Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Bold is an innovative security platform powered by artificial intelligence that focuses on safeguarding enterprise devices like laptops and workstations through the deployment of an autonomous security agent directly at the endpoint. This agent operates continuously, observing user interactions with applications, files, and data on the device, which allows it to identify any unusual or potentially harmful behavior in real-time, instead of depending solely on conventional cloud-based monitoring solutions. By executing locally on the device, the AI agent can track every workflow and application activity without encountering interruptions linked to unsupported APIs or external integrations, thereby ensuring comprehensive visibility into user actions and system operations. Moreover, when a security threat is identified, the platform goes beyond merely alerting the user; it can initiate automatic protective measures, effectively converting threats into resolved incidents before they develop into breaches. This proactive approach not only enhances security but also minimizes the potential impact of cyber threats on enterprise operations.

Description

Netwrix Endpoint Protector is a comprehensive endpoint data loss prevention (DLP) and device control solution designed to protect sensitive data across all endpoints. It provides multi-OS support with full feature parity across Windows, macOS, and Linux environments. The platform monitors and controls data transfers across applications, devices, and network channels to prevent unauthorized data leakage. It includes granular device and port control, allowing organizations to manage USBs, printers, Bluetooth devices, and more. Netwrix Endpoint Protector also enforces encryption on removable media, ensuring sensitive data remains protected even if devices are lost or stolen. The solution features content-aware DLP capabilities that scan data in motion and at rest to detect and block sensitive information transfers. It includes endpoint discovery features to locate sensitive data stored on devices and reduce risk. The platform helps organizations comply with regulations such as GDPR, PCI-DSS, and ISO standards. It also protects against insider threats by monitoring user activity and enforcing security policies. With real-time monitoring and automated controls, it reduces the risk of data breaches. Overall, it provides strong endpoint security and centralized control over data usage.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Gmail
Google Cloud Platform
Microsoft Azure
Netwrix Auditor

Integrations

Amazon Web Services (AWS)
Gmail
Google Cloud Platform
Microsoft Azure
Netwrix Auditor

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Bold Security

Founded

2011

Country

United Kingdom

Website

www.bold.security/

Vendor Details

Company Name

Netwrix

Founded

2006

Country

United States

Website

netwrix.com/en/products/endpoint-protector/

Product Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Product Features

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Alternatives

Alternatives

CrowdStrike Falcon Reviews

CrowdStrike Falcon

CrowdStrike
Trusted Knight Protector Endpoint Reviews

Trusted Knight Protector Endpoint

Trusted Knight Corporation