Ratings and Reviews 0 Ratings
Ratings and Reviews 35 Ratings
What is Netwrix Endpoint Policy Manager?
Netwrix Endpoint Policy Manager is an advanced endpoint management platform designed to secure, control, and optimize devices in modern work environments. It supports both Windows and macOS endpoints, allowing IT teams to manage devices used by remote, hybrid, and on-site employees. The platform emphasizes least privilege access by removing unnecessary administrator rights while enabling secure, controlled elevation for approved tasks. It includes built-in ransomware protection through application allowlisting, helping prevent unauthorized software and scripts from running. Netwrix Endpoint Policy Manager improves user productivity by reducing login times, eliminating unnecessary prompts, and ensuring applications function correctly. It allows IT teams to deploy and manage Group Policy settings through cloud-based systems or mobile device management platforms, extending control to non-domain devices. The software simplifies software deployment, patch management, and system updates across all endpoints. Automation features help reduce manual IT work and lower the volume of support tickets. The platform integrates with tools like Active Directory, Microsoft Endpoint Manager, and other IT systems for seamless operation. It also helps organizations maintain compliance with security policies and regulatory requirements. Netwrix Endpoint Policy Manager provides centralized visibility and control over endpoint configurations and activities. Its scalable design supports organizations of all sizes as they grow and expand their IT environments. By combining security, automation, and flexibility, it helps organizations protect endpoints while maintaining efficient operations.
What is Airlock Digital?
Airlock Digital provides application control and allowlisting, used by organizations worldwide to protect against ransomware, malware and other cyber threats. Our deny by default solution enables customers to run only the applications and files they trust, with all others blocked from executing. This approach minimizes attack surfaces and helps organizations align their cybersecurity strategies with government frameworks and standards. By securing endpoints running legacy and new versions of Windows, macOS and Linux, we extend protection across IT and operational technology environments. Airlock Digital delivers endpoint protection to financial services, government, healthcare, manufacturing and other industry organizations of all sizes.
Integrations Supported
Active Directory
CrowdStrike Falcon
HCL BigFix
Jamf Pro
Microsoft Configuration Manager
Microsoft Intune
Splunk Enterprise
Sumo Logic
VirusTotal
Integrations Supported
Active Directory
CrowdStrike Falcon
HCL BigFix
Jamf Pro
Microsoft Configuration Manager
Microsoft Intune
Splunk Enterprise
Sumo Logic
VirusTotal
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Netwrix
Date Founded
2006
Company Location
United States
Company Website
netwrix.com/en/products/endpoint-policy-manager/
Company Facts
Organization Name
Airlock Digital
Date Founded
2013
Company Location
Australia
Company Website
www.airlockdigital.com
Categories and Features
Policy Management
Approval Process Control
Attestation
Audit Trails
Policy Creation
Policy Library
Policy Metadata Management
Policy Training
Reporting / Analytics
Version Control
Workflow Management
Categories and Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting