Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 3 Ratings

Total
ease
features
design
support

Description

Netwrix Endpoint Policy Manager is a comprehensive endpoint management solution built to help organizations secure and manage devices across hybrid and remote work environments. It enables IT teams to control Windows and macOS endpoints from a centralized platform, regardless of user location. The software focuses on least privilege management by removing local administrator rights while allowing secure elevation for approved applications. It includes advanced ransomware protection through application allowlisting, helping block unauthorized programs and scripts. Netwrix Endpoint Policy Manager also improves user productivity by eliminating access barriers, reducing login delays, and ensuring applications run smoothly. IT teams can deploy and manage Group Policy settings through cloud services or mobile device management tools, extending control beyond traditional networks. The platform simplifies software deployment, patch management, and system updates across endpoints. It also helps reduce help desk tickets by automating common tasks and minimizing user-related issues. The solution integrates with existing IT infrastructure, including Active Directory and endpoint management tools. Organizations can use it to enforce consistent policies and maintain compliance across devices. With its focus on security, automation, and usability, it helps businesses manage endpoints more efficiently.

Description

Zscaler, the innovator behind the Zero Trust Exchange platform, leverages the world's largest security cloud to streamline business operations and enhance adaptability in a rapidly changing environment. The Zscaler Zero Trust Exchange facilitates swift and secure connections, empowering employees to work from any location by utilizing the internet as their corporate network. Adhering to the zero trust principle of least-privileged access, it delivers robust security through context-driven identity verification and policy enforcement. With a presence in 150 data centers globally, the Zero Trust Exchange ensures proximity to users while being integrated with the cloud services and applications they utilize, such as Microsoft 365 and AWS. This infrastructure guarantees the most efficient connection paths between users and their target destinations, ultimately offering extensive security alongside an exceptional user experience. Additionally, we invite you to explore our complimentary service, Internet Threat Exposure Analysis, which is designed to be quick, secure, and private for all users. This analysis can help organizations identify vulnerabilities and strengthen their security posture effectively.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AWS Marketplace
Arctic Wolf
Armis Centrix
Azure Marketplace
Beamy
CipherTrust Data Security Platform
Daylight
Elevate Security
Expel
FaPipe IPVPN
Google Digital Risk Protection
Intezer AI SOC
Observo AI
OverSOC
Polarity
SeeMetrics
Swimlane
Teamstack
Tenzir
ThreatAware

Integrations

AWS Marketplace
Arctic Wolf
Armis Centrix
Azure Marketplace
Beamy
CipherTrust Data Security Platform
Daylight
Elevate Security
Expel
FaPipe IPVPN
Google Digital Risk Protection
Intezer AI SOC
Observo AI
OverSOC
Polarity
SeeMetrics
Swimlane
Teamstack
Tenzir
ThreatAware

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Netwrix

Founded

2006

Country

United States

Website

netwrix.com/en/products/endpoint-policy-manager/

Vendor Details

Company Name

Zscaler

Founded

2008

Country

United States

Website

www.zscaler.com

Product Features

Policy Management

Approval Process Control
Attestation
Audit Trails
Policy Creation
Policy Library
Policy Metadata Management
Policy Training
Reporting / Analytics
Version Control
Workflow Management

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

Perimeter 81 Reviews

Perimeter 81

Check Point Software Technologies