---
description: Review of Netwrix Access Analyzer Software: system overview, features, price and cost information. Get free demos and compare to similar programs on Software Advice New Zealand.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Netwrix Access Analyzer | Reviews, Pricing & Demos - SoftwareAdvice NZ
---

Breadcrumb: [Home](/) > [IT Asset Management Software](/directory/1888/it-asset-management/software) > [Netwrix Access Analyzer](/software/157459/stealthaudit-platform)

# Netwrix Access Analyzer

Canonical: https://www.softwareadvice.co.nz/software/157459/stealthaudit-platform

Page: 1 / 2\
Next: [Next page](https://www.softwareadvice.co.nz/software/157459/stealthaudit-platform?page=2)

> Netwrix StealthAUDIT provides a single extensible platform that helps users manage and secure their critical data, core systems and IT assets.&#10;&#10;With 40+ built-in data collection modules covering both on-premises and cloud-based platforms, users can secure their sensitive data wherever it resides. The wizard-driven interface makes it easy to gather the necessary data, and the agentless architecture ensures a fast and lightweight collection process.&#10;&#10;Proactively identifies conditions that put sensitive and regulated data at risk, including excessive user permissions, disabled accounts, and externally shared files. Users can minimize permissions to the least-privilege level by monitoring who is accessing which data and to what extent, and then revoking unneeded rights.&#10;&#10;In addition, users can automatically remove excessive permissions, delete unneeded accounts, and disable rogue user accounts to shut down threats. To avoid business disruptions, users can also simulate a change first and then execute it in a single click.&#10;&#10;The solution empowers data owners to regularly review permissions to their data and fix issues on the spot. It enables business users to request access from data owners, reducing the IT team’s workload. Respond accurately and promptly to DSARS to reduce costs and avoid penalties, thanks to complete visibility into the data they possess on any individual.&#10;&#10;Netwrix StealthAUDIT provides easy-to-digest reports that give auditors hard proof of the user's control over access to regulated data. They can also automate the deprovisioning of AD accounts upon employee termination, cleanup of stale file system data, Exchange mailbox delegation, service ticket creation in ServiceNow, and much more, reducing the IT team's workload and improving system hygiene.&#10;&#10;Finally, the platform helps maximize the value of technology investments and home-grown systems by sharing data between them and Netwrix StealthAUDIT through powerful REST APIs. With the flexible AnyData connector, users can scan any data source for sensitive data.
> 
> Verdict: Rated **4.5/5** by 15 users. Top-rated for **Likelihood to recommend**.

-----

## Quick Stats & Ratings

| Metric | Rating | Detail |
| **Overall** | **4.5/5** | 15 Reviews |
| Ease of Use | 3.9/5 | Based on overall reviews |
| Customer Support | 4.6/5 | Based on overall reviews |
| Value for Money | 4.5/5 | Based on overall reviews |
| Features | 4.4/5 | Based on overall reviews |
| Recommendation percentage | 90% | (9/10 Likelihood to recommend) |

## About the vendor

- **Company**: Netwrix
- **Location**: Irvine, US
- **Founded**: 2006

## Commercial Context

- **Pricing model**: Other (Free Trial)
- **Target Audience**: 1,001–5,000, 5,001–10,000, 10,000+
- **Deployment & Platforms**: Cloud, SaaS, Web-based, Windows (On-Premise), Linux (On-Premise)
- **Supported Languages**: English
- **Available Countries**: Australia, Canada, France, Germany, Ireland, Italy, Netherlands, New Zealand, United Kingdom, United States

## Features

- API
- Access Controls/Permissions
- Active Directory Integration
- Activity Tracking
- Ad hoc Reporting
- Alerts/Notifications
- Asset Tracking
- Audit Management
- Audit Trail
- Compliance Management
- Compliance Tracking
- Configurable Workflow
- Configuration Management
- Customisable Reports
- Data Discovery
- Data Migration
- Data Security
- Data Storage Management
- Data Synchronisation
- Deletion Management

## Support Options

- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- Chat

## Category

- [IT Asset Management Software](https://www.softwareadvice.co.nz/directory/1888/it-asset-management/software)

## Related Categories

- [IT Asset Management Software](https://www.softwareadvice.co.nz/directory/1888/it-asset-management/software)
- [Data Governance Software](https://www.softwareadvice.co.nz/directory/4158/data-governance/software)
- [PCI Compliance Software](https://www.softwareadvice.co.nz/directory/4304/pci-compliance/software)
- [GDPR Compliance Software](https://www.softwareadvice.co.nz/directory/3848/gdpr/software)
- [IT Management Software](https://www.softwareadvice.co.nz/directory/4563/it-management/software)

## Alternatives

1. [Pirani](https://www.softwareadvice.co.nz/software/122791/pirani-riskment-suite) — 4.5/5 (203 reviews)
2. [Wrike](https://www.softwareadvice.co.nz/software/3777/wrike-pm) — 4.4/5 (2887 reviews)
3. [MasterControl Quality Excellence](https://www.softwareadvice.co.nz/software/142000/mastercontrol) — 4.5/5 (526 reviews)
4. [Scrut Automation](https://www.softwareadvice.co.nz/software/514978/Scrut) — 4.9/5 (138 reviews)
5. [AuditBoard](https://www.softwareadvice.co.nz/software/41287/soxhub) — 4.7/5 (414 reviews)

## Reviews

### "StealhAUDIT is the best product there is for monitoring AD and file systems" — 5.0/5

> **Chad** | *20 March 2020* | Real Estate | Recommendation rating: 10.0/10
> 
> **Pros**: Very granular data collection and monitoring. Really love how easy it is to use once the queries are st up.
> 
> **Cons**: Queries are sometimes a bit complicated to set up. Software as a whole requires a huge amount of VM resources.
> 
> Absolutely love it. It has helped me remediate authentication issues and file governance. Very easy to install and initially set up.

-----

### "StealthAUDIT is not perfect, but it's pretty darn good for the price" — 5.0/5

> **Jason** | *13 March 2020* | Insurance | Recommendation rating: 8.0/10
> 
> **Pros**: The built in reports, scanning functionalities, ability to do custom scripting, and the modularity are all major features that make StealthAUDIT appealing.
> 
> **Cons**: Though it can scan and report on a lot of different types of systems, it is very limited in what can be imported into the access audit side of the software for owner approvals.
> 
> We have really enjoyed having StealthAUDIT at Answer Financial.  The product is regularly being updated and expanded, the support has been perfect, and the company is really good about communication (both in telling us what they are working on and taking feedback from their users).

-----

### "Adequate in a field full of inadequacy" — 4.0/5

> **Brian** | *30 March 2020* | Government Administration | Recommendation rating: 7.0/10
> 
> **Pros**: StealthAudit was the only product we tested that was 100% accurate on file activity and could retain the audit data. (Methodology: create 100 files. Access the 100 files. Edit the 100 files. Delete the 100 files. Verify that creation, reads, edits, and deletions were all logged. We did this test with both text files and MS Word files as the way Office edits files is weird.) Another well-known product only logged 40% of the file activity, even after spending \*weeks\* with support and sales engineers to fix the issue. At one point, an engineer blamed Windows for not logging the data, and refused to look at the event log with me where I could see that Windows was logging 100% of the file activity. Whatever you buy, please verify that it works reliably before you buy it.
> 
> **Cons**: Perhaps this has changed since we installed it, but the activity tracking console requires Silverlight to run, forcing me in IE rather than a current browser. It's also slow. It has crashed twice without any notification, causing me to lose all metadata between the time it crashed and the time I caught the crashes. I now know to constantly monitor the system to minimize audit data loss. This is why I describe it "adequate" rather than exceptional even when it was the only tested software that fulfilled its mission.
> 
> The experience is more user friendly than Varonis and less user friendly than Netwrix. Regardless, I see no point in buying audit software that is not accurate.

-----

### "Clearly Designed and Fast at Identifying Risky" — 5.0/5

> **Xero** | *7 August 2025* | Hospital & Health Care | Recommendation rating: 9.0/10
> 
> **Pros**: It's a free tool, which makes it accessible for smaller IT teams and organizations without a large budget. It gives instant insight into effective permissions across file shares and folders, which helps with Identifying excessive or unnecessary access. It quickly highlights risky permissions that helps reduce the attack surface.
> 
> **Cons**: It provides a snapshot, but not real-time monitoring, automation, or alerting for changes. There's no continuous access monitoring or scheduling of reports.
> 
> Netwrix Access Analyzer offers a fast and straightforward experience for organizations that need a quick snapshot of file and folder permissions across Windows file systems. It’s ideal for small IT teams or early-stage audits.

-----

### "StealthAUDIT vs Competitors" — 5.0/5

> **Paul** | *16 March 2020* | Banking | Recommendation rating: 10.0/10
> 
> **Pros**: StealthAUDIT works plain and simple.  It is quick responding, the AIC has everything that we need, easy to deploy and update, no fat client for our users all web based.  &#10;We did an extensive POC/POV with StealthAUDIT and we were surprised the amount of data StealthAUDIT found over Varonis DatAdvantage using the same credentials and the same permissions as what Varonis was using.  We scanned 5 NetApp filers and we ended up finding over 60 million more folders on those filers over Varonis.  When we scanned all of production we found over 1 billion more folders than what Varonis had found.  That is a huge risk that we didn't even know we had.
> 
> **Cons**: The reporting function is very non user friendly unless if you know how to leverage SQL queries.  I know they have ability to leverage Tableau but not everyone has that option.  This is the one item where we actually had to decide if making the switch from Varonis to StealthAUDIT was a good idea or not.  In the end we made the switch and we have become more proficient in report writing but we still need a reporting tool that is more user friendly.

-----

Page: 1 / 2\
Next: [Next page](https://www.softwareadvice.co.nz/software/157459/stealthaudit-platform?page=2)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/software/157459/stealthaudit-platform)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/software/157459/stealthaudit-platform> |
| en | <https://www.softwareadvice.com/pci-compliance/netwrix-stealthaudit-profile/> |
| en-AU | <https://www.softwareadvice.com.au/software/157459/stealthaudit-platform> |
| en-GB | <https://www.softwareadvice.co.uk/software/157459/stealthaudit-platform> |
| en-IE | <https://www.softwareadvice.ie/software/157459/stealthaudit-platform> |
| en-NZ | <https://www.softwareadvice.co.nz/software/157459/stealthaudit-platform> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.nz/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"Netwrix Access Analyzer","description":"Netwrix StealthAUDIT provides a single extensible platform that helps users manage and secure their critical data, core systems and IT assets.\n\nWith 40+ built-in data collection modules covering both on-premises and cloud-based platforms, users can secure their sensitive data wherever it resides. The wizard-driven interface makes it easy to gather the necessary data, and the agentless architecture ensures a fast and lightweight collection process.\n\nProactively identifies conditions that put sensitive and regulated data at risk, including excessive user permissions, disabled accounts, and externally shared files. Users can minimize permissions to the least-privilege level by monitoring who is accessing which data and to what extent, and then revoking unneeded rights.\n\nIn addition, users can automatically remove excessive permissions, delete unneeded accounts, and disable rogue user accounts to shut down threats. To avoid business disruptions, users can also simulate a change first and then execute it in a single click.\n\nThe solution empowers data owners to regularly review permissions to their data and fix issues on the spot. It enables business users to request access from data owners, reducing the IT team’s workload. Respond accurately and promptly to DSARS to reduce costs and avoid penalties, thanks to complete visibility into the data they possess on any individual.\n\nNetwrix StealthAUDIT provides easy-to-digest reports that give auditors hard proof of the user's control over access to regulated data. They can also automate the deprovisioning of AD accounts upon employee termination, cleanup of stale file system data, Exchange mailbox delegation, service ticket creation in ServiceNow, and much more, reducing the IT team's workload and improving system hygiene.\n\nFinally, the platform helps maximize the value of technology investments and home-grown systems by sharing data between them and Netwrix StealthAUDIT through powerful REST APIs. With the flexible AnyData connector, users can scan any data source for sensitive data.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/76acd3ce-8c98-4cab-9fb3-d63d7470f0c2.jpeg","url":"https://www.softwareadvice.co.nz/software/157459/stealthaudit-platform","@type":"SoftwareApplication","@id":"https://www.softwareadvice.co.nz/software/157459/stealthaudit-platform#software","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"aggregateRating":{"@type":"AggregateRating","ratingValue":4.5,"bestRating":5,"ratingCount":15},"operatingSystem":"Cloud, Windows on premise, Linux on premise"},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"IT Asset Management Software","position":2,"item":"/directory/1888/it-asset-management/software","@type":"ListItem"},{"name":"Netwrix Access Analyzer","position":3,"item":"/software/157459/stealthaudit-platform","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.nz/software/157459/stealthaudit-platform#breadcrumblist"}]}
</script>
