Netwrix Portfolio

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

CONFIDENTIAL

Netwrix portfolio

Contacts:
Evgenia.izotova@netwrix.com
Housekeeping

We will send you the Submit your questions Session duration is up to


recording and slides anytime. We’ll do Q&A all 90 minutes
throughout or at the end
3 CONFIDENTIAL

Agenda
▪ About Company
▪ Netwrix vision
▪ Netwrix solutions and products
▪ In depth PAM; AD Security; DAG; FIM,PolicyPak
▪ Q and A
4

About Netwrix 2.0


Founded: 2006 Key Verticals: Recent M&As:

Headquarters: Irvine, California ▪ Financial ▪ Stealthbits (January 2021)

Customer base: More than 11,500 customers ▪ Healthcare & pharma ▪ Strongpoint (February 2021)

▪ Business services ▪ Anixis (March 2021)


▪ 4,789 cities globally
▪ Government ▪ New Net Technologies (June 2021)
▪ 1,364 hospitals
▪ Education ▪ PolicyPak (October 2021)
▪ 740 schools
▪ Technology ▪ USERCUBE (August 2022)
▪ 2,662 banks
▪ Industrial
▪ 1,490 local governments
5 CONFIDENTIAL

Netwrix Closes Silo Security Gaps


Overcome silos DATA

IDENTITY

End-to-end solutions

Solutions that fit your IDENTIFY | PROTECT | DETECT | RESPOND | RECOVER


a
organization’s needs CLOUD ON-PREM ENDPOINT
6 CONFIDENTIAL

Netwrix Solutions
Data Access Privileged Access Active Directory Ransomware Compliance
Governance Management Security Protection
Reduce the Minimize your Secure even the Mitigate the risk of Prove compliance
likelihood of a data privileged access most complex ransomware and with hard evidence
breach by making risks and take Active Directory limit its potential and slash time
access to data admin activity and Azure AD from impact on data and spent on audits and
exclusive. under control. end to end. operations. preparation.

IDENTIFY | P R OT E C T | DETECT | RESPOND | RECOVER

Unstructured Data Structured Data Directory Cloud Servers Workstations Devices Applications
7 CONFIDENTIAL

Solution Portfolio Reduce the likelihood of a data


breach by making access to data
exclusive.

Data Access
Governance

Secure even the most AD security Compliance Prove compliance with


complex Active hard evidence and slash
Directory and Azure AD time spent on audits
from end to end. and preparation.

Privileged Ransomware
Access protection
Management
Minimize your Mitigate the risk of
privileged access risks ransomware and limit
and take admin its potential impact on
activity under control. data and operations.

IDENTIFY | PROTECT | DETECT | RESPOND | RECOVER

Unstructured Data Structured Data Directory Cloud Servers Workstations Devices Applications
8 CONFIDENTIAL

Products Data discovery and classification,


discover sensitive data

Netwrix Auditor
StealthAudit /Defend
Netwrix Data
Classification Netwrix Auditor
Netwrix Auditor
Data Classification
StealthAudit
StealthAudit / Defend /
Defend/Intercept/ Search, content search,
Data security, process, StealthRecover
Recover enterprise search,
cycle, automatically PolicyPak, eDiscovery
reduce exposure Password Policy ChangeTracker
Enforcer
PasswordPolicy
ChangeTracker
Enforcer

Netwrix Auditor

Netwrix Auditor Data Classification

Stealth Audit / Defend StealthAudit/Defend

SBPam StealthRecover

PolicyPak PolicyPak
Malware, ransomware,
Minimize Risk, Adopt ChangeTracker scanning threats, threat
Zero standing reporting
Privilege

IDENTIFY | PROTECT | DETECT | RESPOND | RECOVER


9 CONFIDENTIAL

Competition Data discovery and classification,


discover sensitive data

Varonis
Spirion
Sailpoint
Lepide
Quest Varonis
Search, content search,
Data security, process,
ManageEngine Sailpoint enterprise search,
cycle, automatically eDiscovery
reduce exposure
Lepide Nuix

Cyberark
Any Vendor,
Delinea Quest
Beyondtrust Malware, ransomware,
Minimize Risk, Adopt scanning threats, threat
Zero standing reporting
Privilege

IDENTIFY | PROTECT | DETECT | RESPOND | RECOVER


10 CONFIDENTIAL
11 CONFIDENTIAL

Data Access Governance Solutions

Outcomes: Products:

SMB Enterprise

Limit access to sensitive data to Netwrix Data Classification


the least privilege level Netwrix StealthAUDIT
Netwrix Auditor

Spot suspicious activity around


Netwrix Auditor Netwrix StealthDEFEND
data and respond faster

Achieve and prove compliance Netwrix Auditor Netwrix StealthAUDIT

IDENTIFY | P R OT E C T | DETECT | RESPOND | RECOVER


12 CONFIDENTIAL

Active Directory Security Solutions

Outcomes: Products:

SMB Enterprise

Identify and mitigate security Netwrix Auditor Netwrix StealthAUDIT


gaps in your AD configurations Netwrix Password Policy Enforcer Netwrix Change Tracker

Detect and contain threats Netwrix StealthDEFEND


Netwrix Auditor
before they do more damage Netwrix StealthINTERCEPT

Recover fast to ensure business


Netwrix StealthRECOVER
continuity

IDENTIFY | P R OT E C T | DETECT | RESPOND | RECOVER


13 CONFIDENTIAL

Ransomware Protection Solutions

Outcomes: Products:

SMB Enterprise

Pinpoint and mitigate the Netwrix Data Classification


Netwrix StealthAUDIT
overexposure of sensitive data Netwrix Auditor

Spot and block ransomware in Netwrix Auditor Netwrix StealthDEFEND


its early stages Netwrix PolicyPak

Recover quickly and prevent Netwrix StealthAUDIT


Netwrix Auditor
future infections Netwrix StealthRECOVER

IDENTIFY | P R OT E C T | DETECT | RESPOND | RECOVER


14 CONFIDENTIAL

Compliance Solutions

Outcomes: Products:

SMB Enterprise

Prove compliance and slash Netwrix Auditor Netwrix StealthAUDIT


audit preparation time Netwrix Password Policy Enforcer Netwrix Change Tracker

Ensure efficient investigations Netwrix Data Classification


Netwrix StealthAUDIT
and satisfy DSARs Netwrix Auditor

Detect policy violations early Netwrix StealthINTERCEPT


Netwrix Auditor
and reduce the risk of fines Netwrix StealthDEFEND

IDENTIFY | P R OT E C T | DETECT | RESPOND | RECOVER


15 CONFIDENTIAL

Privileged Access Management Solutions

Outcomes: Products:

SMB Enterprise

Discover privileges, monitor and Netwrix StealthAUDIT


report on admin activity Netwrix Auditor
Netwrix StealthDEFEND

Remove standing privileges in favor


Netwrix SbPAM
of on-demand access

Lock down Local Admin rights


Netwrix PolicyPak
without impacting productivity

IDENTIFY | P R OT E C T | DETECT | RESPOND | RECOVER


Challenges around Privileged Access Management
• 74% of data breaches start with privileged credential abuse.
• Privileged Access Management Solutions Market Worth USD 18.32 Billion by
2030 Growing at CAGR of 28.10

Privileged accounts are vulnerable to takeover by attackers.

Privileged accounts can be misused by their owners.

Privileges often spiral out of control, increasing risk.

Traditional tools are expensive and complex.

*Source: Report by Market Research Future (MRFR)


17 CONFIDENTIAL

Privileged Access Management with Netwrix

Secure Comply Enable


Reduce the risk of data Avoid audit findings and prove Enhance security — while also
breaches due to privileged that privileged activity is not improving IT productivity and
credential theft or abuse. creating security threats. service uptime.
23 CONFIDENTIAL

Competition

Netwrix removes the complexities around Installation, day to day management and scalability

Netwrix provides flexible options around Vault based solutions - BYoV

Netwrix is truly Just In Time provisioning

Netwrix quicker time to value

Netwrix has simple licensing > reduced costs


25 CONFIDENTIAL

Summary
▪ 3rd generation PAM solution

▪ Eliminate standing privileges altogether

▪ Reduce privileged access risks

▪ Minimize your attack surface with automatic cleanup

▪ Enhance admin accountability

▪ Protect your service accounts

▪ Streamline the approval process for privileged access

▪ Simplified Licensing Model


26 CONFIDENTIAL

Qualifying Questions
• Do you know where your Privilege accounts are
• How many domain admin users do you have?
• How many users are local administrators on Servers?
• How many privilege accounts do you have?
• how do you monitor privilege activity, internally for users and Vendors?
• How do you manage occasional Privilege elevation for users?
• How do you manage all privilege credentials?
• How do you manager privilege accounts used for Windows Services and scheduled tasks?
• How do you audit all privilege activity?
• How do you control access to external entities?
• How do you limit the scope of existing admins to reduce risk?
• How do you remediate and enforce membership of Local privilege groups?
• How do you baseline privilege accounts on systems?
• how do you control & record access to Web page privilege such as Azure AD, & non IT admin sites such as HR and Sales Ops?
• Cost
• How much do you currently spend both in time and cost on Privileged Access Management solutions
• What if we can reduce that Cost both financially – Simple licensing & time Remove complexity
• Provide fast return on Investment

• Compliance
• Do you have to adhere to any compliance regulations? How will you prove that privileged access in your organization is under control?
• How do you prove to auditors what and where your privilege accounts are?
27 CONFIDENTIAL

SbPam Partner Points

• Keywords: Privilege Access, Compliance, Domain Admins, Computer Admins, Privilege Abuse & Misuse, Zero Trust, Zero Standing
Privilege, Reduce Standing Privilege, Just-in-Time Provisioning, Proxy, Session recording, Ephemeral Access

• Average Deal Size: EUR 20 K

• Incentives: On a case-by-case partner basis Amazon vouchers

• Ideal user size: Licensed per Administrators, Min purchase 5 Admins

• Sales Cycle: 3-6 months.

• Popular Industries: All Industries, Public Sector, Finance, Legal, Manufacturing

• Competition: CyberArk, Thycotic, Beyondtrust

• Services: Partners can shadow for free and complete the partner accreditation on LMS to be able to provide services
28 CONFIDENTIAL

Why are we here today?


In the last two years, 50% of organizations suffered AD attacks,
42% of which were successful.*

Active Directory is a proven path for devastating attacks.

Lack of control over and visibility into Active Directory leaves it


vulnerable.

The move to the cloud has exacerbated, not simplified, the security
challenge.
Most AD security solutions leave gaps that adversaries love.

*Source: EMA7193 Active Directory Research Report


30 CONFIDENTIAL

Active Directory security – How Netwrix solve it


M I T I G AT E R E M E D I AT E

IDENTIFY PROTECT DETECT RESPOND RECOVER

Understand what exists Clean up stale accounts Detect suspicious Contain threats fast Roll back unwanted
in your AD, how AD is and empty groups. behavior and with automated AD changes and
configured, and who advanced threats in responses. recover entire AD
Enforce strong
has access to what. passwords. real time. domains.
Simplify incident
Identify risks such as Eliminate standing investigation and Use lessons learned
weak passwords, privilege. make more informed to prevent similar
excessive privilege, and response decisions. incidents from
Harden DC security
insecure DC happening again.
configurations.
configurations.
Block risky behavior.
32 CONFIDENTIAL

Challenges around Data?


$4.24M is the average total cost of a data breach.*

Sensitive data sprawls uncontrollably and is at risk.

Users have more access to sensitive data than they need.

New compliance regulations impose stricter data confidentiality and


privacy requirements

*Source: IBM Cost of a Data Breach Report 2021


34 CONFIDENTIAL

Data Access Governance – HOW Netwrix solve it?


M I T I G AT E R E M E D I AT E

IDENTIFY PROTECT DETECT RESPOND RECOVER

Identify sensitive Remediate excessive Spot suspicious Block undesired Create recovery plan
data, its owners access. activity around data, actions and incorporate
and who has such as unusual automatically. lessons learned.
Let data owners
access. access or privilege
manage access to Investigate the
elevation attempts.
Spot risks around it, their data in order incident to
such as open to maintain security. formulate the best
access. response.
35 CONFIDENTIAL

Swiss Army Knife for Governance across the Entire IT


Unstructured data Structured data Any data

Windows file
NAS SQL Oracle
servers

SharePoint Exchange PostgreSQL MySQL

Azure
Microsoft 365 AWS S3 AWS databases
databases

Box Dropbox
Directory services

Azure Storage Endpoints Active Directory Azure AD …


Supported Platforms
UNIX

DIRECTORY SERVICES SUPPORT


• Active Directory • Azure Active Directory • LDAP
• NIS
FILE SYSTEM SUPPORT
• Windows • NetApp • DellEMC Isilon
• DellEMC Celerra • DellEMC VNX/VNXe • DellEMC VMAX3
• DellEMC Unity • Hitachi NAS • Unix and Linux
• Nasuni • Panzura
APPLICATION & DATABASE SUPPORT
• SharePoint • Exchange • Microsoft IIS
• Microsoft SQL Server • Oracle • ODBC-Compliant Databases
• Azure SQL
CLOUD SUPPORT
• SharePoint Online • OneDrive for Business • Exchange Online
• Dropbox • Box • AWS S3
OPERATING SYSTEM SUPPORT
• Windows • Unix • Linux
38 CONFIDENTIAL

Competition
▪ Netwrix more feature rich
▪ Netwrix supports Structured and unstructured
▪ Netwrix 100% channel Focused
▪ Netwrix Easy to deal with
▪ Netwrix quick return on investment
▪ Capability to displace Varonis
▪ 100K plus deals
▪ Scalability - 50000 users or more
▪ You can deliver the services - 100%
39 CONFIDENTIAL

Qualifying Questions

1. What Sensitive Data Do you Have?


2. What Sensitive data do you have outside of Secure locations?
3. Is your sensitive Data overexposed?
4. Who can access your sensitive data?
5. Is there any directly assigned permissions or objects with broken inheritance?
6. Who owns a particular sensitive file or folder?
7. Have there been any changes to permissions to sensitive files?
8. What activity is happening around sensitive data?
9. Has there been anomalous activity around sensitive data?
10. Are there any files that could endanger data security?
Challenges around Un-Expected and Un-Authorised changes?
• 91% of all security breaches can be auto-detected when
release, change and configuration management controls are
properly implemented*
• 190 days is the average time to detect unwanted change**

Every breach starts because something has changed or it’s about to


change

File Integrity Monitoring is a requirement of many compliance


regulations (PCI DSS, SWIFT, FedRAMP etc)

File Changes are hard to be analyzed in a meaningful way

FIM tools produce loads of “Change Noise” and False Positives

*Source: IT Process Institute


** Source: IBM Security Report 2020
Why Harden Why FIM
Configurations
• Change is the only constant
• Massively reduce the risk of a breach
• Knowing & understanding planned (good) vs
• Compliance – every security framework & compliance
unplanned (potentially bad/malicious)
regulation tells you that this is one of the first things
• Network visibility
you should do in order to secure your network. E.g.
• Compliance
NIST, CIS Controls, PCI DSS, SWIFT

Why Change Tracker Differentiators


• CIS certified • Reduce “change noise” by over 90%

• Automated/Unlimited Scalability • White list approved FIM

• Continuous configuration drift management • Ease & speed of implementation

• All breaches start with either a change or the need • Ease of use

for a change. Leverage real-time change detection to • Certified integrations

spot cyber threats and identify suspicious changes • Commercially friendly


43 CONFIDENTIAL

Competition
▪ Netwrix provides Threat Intelligence Technology that suppress 90%+
of Change Noise and False positives
▪ On average customers reduce costs by 60% over a three-year period
▪ Netwrix Change Tracker modern architecture can support at a
minimum 10 times more devices with a single console than Tripwire
▪ Certified integrations into leading ITSM and SIEMs platforms
▪ Simple to use UI and Licensing Model (per device per year)
44 CONFIDENTIAL

Qualifying Questions
1. Have you implemented any security framework such as NIST or CIS?

2. What IT service desk (or ITSM) do you use and do you operate a system of planned changes within your IT Operations?

3. How do you track unexpected changes within your environment?

4. Are you subject to any security audits? If so, which ones?

5. Do you have a ‘Security Information and Event Management’ (SIEM) solution in place and if so which one?

6. What do you use for Secure Configuration Management (SCM) & File Integrity Monitoring (FIM) and overall Change
Detection?

7. Do you use Tripwire Enterprise? Or another product? Or nothing?

8. If nothing in place, do you need a solution? Why? Is it a live project with budget set?

9. Why do you use it? E.g. Compliance / security best practise


45 CONFIDENTIAL

Identity Governance Administration Solutions

Outcomes: Products:

SMB Enterprise

Visibility into roles and access Netwrix USERCUBE Netwrix USERCUBE


Joiners, Movers, and Leavers
Netwrix Auditor Netwrix StealthAUDIT
Provision Roles and Access
Onboarding/Offboarding Netwrix USERCUBE Netwrix USERCUBE
Entitlement Reviews Netwrix Auditor Access Review Netwrix Stealth AIC

Achieve and prove compliance Netwrix USERCUBE Netwrix USERCUBE


Netwrix Auditor StealthAUDIT

IDENTIFY | P R OT E C T | DETECT | RESPOND | RECOVER


46 CONFIDENTIAL

Policy Pak Challenges


47 CONFIDENTIAL

PolicyPak: Security & Management


Security Wins Management Wins

▪ Remove Local Admin Rights ▪ Windows 10 / 11 File Associations


▪ Remove “standing privileges” (PolicyPak +
▪ Windows 10 Start Screen
sbPAM)
▪ Stop Ransomware from Phishing / surfing ▪ Reduce / Merge GPOs

▪ Stop Ransomware from USB / removables ▪ Transition from GPOs to MDM (Intune) and/or
▪ Stop data exfiltration via USB / removables PolicyPak Cloud

▪ Block websites / manage browsers ▪ Deploy software


▪ Lockdown browsers & applications (advanced) ▪ More Windows 10 / 11 automation (advanced)
▪ GPO Compliance (advanced)
How is it sold

Least Privilege Device Apps, Browser, &


Security Pak Management Pak java Security Pak

Editions get you Paks


GPO Compliance Windows 10 GPO Reductions &
Pak Management Pak Transitions Pak

Apps Delivery & Desktop


Patching Pak Automation Pak
How
YOU easy to
ALREADY getALL
HAVE stood up?
YOU NEED…

• No servers to buy / build • No active directory

• No infrastructure to build • No servers to install on-site

• No Databases / SQL • No SCCM

• No schema updates!
• No RMM tools to purchase

• No “live” Group Policy


• No specific domain mode

• No specific Windows Server needed

• No specific Windows client needed


KEY WORDS, PROJECTS & TARGET
PERSONA’S…

WORDS TO LISTEN FOR PROJECTS WE TIE TO WHO TO TALK TO

• Least Privilege / Removing • Zero Trust • Windows Endpoint person


Standing Privilege
• GPO Reduction / Modern • Desktop Security
• Local Admin Rights Desktop Management / MDM
• Desktop rollouts
• UAC Prompts • GPO Reduction
• VDI Manager
• USB Sticks / Data Exfiltration / • Endpoint Protection
DLP
• Windows Infrastructure
• Work from home / anywhere manager
• Ransomware
• Existing sbPam projects ! • Customers 500+ are sweet
spot
Hooking into the “Zero Trust” Initiative
51 CONFIDENTIAL
Hooking into the “Zero Trust” Initiative
52 CONFIDENTIAL

Lock down, control and protect all your Windows


devices, as well as their users.
Limit and strictly enforce the access and privilege of your
users while ensuring that they can still easily perform all
their required tasks.
Hooking into the “Zero Trust” Initiative
53 CONFIDENTIAL

Configure, deploy, and manage windows endpoint


security policies that safeguard corporate data
Mitigate inbound attacks and data exfiltration by
enforcing policies that control removable devices like
USB sticks, and CD/DVD-ROMs.
Hooking into the “Zero Trust” Initiative
54 CONFIDENTIAL

Manage, secure and enforce system settings for the


desktop applications your business rely]ies on
Lock down thousands of user settings on hundreds of
commonly-used applications, including browsers, Java
and desktop application
55 CONFIDENTIAL

Competitors: Endpoint Privilege Management


Netwrix PolicyPak
Endpoint Privilege Management
for Windows and Mac
• Simple lightweight architecture
• Training included with purchase
• Scalable for any size environment
• Leverages familiar, native Group Policy Management Editor Privilege Manager
• Doesn’t require SQL servers
• Works with MDM tools like Intune and Workspace ONE
• Provides extendable endpoint security & management capabilities
Endpoint Privilege Manager
56 CONFIDENTIAL

Netwrix SbPAM + Netwrix PolicyPak


Benefits Integrated PAM/PEDM Solution
▪ Applications launched locally – no change to
workflow

▪ NO change in application functionality

▪ Seamless access to local and privileged


applications

▪ Massive savings in infrastructure and licensing

▪ Reduction of attack surface (ZSP)

▪ NO exposure of privilege when in use


Integration leverages existing
SbPAM API to remotely invoke
Activity and return credentials
Qualifying questions Least Privilege
Manager

1. Do you have users with full local admin rights anywhere? Want to get out of the Local admin business but provide
privileges when needed?
2. Got any apps which show UAC prompts?
3. Got any regular users who need to add printers or change network card settings?
4. Got any regular users who need to install or uninstall their own non-standard software (Itunes, UPS QuickShip.)? Some
applications ship every month. Wouldn’t it be great for end users to keep SOME of their software self-updated… like
iTunes, UPS Quickship and one-off-apps?

5. Is your company working on a Least Privilege or Zero Trust project?


6. Are you doing all you can on the ENDPOINT to block Ransomware? Would it be interesting to stop MORE malware than
you already do?
Qualifying questions DeviceManager

1.Would it increase your security to manage and block USB and removable media?
2. How would you like to prevent data leaks from USB sticks or malware on USB sticks?

Qualifying questions Application


(settings) Manager
1. Do you have Firefox, Flash, Chrome, Java, Internet explorer?
2. Different people who need different settings?
3. What happens AFTER you do an image/rollout? People just working around your settings?
Qualifying questions GPO Compliance Pak
1. Did your security / management GPOs make it to your endpoints?
2. Have you ever been unsure if your GPOs applied?

Qualifying questions GPO Reduction and Transitions Pak


1. Got an MDM service like Microsoft Intune to manage PCs?
2. Got non domain joined machines?
3. Got work from home machines and need to secure and manage them better?
Qualifying questions Windows
10 & 11 Management Pak
1. How’s your Windows 10 / 11 rollout and upkeep going?
2. Is managing File Associations, Start Screen & Taskbar causing issues?
Review: Top ideas customers will respond to with PolicyPak
▪ Removing Admin Rights
▪ Ransomware Prevention
▪ USB Protection / Data exfiltration protection
▪ Managing Windows 10 & 11 Experience
▪ Transition GPOs to MDM & Cloud
▪ Report on GPO Compliance
Final Thoughts…

▪ Access the Netwrix Partner Portal: https://www.netwrix.com/par/site/login


▪ Learning Management System (LMS) for enablement and certifications
▪ Deal registration
▪ Marketing campaigns
▪ Collateral – use cases, selling guides, datasheets, etc.!

▪ Questions? Contact our team! Channel@netwrix.com


Netwrix Solutions
▪ Privileged Access Management - https://www.netwrix.com/privileged_account_manager.html
▪ Ransomware - https://www.netwrix.com/ransomware_protection_solution.html
▪ Data Access Governance - https://www.netwrix.com/data_access_governance.html
▪ Data Governance - https://www.netwrix.com/information_governance_software.html
▪ AD Security - https://www.netwrix.com/active_directory_security_tools.html
Netwrix Products
▪ Netwrix Auditor - https://www.netwrix.com/auditor.html
▪ Netwrix Data Classification - https://www.netwrix.com/data_classification_software.html
▪ Netwrix changetracker - https://www.netwrix.com/security_configuration_management_software.html
▪ Netwrix password Policy Enforcer - https://www.netwrix.com/password_policy_enforcer.html
▪ Netwrix password Reset - https://www.netwrix.com/active_directory_password_reset_tool.html
▪ Netwrix PolicyPak - https://www.netwrix.com/endpoint_management_software.html
▪ Netwrix SbPam - https://www.netwrix.com/sbpam.html
▪ Netwrix StealthAudit - https://www.netwrix.com/stealthaudit.html
▪ Netwrix StealthDefend - https://www.netwrix.com/threat_detection_software.html
▪ Netwrix StealthIntercept - https://www.netwrix.com/stealthintercept.html
▪ Netwrix StealthRecover - https://www.netwrix.com/active_directory_recovery_software.html
69 CONFIDENTIAL

Questions?
Thank You!
70 CONFIDENTIAL

Competitors ▪ FIM old school

▪ More expensive

▪ Our solution has faster time to value


▪ They don’t secure structured data – Netwrix can protect
unstructured and structured data ▪ We are easier to use and deploy

▪ Products are expensive and difficult to deploy

▪ Has more false positives

▪ Requires multiple modules to achieve same functionality

▪ We are a smaller, private company and we adapt to customer’s


needs

▪ We have a holistic solution to secure data identity and


infrastructure

• More expensive
▪ Only address AD auditing issues
• Extremely Complex
▪ Older technology
• Vault based, not JIT
▪ Easy rip and replace for us
• Difficult and costly to use and deploy

You might also like