

Find out in this report how the two Data Loss Prevention (DLP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
I never needed to contact the vendor for technical support because we faced very few issues.
I would rate the technical support for Netwrix Endpoint Protector as a nine because we have trained engineers, and I am also trained.
Everything starts from the endpoint, and we maintain the Endpoint DLP in many cases while working alongside existing DLP systems.
This solution is scalable because prior to onboarding it, we took references from the vendor, the implementation vendor, and the CoSoSys team.
The product has been around for over 15 years now and is very stable because I started using them from version three.
Stability-wise, the solution is stable; we experienced no downtimes during our two years of usage.
It has many gaps, so I think some customers take three months and up to six months for the deployment of Skyhigh Security.
Netwrix is known as the best DLP for Apple Macintosh computers, which is noteworthy.
Not all the policies applied to the Linux clients were as effective as those for Mac and Windows.
The solution has room for improvement in its DDoS protection.
The UI is another area where there is room for improvement in the product.
Assuming if there's a breach, we will be able to know exactly where the breach has occurred and what has occurred, and they are quite granular in how they report their information, including their logs.
License utilization was a concern as when we were changing the hostname from asset category to asset tag and from personal hostnames to asset tags, it started taking multiple licenses.
Netwrix Endpoint Protector works on Linux and macOS to block USB ports, control internet access, and manage other peripheral ports.
The cloud security features are the most valuable.
It is actually very flexible, so I think that is the opportunity since it is not resource-intensive.
| Product | Market Share (%) |
|---|---|
| Netwrix Endpoint Protector | 1.9% |
| Skyhigh Security | 0.6% |
| Other | 97.5% |

| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 9 |
| Large Enterprise | 6 |
| Company Size | Count |
|---|---|
| Small Business | 30 |
| Midsize Enterprise | 4 |
| Large Enterprise | 37 |
Content Aware Protection
Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.
Device Control
USB & peripheral port control
Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.
Enforced Encryption
Automatic USB encryption
Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.
eDiscovery
Scanning data at rest
Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans
Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Skyhigh’s Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks.
The Skyhigh Security Service Edge portfolio includes Skyhigh Secure Web Gateway, Skyhigh Cloud Access Security Broker, Skyhigh Private Access, and Skyhigh Cloud Native Application Protection Platform. All solutions form a fully converged, consolidated platform, and are managed from the same single console.
Skyhigh Security Benefits
Skyhigh Security Features
We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.