Netwrix
Netwrix logo
  • Hall 7A / Booth Number 7A-430
  • Hall - / Booth Number -

Netwrix

Manufacturer

Data Security that Starts with Identity

We offer

Network security Storage solutions Cloud (computing) security Endpoint security Intrusion detection / prevention Log management Risk analysis and management Vulnerability and patch management Threat analysis Compliance / GRC (products and services) Data leakage / loss prevention Data protection, data security Authentication Access protection User (rights) management

Industry

Energy and water supply Financial Sector Healthcare Industrial IT security Small and medium-sized enterprises Critical Infrastractures Data center operation

Contact information

5 New Street Square

EC4A 3TW London

United Kingdom

language www.netwrix.com +49 221 599 88 029

About us

We revolutionize data security by placing identity at the core, providing unparalleled visibility and control. More than 900 talented employees and hundreds of trusted partners in nearly every geography engineer and support Netwrix solutions. Security professionals across more than 13,500 organizations in over 100 countries worldwide rely on our products and expertise daily.

Over the past two decades, Netwrix has expanded its market presence through innovation, organic growth, and strategic acquisitions. We are proud to be backed by private equity firms TA Associates and Centerbridge Partners. Netwrix maintains a global presence, fostering a remote-first work environment while encouraging and facilitati ...

Products

NETWRIX PRIVILEGE SECURE

To the product

NETWRIX ACCESS ANALYZER

To the product

Employees

Dirk Schrader
Dirk Schrader
VP of Security Research
Frank Höhn
Frank Höhn
Regional Director DACH
Dietmar Repges
Dietmar Repges
Enterprise Account Executive / Netwrix Privilege Secure
Armin Zähring
Armin Zähring
Channel Manager DACH

Watch our company video

external video thumbnail

Netwrix Video

Keywords

Compliance (NIS-2, TISAX, ISO 27001, DSGVO, DORA, PCI DSS)Data SecurityEndpoint ManagementIdentity ManagementIdentity Threat Detection and ResponsePrivileged Access Management