Compare Forcepoint Data Security Cloud and Netwrix Endpoint Protector

At a Glance
Forcepoint Data Security Cloud
Forcepoint Data Security Cloud
Star Rating
(103)4.2 out of 5
Market Segments
Enterprise (50.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Forcepoint Data Security Cloud
Netwrix Endpoint Protector
Netwrix Endpoint Protector
Star Rating
(160)4.5 out of 5
Market Segments
Mid-Market (54.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Netwrix Endpoint Protector

Forcepoint Data Security Cloud vs Netwrix Endpoint Protector

When assessing the two solutions, reviewers found Netwrix Endpoint Protector easier to use and set up. Reviewers also felt that Netwrix Endpoint Protector was easier to do business with overall. However, reviewers felt that administration of both products was equally easy.

  • Reviewers felt that Netwrix Endpoint Protector meets the needs of their business better than Forcepoint Data Security Cloud.
  • When comparing quality of ongoing product support, reviewers felt that Netwrix Endpoint Protector is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Netwrix Endpoint Protector over Forcepoint Data Security Cloud.
Pricing
Entry-Level Pricing
Forcepoint Data Security Cloud
No pricing available
Netwrix Endpoint Protector
No pricing available
Free Trial
Forcepoint Data Security Cloud
No trial information available
Netwrix Endpoint Protector
Free Trial is available
Ratings
Meets Requirements
8.8
59
9.1
115
Ease of Use
8.6
61
9.1
117
Ease of Setup
8.5
41
9.0
111
Ease of Admin
9.0
38
9.0
104
Quality of Support
8.2
58
9.2
119
Has the product been a good partner in doing business?
8.9
37
9.2
105
Product Direction (% positive)
8.9
52
9.1
111
Features by Category
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
8.4
14
8.9
113
Administration
8.7
13
9.0
91
8.3
13
8.9
92
9.2
12
8.5
95
Governance
8.1
13
Feature Not Available
8.5
13
9.2
91
8.6
13
9.1
93
Security
8.2
13
Feature Not Available
8.3
13
Feature Not Available
7.9
13
Feature Not Available
7.8
13
Feature Not Available
Not enough data
Not enough data
Network Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
8.2
14
Not enough data
Analysis
8.1
12
Not enough data
7.8
12
Not enough data
8.1
12
Not enough data
Functionality
8.5
12
Not enough data
8.3
12
Not enough data
8.0
11
Not enough data
Security
8.3
13
Not enough data
8.6
13
Not enough data
8.1
13
Not enough data
8.2
13
Not enough data
9.2
8
Not enough data
Management
9.7
6
Not enough data
9.3
7
Not enough data
9.3
7
Not enough data
9.3
7
Not enough data
Monitoring
9.8
8
Not enough data
9.0
8
Not enough data
9.2
6
Not enough data
Protection
8.8
7
Not enough data
8.6
7
Not enough data
9.3
7
Not enough data
9.0
7
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Secure Access Service Edge (SASE) PlatformsHide 12 FeaturesShow 12 Features
Not enough data
Not enough data
Components - Secure Access Service Edge (SASE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Secure Access Service Edge (SASE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Access Service Edge (SASE) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Policies - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Forcepoint Data Security Cloud
Forcepoint Data Security Cloud
Netwrix Endpoint Protector
Netwrix Endpoint Protector
Forcepoint Data Security Cloud and Netwrix Endpoint Protector are categorized as Data Loss Prevention (DLP)
Reviews
Reviewers' Company Size
Forcepoint Data Security Cloud
Forcepoint Data Security Cloud
Small-Business(50 or fewer emp.)
11.0%
Mid-Market(51-1000 emp.)
39.0%
Enterprise(> 1000 emp.)
50.0%
Netwrix Endpoint Protector
Netwrix Endpoint Protector
Small-Business(50 or fewer emp.)
20.9%
Mid-Market(51-1000 emp.)
54.7%
Enterprise(> 1000 emp.)
24.3%
Reviewers' Industry
Forcepoint Data Security Cloud
Forcepoint Data Security Cloud
Information Technology and Services
19.0%
Computer & Network Security
15.0%
Media Production
12.0%
Banking
11.0%
Computer Software
11.0%
Other
32.0%
Netwrix Endpoint Protector
Netwrix Endpoint Protector
Information Technology and Services
25.7%
Financial Services
12.2%
Computer & Network Security
10.1%
Computer Software
8.1%
Banking
4.7%
Other
39.2%
Alternatives
Forcepoint Data Security Cloud
Forcepoint Data Security Cloud Alternatives
Zscaler Internet Access
Zscaler Internet Access
Add Zscaler Internet Access
Check Point Harmony Email & Collaboration
Check Point Harmony Email &...
Add Check Point Harmony Email & Collaboration
BetterCloud
BetterCloud
Add BetterCloud
Check Point Next Generation Firewalls (NGFWs)
Check Point Next Generation...
Add Check Point Next Generation Firewalls (NGFWs)
Netwrix Endpoint Protector
Netwrix Endpoint Protector Alternatives
Safetica
Safetica
Add Safetica
Symantec Data Loss Prevention
Symantec Data Loss Prevention
Add Symantec Data Loss Prevention
BetterCloud
BetterCloud
Add BetterCloud
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
Discussions
Forcepoint Data Security Cloud
Forcepoint Data Security Cloud Discussions
Monty the Mongoose crying
Forcepoint Data Security Cloud has no discussions with answers
Netwrix Endpoint Protector
Netwrix Endpoint Protector Discussions
can we block some domins instead of whitelisting
6 Comments
Official Response from Netwrix Endpoint Protector
Although it was not designed to block domains, Endpoint Protector can block a list of URLs defined by the Administrator. This can be done from the Blacklist...Read more
What is Endpoint DLP?
2 Comments
Ram Ganesh B.
RB
Endpoint DLP is detecting and blocking company specific confidentiality agreements and documentations and source code from company network. Read more
What is Endpoint Protector client?
1 Comment
Surender N.
SN
EPP is a mature end point protector that controls the ports very granularly with ease of central management Read more