---
description: Learn how Netwrix Access Analyzer can help your business. GetApp provides users in New Zealand with the most detailed information on software reviews, prices and features.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/getapp/og_logo-94fd2a03a6c7a0e54fc0c9e21a1c0ce9.png
title: Netwrix Access Analyzer Reviews, Pricing & Ratings | GetApp NZ 2026
---

Breadcrumb: [Home](/) > [IT Management Software](/directory/771/it-management/software) > [Netwrix Access Analyzer](/software/2063296/stealthaudit-platform)

# Netwrix Access Analyzer

Canonical: https://www.getapp.co.nz/software/2063296/stealthaudit-platform

Page: 1 / 2\
Next: [Next page](https://www.getapp.co.nz/software/2063296/stealthaudit-platform?page=2)

> Minimize your attack surface by discovering sensitive information and keeping access to it at the least-privilege level, and prove your success to auditors with ease.
> 
> Verdict: Rated **4.5/5** by 15 users. Top-rated for **Likelihood to recommend**.

-----

## Overview

### Key benefits of Netwrix Access Analyzer

Focus your security efforts by discovering sensitive and regulated data — structured or unstructured, on premises or in the cloud — and enabling data owners to verify data sensitivity.&#10;&#10;Proactively spot conditions that put your sensitive and regulated data at risk, including excessive user permissions, disabled accounts ripe for misuse and externally shared files.&#10;&#10;Minimize permissions to the least-privilege level by monitoring who is accessing which data and to what extent and then revoking unneeded rights.&#10;&#10;Shut down threats by automatically removing excessive permissions, deleting unneeded accounts, disabling rogue user accounts and more. Avoid business disruptions by simulating a change first; then execute it in a single click.&#10;&#10;Identify the owners of sensitive data, and empower them to regularly review permissions to their data and fix issues on the spot. Enable business users to request access from data owners, reducing the IT team’s workload.&#10;&#10;Reduce costs and avoid penalties by responding accurately and promptly to DSARS, thanks to complete visibility into the data you possess on any individual.&#10;&#10;Provide auditors with hard proof of your control over access to regulated data with easy-to-digest reports.&#10;&#10;Reduce IT team workload and improve system hygiene by automating the deprovisioning of AD accounts upon employee termination, cleanup of stale file system data, Exchange mailbox delegation, service ticket creation in ServiceNow and much more.&#10;&#10;Maximize the value of your technology investments and home-grown systems by sharing data between them and Netwrix StealthAUDIT through powerful REST APIs. Scan any data source for sensitive data using the flexible AnyData connector.

## Quick Stats & Ratings

| Metric | Rating | Detail |
| **Overall** | **4.5/5** | 15 Reviews |
| Ease of Use | 3.9/5 | Based on overall reviews |
| Customer Support | 4.6/5 | Based on overall reviews |
| Value for Money | 4.5/5 | Based on overall reviews |
| Features | 4.4/5 | Based on overall reviews |
| Recommendation percentage | 90% | (9/10 Likelihood to recommend) |

## About the vendor

- **Company**: Netwrix
- **Location**: Irvine, US
- **Founded**: 2006

## Commercial Context

- **Pricing model**: Other (Free Trial)
- **Target Audience**: 1,001–5,000, 5,001–10,000, 10,000+
- **Deployment & Platforms**: Cloud, SaaS, Web-based, Windows (On-Premise), Linux (On-Premise)
- **Supported Languages**: English
- **Available Countries**: Australia, Canada, France, Germany, Ireland, Italy, Netherlands, New Zealand, United Kingdom, United States

## Features

- API
- Access Controls/Permissions
- Active Directory Integration
- Activity Tracking
- Ad hoc Reporting
- Alerts/Notifications
- Asset Tracking
- Audit Management
- Audit Trail
- Compliance Management
- Compliance Tracking
- Configurable Workflow
- Configuration Management
- Customisable Reports
- Data Discovery
- Data Migration
- Data Security
- Data Storage Management
- Data Synchronisation
- Deletion Management

## Support Options

- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- Chat

## Category

- [IT Management Software](https://www.getapp.co.nz/directory/771/it-management/software)

## Related Categories

- [IT Management Software](https://www.getapp.co.nz/directory/771/it-management/software)
- [GDPR Compliance Software](https://www.getapp.co.nz/directory/1393/gdpr-compliance/software)
- [PCI Compliance Software](https://www.getapp.co.nz/directory/1343/pci-compliance/software)
- [Risk Management Software](https://www.getapp.co.nz/directory/246/risk-management/software)
- [HIPAA Compliance Software](https://www.getapp.co.nz/directory/1727/hipaa-compliance/software)

## Alternatives

1. [Pirani](https://www.getapp.co.nz/software/2040543/pirani) — 4.5/5 (203 reviews)
2. [Wrike](https://www.getapp.co.nz/software/9964/wrike) — 4.4/5 (2895 reviews)
3. [Scrut Automation](https://www.getapp.co.nz/software/2079223/scrut) — 4.9/5 (139 reviews)
4. [LogicGate Risk Cloud](https://www.getapp.co.nz/software/103623/logicgate) — 4.7/5 (83 reviews)
5. [AuditBoard](https://www.getapp.co.nz/software/108077/soxhub) — 4.7/5 (414 reviews)

## Reviews

### "StealhAUDIT is the best product there is for monitoring AD and file systems" — 5.0/5

> **Chad** | *20 March 2020* | Real Estate | Recommendation rating: 10.0/10
> 
> **Pros**: Very granular data collection and monitoring. Really love how easy it is to use once the queries are st up.
> 
> **Cons**: Queries are sometimes a bit complicated to set up. Software as a whole requires a huge amount of VM resources.
> 
> Absolutely love it. It has helped me remediate authentication issues and file governance. Very easy to install and initially set up.

-----

### "StealthAUDIT is not perfect, but it's pretty darn good for the price" — 5.0/5

> **Jason** | *13 March 2020* | Insurance | Recommendation rating: 8.0/10
> 
> **Pros**: The built in reports, scanning functionalities, ability to do custom scripting, and the modularity are all major features that make StealthAUDIT appealing.
> 
> **Cons**: Though it can scan and report on a lot of different types of systems, it is very limited in what can be imported into the access audit side of the software for owner approvals.
> 
> We have really enjoyed having StealthAUDIT at Answer Financial.  The product is regularly being updated and expanded, the support has been perfect, and the company is really good about communication (both in telling us what they are working on and taking feedback from their users).

-----

### "Adequate in a field full of inadequacy" — 4.0/5

> **Brian** | *30 March 2020* | Government Administration | Recommendation rating: 7.0/10
> 
> **Pros**: StealthAudit was the only product we tested that was 100% accurate on file activity and could retain the audit data. (Methodology: create 100 files. Access the 100 files. Edit the 100 files. Delete the 100 files. Verify that creation, reads, edits, and deletions were all logged. We did this test with both text files and MS Word files as the way Office edits files is weird.) Another well-known product only logged 40% of the file activity, even after spending \*weeks\* with support and sales engineers to fix the issue. At one point, an engineer blamed Windows for not logging the data, and refused to look at the event log with me where I could see that Windows was logging 100% of the file activity. Whatever you buy, please verify that it works reliably before you buy it.
> 
> **Cons**: Perhaps this has changed since we installed it, but the activity tracking console requires Silverlight to run, forcing me in IE rather than a current browser. It's also slow. It has crashed twice without any notification, causing me to lose all metadata between the time it crashed and the time I caught the crashes. I now know to constantly monitor the system to minimize audit data loss. This is why I describe it "adequate" rather than exceptional even when it was the only tested software that fulfilled its mission.
> 
> The experience is more user friendly than Varonis and less user friendly than Netwrix. Regardless, I see no point in buying audit software that is not accurate.

-----

### "Clearly Designed and Fast at Identifying Risky" — 5.0/5

> **Xero** | *7 August 2025* | Hospital & Health Care | Recommendation rating: 9.0/10
> 
> **Pros**: It's a free tool, which makes it accessible for smaller IT teams and organizations without a large budget. It gives instant insight into effective permissions across file shares and folders, which helps with Identifying excessive or unnecessary access. It quickly highlights risky permissions that helps reduce the attack surface.
> 
> **Cons**: It provides a snapshot, but not real-time monitoring, automation, or alerting for changes. There's no continuous access monitoring or scheduling of reports.
> 
> Netwrix Access Analyzer offers a fast and straightforward experience for organizations that need a quick snapshot of file and folder permissions across Windows file systems. It’s ideal for small IT teams or early-stage audits.

-----

### "StealthAUDIT vs Competitors" — 5.0/5

> **Paul** | *16 March 2020* | Banking | Recommendation rating: 10.0/10
> 
> **Pros**: StealthAUDIT works plain and simple.  It is quick responding, the AIC has everything that we need, easy to deploy and update, no fat client for our users all web based.  &#10;We did an extensive POC/POV with StealthAUDIT and we were surprised the amount of data StealthAUDIT found over Varonis DatAdvantage using the same credentials and the same permissions as what Varonis was using.  We scanned 5 NetApp filers and we ended up finding over 60 million more folders on those filers over Varonis.  When we scanned all of production we found over 1 billion more folders than what Varonis had found.  That is a huge risk that we didn't even know we had.
> 
> **Cons**: The reporting function is very non user friendly unless if you know how to leverage SQL queries.  I know they have ability to leverage Tableau but not everyone has that option.  This is the one item where we actually had to decide if making the switch from Varonis to StealthAUDIT was a good idea or not.  In the end we made the switch and we have become more proficient in report writing but we still need a reporting tool that is more user friendly.

-----

Page: 1 / 2\
Next: [Next page](https://www.getapp.co.nz/software/2063296/stealthaudit-platform?page=2)

## Links

- [View on GetApp](https://www.getapp.co.nz/software/2063296/stealthaudit-platform)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.getapp.de/software/2063296/stealthaudit-platform> |
| de-AT | <https://www.getapp.at/software/2063296/stealthaudit-platform> |
| en | <https://www.getapp.com/security-software/a/stealthaudit-platform/> |
| en-AE | <https://www.getapp.ae/software/2063296/stealthaudit-platform> |
| en-AU | <https://www.getapp.com.au/software/2063296/stealthaudit-platform> |
| en-CA | <https://www.getapp.ca/software/2063296/stealthaudit-platform> |
| en-GB | <https://www.getapp.co.uk/software/2063296/stealthaudit-platform> |
| en-IE | <https://www.getapp.ie/software/2063296/stealthaudit-platform> |
| en-NZ | <https://www.getapp.co.nz/software/2063296/stealthaudit-platform> |
| en-SG | <https://www.getapp.sg/software/2063296/stealthaudit-platform> |
| en-ZA | <https://www.getapp.za.com/software/2063296/stealthaudit-platform> |
| es | <https://www.getapp.es/software/2063296/stealthaudit-platform> |
| es-CL | <https://www.getapp.cl/software/2063296/stealthaudit-platform> |
| es-CO | <https://www.getapp.com.co/software/2063296/stealthaudit-platform> |
| es-MX | <https://www.getapp.com.mx/software/2063296/stealthaudit-platform> |
| fr | <https://www.getapp.fr/software/2063296/stealthaudit-platform> |
| fr-BE | <https://fr.getapp.be/software/2063296/stealthaudit-platform> |
| fr-CA | <https://fr.getapp.ca/software/2063296/stealthaudit-platform> |
| nl | <https://www.getapp.nl/software/2063296/stealthaudit-platform> |
| nl-BE | <https://www.getapp.be/software/2063296/stealthaudit-platform> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Review, Compare and Evaluate small business software. GetApp New Zealand has software offers, SaaS and Cloud Apps, independent evaluations and reviews.","email":"info@getapp.co.nz","url":"https://www.getapp.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/getapp/getapp-logo-light-mode-5f7ee07199c9b3b045bc654a55a2b9fa.svg","@id":"https://www.getapp.co.nz/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/getapp","https://www.facebook.com/GetAppcom","https://www.linkedin.com/company/getapp-com-a-gartner-company/","https://www.instagram.com/getappcom/","https://www.youtube.com/c/GetAppCom"]},{"name":"Netwrix Access Analyzer","description":"Netwrix StealthAUDIT automates the collection and analysis of the data you need to minimize your attack surface, prove regulatory compliance, automate threat remediation and more.\n\nMitigate the risks around your sensitive data by reducing access to the minimum, proactively pinpointing conditions that could lead to a breach and automating threat mitigation.\n\nProvide auditors with hard proof that you know where regulated data resides and that you keep it secure, and be able to respond promptly and accurately when individuals exercise their rights under data privacy mandates.\n\nSave valuable IT time and ensure accurate provisioning by enabling users to request access directly from the people who know who actually needs what access to which data: the data owners. Maintain strict adherence to least privilege by making it easy for data owners to regularly review permissions to their data.\n\nSecure your sensitive data wherever it resides with 40+ built-in data collection modules covering both on-premises and cloud-based platforms. A wizard-driven interface makes it easy to gather exactly the data you need, and the agentless architecture makes the data collection process fast and lightweight.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/c5cfe314-6da0-4c7a-8db8-5c1920963eed.jpeg","url":"https://www.getapp.co.nz/software/2063296/stealthaudit-platform","@id":"https://www.getapp.co.nz/software/2063296/stealthaudit-platform#software","@type":"SoftwareApplication","publisher":{"@id":"https://www.getapp.co.nz/#organization"},"applicationCategory":"BusinessApplication","aggregateRating":{"@type":"AggregateRating","ratingValue":4.5,"bestRating":5,"ratingCount":15},"operatingSystem":"Cloud, Windows on premise, Linux on premise"},{"@id":"https://www.getapp.co.nz/software/2063296/stealthaudit-platform#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"IT Management Software","position":2,"item":"/directory/771/it-management/software","@type":"ListItem"},{"name":"Netwrix Access Analyzer","position":3,"item":"/software/2063296/stealthaudit-platform","@type":"ListItem"}]}]}
</script>
