encryption tools that they have, which is another module called E-lock, or enforce encryption, that they do have. They are well-protected along those lines.
report
Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
22%
Insurance Company
9%
Computer Software Company
8%
Manufacturing Company
6%
Financial Services Firm
10%
Manufacturing Company
10%
University
9%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business5
Large Enterprise11
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise9
Large Enterprise6
 

Questions from the Community

What do you like most about BigID?
I like BigID's in-depth discovery and scanning capabilities, especially for unstructured data. This feature is a standout compared to competitors. The tool's data classification capabilities are i...
What needs improvement with BigID?
One improvement I would suggest is addressing the intermittent failures of BigID scans, as there are times when some errors occur. I think the BigID team is aware of this and works on resolving iss...
What is your primary use case for BigID?
BigID's main use case is connecting to various data sources to perform the data discovery process, classify the data within those systems, and identify sensitive information across various structur...
What is your experience regarding pricing and costs for Endpoint Protector?
When we started, the price was reasonable, but it has been increasing over time. I rate the price as four, indicating it is a bit high.
What needs improvement with Endpoint Protector?
The licensing issue was eventually resolved by the team, but the Linux client issue persisted. Not all the policies applied to the Linux clients were as effective as those for Mac and Windows. That...
What is your primary use case for Endpoint Protector?
Our main use case involved compliance requirements stating that we wanted to have DLP functionality on our endpoint devices, mainly regarding device control for USB peripheral ports. We wanted to p...
 

Also Known As

No data available
CoSoSys Endpoint Protector
 

Overview

 

Sample Customers

Home Depot, Grant Thornton LLP, Cimpress, Fidelity Investments
Samsung, Toyota, Philips, Zeppelin, Western Union, eBay
Find out what your peers are saying about BigID Next vs. Netwrix Endpoint Protector and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.