Try our new research platform with insights from 80,000+ expert users

GTB Technologies Inspector vs Netwrix Endpoint Protector comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare
Sponsored
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
77
Ranking in other categories
CDN (1st), Distributed Denial-of-Service (DDoS) Protection (1st), Managed DNS (1st), Cloud Security Posture Management (CSPM) (12th)
GTB Technologies Inspector
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
Data Loss Prevention (DLP) (29th)
Netwrix Endpoint Protector
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
29
Ranking in other categories
Data Loss Prevention (DLP) (8th)
 

Featured Reviews

Carlos Alam Hernandez Baruch - PeerSpot reviewer
Fast and secure deployments simplify operations for government and fintech clients
It is a fast and secure DNS. It is very easy to deploy, and my customers are happy with this tool. Additionally, the CDN performance in Mexico is excellent, providing fast service and tools. It offers reliability during high-traffic periods, ensuring no impact on the environment. It helps my clients avoid using on-premise boxes, simplifying operations as they only use the prices on Cloudflare.
Marcelo Grandchamp - PeerSpot reviewer
Enables organizations to monitor the network and protect themselves from data leakage
The initial setup process is very simple and easy. We have no issues to do it for ourselves or our customers. The deployment takes less than 20 days. The integration is very simple. However, first, we must understand what we want to have on our network and what we want to prevent. If we don't have this information before we start the configuration, we will be lost. We must know what kind of protection we need in our company. We have LGPD in Brazil. It is similar to GDPR in Europe. It prevents any personal information from being linked to other companies without permission. We have to take care of the personal information of our customers, employees, and partners. To deploy the tool, we must understand what we need to do. We must download the whole package and have our infrastructure ready to receive it. We must get the SSL certification and start to configure our platform. When the process is finished, we must roll out a small portion of our network to ensure everything will be well. After that, we must do the full rollout.
Sivakumar Mahathevan - PeerSpot reviewer
Provides robust compliance with advanced threat protection and user-friendly interfaces
The features of Netwrix Endpoint Protector that I have found most valuable so far are the two main key modules which are Content Aware Protection (CAP) and Device Control (DC), which is the hottest selling item from my perspective as a consultant. I find CAP and DC valuable because they are very granular in nature and it's easily understood and easily configured. That's why it's easy for us to actually position this product to any organizations with no complications. My impression on the multi-layered protection features of this solution is quite positive because now they've expanded to more things in the DLP itself, that are as good as an enterprise DLP solution. Therefore, I feel that in terms of its pricing values and so on, it is very competitive. I assess the value of the comprehensive reporting and auditing capabilities provided by Netwrix Endpoint Protector as very good because I am a user myself prior to this, before becoming a reseller and now a distributor. I am actually a walking dictionary for this particular product. The comprehensive reporting and auditing capabilities are quite granular in terms of gaining insights. We can actually deep dive into quite a lot of things and find a lot of information that they already have. Assuming if there's a breach, we will be able to know exactly where the breach has occurred and what has occurred, and they are quite granular in how they report their information, including their logs. Therefore, they conform to all compliance regulatory bodies too. My impression of the centralized management console feature of Netwrix Endpoint Protector is that it is one of the simplest centralized monitoring features that even a kid would understand, which is what we need in today's world—nothing complicated. My impression of the data encryption and control over portable storage devices features of this solution is that they are very good, especially the device controls, which I really enjoy using, particularly when it comes to portable devices USBs and the encryption tools that they have, which is another module called E-lock, or enforce encryption, that they do have. They are well-protected along those lines.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The UI is good."
"The solution automatically detects and responds to certain types of traffic based on geolocation."
"Generally, I am satisfied with this product."
"The web application firewall brought us good security and a view of the accesses/blocks of the entire domain and subdomain that were accessed both by region (country) and IPs."
"The most valuable feature of the solution is external DNS. It is also very secure. They have their own main server and once you configure it, the product takes care of everything. There are no issues in resolving IPs and low latency is also present."
"I get a lot of value from Cloudflare's API because it enables you to build a separate environment inside the solution. You can create a domain for performing test requests before you move to the production environment and connect various domains."
"The simplicity of the overall dashboard makes it a great product for a user like me who has less understanding of the internet than a developer or other more technical people. It gives me peace of mind. I also love the easy customization of the Page Rules."
"There are key things that are used for our enterprise customers, such as Lambda and DNS."
"I am impressed with the tool's ease of deployment."
"The product has a centralized console for everything."
"The most valuable feature is we can develop what we want. If we have an old or new requirement, they are able to support us to develop it all within one month."
"The main thing that I like about GTB is that it has a single agent for DLP and data classification. You can use the same agent. In terms of licensing too, it has a single license. When it comes to data classification, it supports open-source document platforms such as ChainSoft and OpenOffice."
"The classifications in place are very helpful in making policies for ensuring sensitive data can be contained."
"The monitoring features are valuable."
"They have a fingerprint feature that is very awesome. OCR is very awesome to have too."
"This solution helps classify what is confidential and what is not, allowing products to be installed at home if they do not contain confidential information."
"Its robust security audit and compliance functionalities prove especially beneficial for businesses in sectors like BFSI (Banking, Financial Services, and Insurance) and Information Technology."
"The core of its value lies in obtaining logs remotely and exercising control over what employees can or cannot use."
"The versatility regarding the exit point Endpoint Protector supports in making sure that important data doesn't leave our organization is vital for us. In the industry that we're in, data breaches are a significant concern. While our staff is contractually required to maintain confidentiality and they're all very aware that they shouldn't try and transfer company data of different classifications elsewhere to non-company devices, there's a risk."
"Endpoint Protector's best features are its protection and user-friendliness."
"The most valuable aspects of the solution is the device control, which manages any portable device connected to the endpoint, and content-aware protection, which controls data in motion from the endpoint to outside, like when users try to upload data to a web browser or an instant messaging application."
"The interface is pretty user-friendly, neatly explained, and simple to use."
"The most valuable features are Device Control, Content-Aware Protection, Enforced Encryption, and eDiscovery."
"The most valuable features are the ability to prevent access to external devices, and also site blocking."
 

Cons

"I would like Cloudflare to offer a dedicated account manager for large enterprise clients like us."
"One area of improvement is in the Access Rules. Hypothetically, if we wanted to block or challenge traffic outside of the United States, the only way to currently do that (as far as I know) is to enter every single country outside of the United States. That could be a labor intensive job. A solution could be to enable users to create a rule where traffic is only allowed within a certain country."
"There could be more courses with engineers. I like e-learning, however, having a specialist in a classroom is more comfortable for me."
"The tool needs to improve caching of servers. The product needs to include PFX certificate as well."
"There might be helpful if there was some web application firewall feature."
"The timing aspect can lead to it being considered overpriced. This is a particular concern we have with Cloudflare, as they may struggle with accurately detecting the client."
"For large enterprises, the pricing is okay. However, the enterprise price for small projects is a bit high. A mid-tier pricing option would be beneficial."
"They lack a good way to manage DNS as a company, since everything is relegated to single account logins until you get to the higher levels. They have come out with a paid feature to remedy this, but I have not had a chance to fully review it yet to know if it fixes the access problem."
"They have a roadmap for the Linux platform and Mac as well, and in the next quarter, they might have patch management also for Windows. However, they don't have that much for Linux and Mac. So, we need those things in Linux and Mac as well."
"The solution could improve by providing additional availability requirements."
"The performance could be better."
"The solution’s performance must be improved."
"To stay competitive, they should expand to smartphones."
"The tool should include better AI features."
"It would be great if they have information rights management (IRM) on the same agent."
"The product needs to improve its support so that users can just log in and create tickets as opposed to sending emails. Sending emails is difficult to track. It also needs to work on its analytics platform."
"The only aspect that prevents it from being a perfect solution is the occasional slower response time."
"We are currently facing an issue where it is blocking the Winman software, which is something that we don't want to happen because we use it in our accounts department to pay taxes."
"I would rate the role-based access features for administrators a six out of ten. There's work to be done on the granularity of roles that can be assigned to an administrator but there is role-based administrator access present. That's why it's not a zero rating."
"There are times when the server needs to be updated, and it would help if I got a notification for when the newest version comes out, because at the moment, I'm going in every now and then and checking. Sometimes it comes out and I didn't know it had come out."
"I would like to see an alert feature that when a system is started, it checks to make sure that the client has the most up-to-date policies."
"When you want to uninstall and reinstall, there are a lot of issues. You have to do a lot of workarounds to reinstall Endpoint Protector. This is a major issue that we have constantly because we still have old systems with XP. While there are only very few, we need to run them because there are machines attached that only run on XP. When we need to uninstall and reinstall on XP or Windows 10, we have serious issues left in the Registry Editor everywhere. There is a lot of manual interference to get the reinstallation to work. For the uninstallation of Endpoint Protector, they need to work on this so it doesn't leave any leftovers behind."
"This product provides zero-day protection for macOS, although I'm currently dealing with an issue on the most recent rollout of the Endpoint client that doesn't seem to be fully functioning."
"Sometimes, it should try to focus on one thing rather than multiple things. Endpoint Protector does device control very well, which is why we use that particular function."
 

Pricing and Cost Advice

"We don't have any issues with the price."
"In terms of licensing costs, we don't pay for licensing for Cloudflare. We only establish communication, then for peering, Cloudflare takes care of the cross-connection in different data centers."
"We are using the free version."
"For Cloudflare, I recommend it heavily for small businesses with revenue under a couple of million dollars. Onboarding is easy, and they even have a free plan. This makes it simple for businesses in the $100,000-$500,000 range to try it out and see its value, allowing them to scale up their infrastructure as needed."
"The tool is a premium product, so it is very expensive."
"Cloudflare's pricing is not much higher and is good for middle-level organizations."
"The solution is expensive when compared to other products but offers unlimited bandwidth."
"The product's pricing is minimal compared to other products."
"They offer a lot of features in a single bundle. So, if you want to remove some features from GTB, you can remove those. You don't need to buy those, and the price will reduce accordingly. I am very happy with the pricing."
"When comparing GTB Technologies Inspector to other solutions you receive a good value for your money when considering all the features and benefits."
"The tool is not expensive."
"Its price is very reasonable and competitive."
"The tool has a fair price."
"The tool's pricing is affordable and based on the number of endpoints."
"The pricing is very competitive and is cheaper in comparison to that of other solutions. It makes it an easy decision to go with EPP for the data loss prevention infrastructure."
"For what it's doing, the cost is somewhat high for us, but it's the cost of doing business with the clients that we have."
"From what we've seen, their pricing is a lot lower than the other stuff we've looked at. I actually don't have any concerns with their pricing. They were probably the most reasonable company out there for the features that were offered. It was pretty straightforward in terms of licensing, and you just pay for the license."
"The product has average pricing."
"This solution was not too cheap or too expensive. But for the amount of features that they are offering, it was reasonable."
"When I last renewed the license it was for a two-year term, and they gave me the second year at half price."
"The pricing is reasonable for this particular market."
"The price of Endpoint Protector by CoSoSys is more or less the same as other competing solutions."
report
Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
872,706 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Comms Service Provider
11%
Financial Services Firm
10%
Manufacturing Company
7%
Financial Services Firm
16%
Manufacturing Company
10%
Computer Software Company
10%
Comms Service Provider
9%
Manufacturing Company
12%
Computer Software Company
11%
Financial Services Firm
10%
University
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business46
Midsize Enterprise8
Large Enterprise25
By reviewers
Company SizeCount
Small Business7
Large Enterprise1
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise9
Large Enterprise6
 

Questions from the Community

Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
Cloudflare. We are moving from Akamai prolexic to Cloudflare. Cloudflare anycast network outperforms Akamai static GR...
Which would you choose - Cloudflare DNS or Quad9?
Cloudflare DNS is a very fast, very reliable public DNS resolver. It is an enterprise-grade authoritative DNS service...
What do you like most about Cloudflare?
Cloudflare offers CDN and DDoS protection. We have the front end, API, and database in how you structure applications.
What do you like most about GTB Technologies Inspector?
The product has a centralized console for everything.
What needs improvement with GTB Technologies Inspector?
The tool should include better AI features. It must enable us to make some predictions based on the behavior of my ne...
What is your primary use case for GTB Technologies Inspector?
We use Microsoft 365. We use GTB Technologies Inspector as a CASB solution to protect us from any data leakage in Mic...
What do you like most about Endpoint Protector?
Its robust security audit and compliance functionalities prove especially beneficial for businesses in sectors like B...
What is your experience regarding pricing and costs for Endpoint Protector?
When we started, the price was reasonable, but it has been increasing over time. I rate the price as four, indicating...
What needs improvement with Endpoint Protector?
The licensing issue was eventually resolved by the team, but the Linux client issue persisted. Not all the policies a...
 

Also Known As

Cloudflare DNS
Inspector, GTB Technologies DLP
CoSoSys Endpoint Protector
 

Overview

 

Sample Customers

Trusted by over 9,000,000 Internet Applications and APIs, including Nasdaq, Zendesk, Crunchbase, Steve Madden, OkCupid, Cisco, Quizlet, Discord and more.
Supya Security Software
Samsung, Toyota, Philips, Zeppelin, Western Union, eBay
Find out what your peers are saying about GTB Technologies Inspector vs. Netwrix Endpoint Protector and other solutions. Updated: September 2025.
872,706 professionals have used our research since 2012.