312 Netwrix Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "Since implementing the Password Expiration Notifier, our helpdesk has seen trouble tickets relating to passwords completely disappear."

  • "SECAmb came to Trusted Technology Partnership with a specific requirement to manage storage devices and ensure data security. Trusted Technology provided Netwrix Endpoint Protector, the perfect product to meet our needs."

  • "All is great, I very much appreciate your help, my mark is 10 out of 10."

  • "We saw gains very quickly in the treatment of anomalies around not only incidents but also identities."

  • "Our three brands had distinct processes, diverse laws, and varied vocabulary. Choosing Netwrix Usercube enabled us to consolidate and simplify our identity management, addressing the challenges encountered by COVEA during the merger."

  • "Within five days, Netwrix Usercube demonstrated its alignment with all our requirements, including business, technical, and safety aspects."

  • "Netwrix Privilege Secure was straightforward to install, allowing my engineers, who were not very familiar with the product, to easily implement it. This helped us avoid large-scale consultancy costs and shorten the setup process to a single day, compared to the several weeks required by other products."

  • “NetWrix products all have the same thing in common: they do a good job at what they’re supposed to do and are simple enough to implement.”

  • "With the integration of Netwrix Usercube, we turned a complex, manual identity management process into an automated, secure system, enhancing compliance and operational efficiency."

  • "Netwrix Endpoint Protector’s granularity and the cross-platform possibilities convinced us. But also the basis on Ubuntu/Linux gave us a safe feeling to choose the right solutions."

  • "We chose Netwrix Endpoint Protector due to the various setting options (authorizations) for devices such as CD drives and USB sticks."

  • "Since we've pushed a mandate to install Endpoint Protector on every employee's device, we are confident that our newly gained visibility will help us in incident response, data forensics, as well as proactive data protection in the future."

  • "Controlling PC peripherals and data transfers are Endpoint Protector’s most used features in our company. The easy deployment of the product and its user-friendliness are also among its biggest strengths."

  • "With Netwrix Endpoint Protector we now have an approved list of company devices, locked down by serial numbers which are fully encrypted. Any other removable storage media is blocked from being used."

  • "The most required features for us were the Network Share control from the Device Control module and the Bluetooth device. These features helped the company to manage the users easily and to block transfers to mobile devices, USB devices, and external devices."