Best Software for 2025 is now live!
Product Avatar Image

Netwrix

Show rating breakdown
210 reviews
  • 12 profiles
  • 15 categories
Average star rating
4.5
#1 in 3 categories
Grid® leader
Serving customers since
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category

Profile Name

Star Rating

157
59
3
2
1

Netwrix Reviews

Review Filters
Profile Name
Star Rating
157
59
3
2
1
EH
ESTUARDO H.
12/16/2024
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

For a Company for Phisical and Digital Security Information Role this is a great Tool and Platform

CosoSys has a complete platform to perform and apply rules for policy, complains and tools to enforce integrity, confidentiality and disponibility of the information
PE
Prof E.
11/30/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

Establishing a common source of managing incidents.

The NNT ITSM Integration Module gave me a way to cosolidate my current IT service tools. This centralised view helps me to have a bird's eye view of the IT environment and thus addressing issues swiftly and optimally using the resources available.
RC
Ruy C.
11/27/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

Less downtime and enhanced network stability

NNT ITSM Integration Module clearly has its strongest feature in the integration between our ITSM tool and NNT for network management product. NNT feeds directly into our ITSM system which creates and manages network incidents for us and thus time.

About

Contact

HQ Location:
Irvine, CA

Social

@Netwrix

What is Netwrix?

Netwrix makes data security easy. Since 006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact. More than 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.

Details