Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Netwrix StealthINTERCEPT Alternatives

Netwrix StealthINTERCEPT Reviews & Product Details

Netwrix StealthINTERCEPT Overview

What is Netwrix StealthINTERCEPT?

Active Directory is secure when it’s clean, understood, configured properly, monitored closely, and controlled tightly. StealthINTERCEPT is a real-time change and access monitoring solution that safeguards your organization against malicious and unintended changes made in Active Directory, File Systems, and Exchange, by providing organizations the operational and security intelligence necessary to achieve these goals—without relying on ineffective native logs.

Netwrix StealthINTERCEPT Details
Show LessShow More
Product Description

See threats, both malicious and accidental, as they happen. Get alerts in real time or use blocking to ensure threats don’t become disasters.


Seller Details
Seller
Netwrix
HQ Location
Irvine, CA
Twitter
@Netwrix
2,825 Twitter followers
LinkedIn® Page
www.linkedin.com
822 employees on LinkedIn®
Description

Netwrix makes data security easy. Since
006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact. More than 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.


AL
Overview Provided by:

Recent Netwrix StealthINTERCEPT Reviews

Verified User
A
Verified UserMid-Market (51-1000 emp.)
3.5 out of 5
"Decent tool for gathering information but missing features"
This system would collect a bunch of data and presented reports in an easily digestible way. This detailed information was great to present to uppe...
Verified User
A
Verified UserMid-Market (51-1000 emp.)
4.0 out of 5
"Love Going Stealth"
This tool has allowed me to gain insight into all activity on my files system and more, a must have.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Netwrix StealthINTERCEPT Media

Answer a few questions to help the Netwrix StealthINTERCEPT community
Have you used Netwrix StealthINTERCEPT before?
Yes

2 Netwrix StealthINTERCEPT Reviews

3.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 Netwrix StealthINTERCEPT Reviews
3.8 out of 5
2 Netwrix StealthINTERCEPT Reviews
3.8 out of 5
G2 reviews are authentic and verified.
Verified User in Construction
AC
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Netwrix StealthINTERCEPT?

This system would collect a bunch of data and presented reports in an easily digestible way. This detailed information was great to present to upper management with the ability to answer any of their questions. Review collected by and hosted on G2.com.

What do you dislike about Netwrix StealthINTERCEPT?

Features included in the software don't work on all systems. The staff worked hard to attempt to address those issues but the result was that the functionality promised was lacking Review collected by and hosted on G2.com.

Recommendations to others considering Netwrix StealthINTERCEPT:

Verify that the requirements you are paying for will work in your environment before the purchase rather than them making changes after the fact. Review collected by and hosted on G2.com.

What problems is Netwrix StealthINTERCEPT solving and how is that benefiting you?

This tool provided detailed reports on system, Active Directory, and file-level changes. It was beneficial to display who moved a file and its location. We were able to generate detail reports on modification and changes that the Admins were doing to fulfill company audit requirements Review collected by and hosted on G2.com.

Verified User in Construction
AC
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about Netwrix StealthINTERCEPT?

This tool has allowed me to gain insight into all activity on my files system and more, a must have. Review collected by and hosted on G2.com.

What do you dislike about Netwrix StealthINTERCEPT?

The setup process if long and not user friendly. Review collected by and hosted on G2.com.

Recommendations to others considering Netwrix StealthINTERCEPT:

I reccomend this product due to the information and features available. Review collected by and hosted on G2.com.

What problems is Netwrix StealthINTERCEPT solving and how is that benefiting you?

having the ability to view files use, monitor and track critical data. Allows me to audit critical information. Review collected by and hosted on G2.com.

There are not enough reviews of Netwrix StealthINTERCEPT for G2 to provide buying insight. Below are some alternatives with more reviews:

1
JumpCloud Logo
JumpCloud
4.5
(3,048)
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
2
Frontegg Logo
Frontegg
4.9
(328)
Frontegg is a platform for SaaS companies, offering out-of-the-box Enterprise-Readiness products for very quick integration as features into an existing SaaS web application. Frontegg components are all customer-facing and include the UI, backend, and Data layers.  The feature-set includes Granular Roles & Permissions, SAML and SSO, Audit logs, Reports, Notification center, and more. The integration of a feature is very quick and shouldn't take more than a few hours of work from a full stack developer.
3
Avatier Identity Anywhere Logo
Avatier Identity Anywhere
4.6
(31)
The World's First Identity-as-a-Container (IDaaC) Platform. Docker Container Cloud-Independent Identity Management for Everyone.
4
ManageEngine Password Manager Pro Logo
ManageEngine Password Manager Pro
3.9
(34)
ManageEngine Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.
5
FusionAuth Logo
FusionAuth
4.6
(47)
FusionAuth adds authentication, authorization, user management, reporting, analytics and much more in minutes not months.
6
Stytch Logo
Stytch
4.8
(37)
Stytch offers APIs and SDKs that allow companies to boost user onboarding and retention rates by removing passwords from user flows, all while improving security and saving significant engineering time in the process. Stytch products include email magic links, one-time passcodes, embeddable magic links, WebAuthn, OAuth logins, web3 logins, and session management.
7
miniOrange Identity & Access Management Logo
miniOrange Identity & Access Management
4.5
(18)
miniOrange SSO provides Single Sign-on to any type of devices or applications whether they are in the cloud or on-premise.
8
safepass.me Logo
safepass.me
4.9
(17)
safepass.me‚Ñ¢ is the password security solution that delivers provably strong passwords, because only safepass.me‚Ñ¢ combines AI with real breached data to make weak passwords history.
9
Pwncheck Logo
Pwncheck
4.1
(6)
pwncheck(patent pending) is the simplest and quickest way to get an overview of how many users on your network are using compromised or weak passwords. We use the most comprehensive and authoritative collection of compromised passwords and pack it in a relatively small self-contained and encrypted binary file using the best algorithms currently available.
10
Hitachi ID Identity Manager Logo
Hitachi ID Identity Manager
2.6
(4)

Hitachi ID Identity Manager is an integrated solution for managing identities and security entitlements across multiple systems and applications.
Show More