# Best Enterprise Endpoint Protection Platforms

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Products classified in the overall Endpoint Protection Platforms category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Endpoint Protection Platforms to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2&#39;s buying advisors to find the right solutions within the Enterprise Business Endpoint Protection Platforms category.

In addition to qualifying for inclusion in the Endpoint Protection Platforms category, to qualify for inclusion in the Enterprise Business Endpoint Protection Platforms category, a product must have at least 10 reviews left by a reviewer from an enterprise business.





## Category Overview

**Total Products under this Category:** 65


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 12,900+ Authentic Reviews
- 65+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Endpoint Protection Platforms At A Glance

- **Best for Small Businesses:** [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews)
- **Best for Mid-Market:** [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews)
- **Best for Enterprise:** [Chrome Enterprise](https://www.g2.com/products/chrome-enterprise/reviews)
- **Highest User Satisfaction:** [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews)
- **Best Free Software:** [ManageEngine Endpoint Central](https://www.g2.com/products/manageengine-endpoint-central/reviews)

## Top-Rated Products (Ranked by G2 Score)
  ### 1. [Chrome Enterprise](https://www.g2.com/products/chrome-enterprise/reviews)
  Chrome Enterprise is a suite of business offerings that includes Chrome browser, Chrome&#39;s cloud management tool Chrome Enterprise Core, and the advanced security capabilities in Chrome Enterprise Premium.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 1,728

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Google](https://www.g2.com/sellers/google)
- **Company Website:** https://cloud.google.com/
- **Year Founded:** 1998
- **HQ Location:** Mountain View, CA
- **Twitter:** @google (31,885,216 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1441/ (336,169 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Software Developer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 40% Small-Business, 36% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (145 reviews)
- Google Integration (114 reviews)
- Safety/Security (91 reviews)
- Security Features (67 reviews)
- Reliability (66 reviews)

**Cons:**

- Slow Performance (55 reviews)
- RAM Consumption (40 reviews)
- High RAM Usage (39 reviews)
- Data Privacy (37 reviews)
- Limited Customization (34 reviews)

  ### 2. [ManageEngine Endpoint Central](https://www.g2.com/products/manageengine-endpoint-central/reviews)
  ManageEngine Endpoint Central is an all-in-one unified endpoint management and security (UEMS) solution that delivers end-to-end life cycle management and endpoint protection. From automated multi-OS patching and software deployment to asset intelligence and mobile device management, it unifies the core workflows IT teams rely on every day. On the security side, its next-generation antivirus (NGAV) uses behavioral detection, AI, and real-time analytics to detect and stop advanced threats, while built-in attack surface management, browser security, and data loss prevention keep sensitive data protected across office, remote, and frontline endpoints alike. Endpoint Central also prioritizes productivity through digital employee experience (DEX) monitoring, delivering real-time insights into device health, application performance, and endpoint telemetry so IT teams can resolve issues before they impact employees. Recognized as a leader by Gartner®, IDC, and Forrester, Endpoint Central is trusted by over 31, 000 enterprises worldwide and available in both on-premises and SaaS editions. This solution streamlines the complex landscape of endpoint management, empowering IT and security teams to manage more with less, delivering intelligent automation and AI-powered threat mitigation through one unified platform. Business benefits and ROI A commissioned Forrester Total Economic Impact™ study found that organizations deploying Endpoint Central achieved several significant business benefits, including: - 442% return on investment over three years, driven by tool consolidation, automation, and reduced operational overhead. - $4.5 million in total quantified economic benefits (present value), a net present value of $3.7 million, and a payback period of under six months. - 95% reduction in manual patching time, as well as cut licensing and insurance costs through improved security posture and compliance. - Significant reductions in compliance violations and security-related disruptions driven by Endpoint Central’s capability to convert endpoint stability and risk reduction into measurable business outcomes.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1,069

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Compliance:** 10.0/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 10.0/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 10.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Zoho](https://www.g2.com/sellers/zoho-b00ca9d5-bca8-41b5-a8ad-275480841704)
- **Year Founded:** 1996
- **HQ Location:** Austin, TX
- **Twitter:** @Zoho (137,251 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/38373/ (30,531 employees on LinkedIn®)
- **Phone:** +1 (888) 900-9646 

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 65% Mid-Market, 23% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (472 reviews)
- Patch Management (407 reviews)
- Features (292 reviews)
- Software Deployment (283 reviews)
- Endpoint Management (247 reviews)

**Cons:**

- Missing Features (154 reviews)
- Feature Issues (119 reviews)
- Patching Issues (114 reviews)
- Complexity (111 reviews)
- Needs Improvement (103 reviews)

  ### 3. [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews)
  Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster, and more evasive, launching complex attacks that can strike in minutes or even seconds. Traditional security approaches struggle to keep pace, leaving businesses vulnerable. The CrowdStrike Falcon Platform addresses this by offering a unified, cloud-native solution. It consolidates previously siloed security solutions and incorporates third-party data into a single platform with one efficient and resource-conscious agent, leveraging advanced AI and real-time threat intelligence. This approach simplifies security operations, speeds analyst decision making, and enhances protection to stop the breach, allowing organizations to reduce risk with less complexity and lower costs. CrowdStrike&#39;s Falcon Platform includes: - Endpoint Security: Secure the endpoint, stop the breach - Identify Protection: Identity is the front line, defend it - Next-Gen SIEM: The future of SIEM, today - Data Protection: Real-time data protection from endpoint to cloud - Exposure Management: Understand risk to stop breaches - Charlotte AI: Powering the next evolution of the SOC


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 368

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Compliance:** 9.2/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.4/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 9.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [CrowdStrike](https://www.g2.com/sellers/crowdstrike)
- **Company Website:** https://www.crowdstrike.com
- **Year Founded:** 2011
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @CrowdStrike (110,215 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2497653/ (11,258 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Analyst, Cyber Security Analyst
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 46% Enterprise, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Features (113 reviews)
- Threat Detection (103 reviews)
- Ease of Use (98 reviews)
- Security (97 reviews)
- Detection (86 reviews)

**Cons:**

- Expensive (54 reviews)
- Complexity (39 reviews)
- Learning Curve (35 reviews)
- Limited Features (31 reviews)
- Pricing Issues (29 reviews)

  ### 4. [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews)
  Sophos Endpoint is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Sophos Endpoint has been proven to prevent even the most advanced ransomware and malware by leveraging a unique combination of next-generation techniques. This includes the ability to detect never-before-seen malware with deep learning, stop ransomware with Sophos anti-ransomware technology, and deny attacker tools with signatureless exploit prevention. Sophos Endpoint also includes root cause analysis to provide insight into threats, and instant malware removal to ensure no attack remnants remain.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 782

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 8.9/10)
- **Compliance:** 9.3/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.4/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 9.2/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Sophos](https://www.g2.com/sellers/sophos)
- **Company Website:** https://www.sophos.com/
- **Year Founded:** 1985
- **HQ Location:** Oxfordshire
- **Twitter:** @Sophos (36,759 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5053/ (5,561 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 59% Mid-Market, 18% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (191 reviews)
- Protection (180 reviews)
- Security (165 reviews)
- Threat Detection (129 reviews)
- Easy Management (124 reviews)

**Cons:**

- Slow Performance (73 reviews)
- High Resource Usage (52 reviews)
- Learning Curve (50 reviews)
- Difficult Configuration (36 reviews)
- High CPU Usage (34 reviews)

  ### 5. [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)
  ThreatLocker is a global leading Zero Trust Platform designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This suite of security tools is tailored for a wide range of users, including businesses, government agencies, and academic institutions, all of whom face the increasing threat of cybercrime. By enabling users to manage application execution, ThreatLocker aims to create a secure environment where organizations can operate without the looming fear of malware and other cyber threats. The ThreatLocker suite stands out in the cybersecurity landscape due to its focus on application whitelisting, a proactive approach that allows organizations to define and enforce policies on what software can be executed. This feature is particularly beneficial for organizations that require stringent security measures, as it minimizes the risk of unauthorized applications compromising sensitive data. The solution is designed for IT administrators who seek to enhance their network security posture while maintaining operational efficiency. One of the key features of ThreatLocker is its ability to provide real-time visibility and control over application behavior. This allows organizations to monitor application usage and detect any suspicious activities that may indicate a potential threat. Additionally, ThreatLocker offers customizable policies that can be tailored to meet the specific needs of different departments or user groups within an organization, ensuring that security measures align with operational requirements. Another significant benefit of ThreatLocker is its user-friendly interface, which simplifies the management of security policies. This accessibility enables IT teams to implement and adjust security measures without extensive training or expertise in cybersecurity. Furthermore, ThreatLocker is backed by a team of experienced cybersecurity professionals who continuously update and enhance the platform to address emerging threats and vulnerabilities. In essence, ThreatLocker provides organizations with the tools they need to take control of their cybersecurity strategy. By focusing on application control and offering robust monitoring capabilities, ThreatLocker helps organizations mitigate risks associated with cyber threats while fostering a secure environment for their operations. This innovative approach to cybersecurity empowers users to navigate their digital landscape confidently, free from the influence of cybercriminals.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 473

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 8.9/10)
- **Compliance:** 9.3/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.0/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.5/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Threatlocker Inc](https://www.g2.com/sellers/threatlocker-inc)
- **Company Website:** https://www.threatlocker.com
- **Year Founded:** 2017
- **HQ Location:** Orlando, Florida, United States
- **Twitter:** @ThreatLocker (2,735 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/65512111/ (686 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** President, CEO
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 54% Small-Business, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (92 reviews)
- Threat Detection (87 reviews)
- Ease of Use (75 reviews)
- Security (71 reviews)
- Protection (69 reviews)

**Cons:**

- Learning Curve (44 reviews)
- Difficult Learning Curve (30 reviews)
- Difficult Configuration (16 reviews)
- Difficult Navigation (14 reviews)
- Training Required (13 reviews)

  ### 6. [IBM MaaS360](https://www.g2.com/products/ibm-maas360/reviews)
  IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its open, cloud-based platform integrates with preferred security and productivity tools. You can protect your workforce with evolved Threat Management, Mobile Security, Device management features and your analytics will be powered by watsonx AI capabilities, helping you to set up a good security posture. IBM MaaS360 is available for purchase on ibm.com and AWS Marketplace.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 183

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.0/10 (Category avg: 8.9/10)
- **Compliance:** 9.6/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 7.5/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 6.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [IBM](https://www.g2.com/sellers/ibm)
- **Company Website:** https://www.ibm.com/us-en
- **Year Founded:** 1911
- **HQ Location:** Armonk, NY
- **Twitter:** @IBM (709,023 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1009/ (324,553 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 45% Mid-Market, 34% Enterprise


#### Pros & Cons

**Pros:**

- Features (48 reviews)
- Security (46 reviews)
- Device Management (38 reviews)
- Ease of Use (37 reviews)
- Protection (24 reviews)

**Cons:**

- Learning Curve (24 reviews)
- Poor Interface Design (17 reviews)
- Poor UI (17 reviews)
- Slow Performance (17 reviews)
- Outdated Interface (13 reviews)

  ### 7. [FortiClient](https://www.g2.com/products/forticlient/reviews)
  Integrated endpoint protection that provides automated next-generation threat protection, as well as visibility and control of your software and hardware inventory across the entire security fabric. Identify and remediate vulnerable or compromised hosts across your attack surface.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 266

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 8.9/10)
- **Compliance:** 9.1/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.1/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.4/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,464 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)
- **Ownership:** NASDAQ: FTNT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 58% Mid-Market, 26% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (40 reviews)
- Security (38 reviews)
- VPN Efficiency (31 reviews)
- Connectivity (25 reviews)
- Reliability (24 reviews)

**Cons:**

- Unstable Connection (21 reviews)
- Slow Performance (20 reviews)
- Connection Issues (19 reviews)
- Remote Access Issues (16 reviews)
- Update Issues (13 reviews)

  ### 8. [Cortex XDR](https://www.g2.com/products/palo-alto-networks-cortex-xdr/reviews)
  Cortex XDR is the industry’s first extended detection and response platform that stops modern attacks by integrating data from any source. With Cortex XDR, you can harness the power of AI, analytics and rich data to detect stealthy threats. Your SOC team can cut through the noise and focus on what matters most with intelligent alert grouping and incident scoring. Cross-data insights accelerate investigations, so you can streamline incident response and recovery. Cortex XDR delivers peace of mind with best-in-class endpoint protection that achieved the highest combined protection and detection scores in the MITRE ATT&amp;CK® round 3 evaluation. The Cortex XDR platform collects and analyzes all data, so you can gain complete visibility and holistic protection to secure what’s next.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 48

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Compliance:** 9.4/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.4/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,686 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 45% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Threat Detection (2 reviews)
- XDR Capabilities (2 reviews)
- Alert Notifications (1 reviews)
- Antivirus Protection (1 reviews)

**Cons:**

- Compatibility Issues (1 reviews)
- Complexity (1 reviews)
- Complex Management (1 reviews)
- Difficult Learning (1 reviews)
- Expensive (1 reviews)

  ### 9. [Check Point Harmony Endpoint](https://www.g2.com/products/check-point-harmony-endpoint/reviews)
  Harmony Endpoint is a complete endpoint security solution offering a fleet of advanced endpoint threat prevention capabilities so you can safely navigate today’s menacing threat landscape. It provides a comprehensive system to proactively prevent, detect, and remediate evasive malware attacks.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 255

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.9/10)
- **Compliance:** 8.8/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.1/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,978 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Who Uses This:** Network Engineer, Security Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 53% Mid-Market, 27% Enterprise


#### Pros & Cons

**Pros:**

- Security (73 reviews)
- Features (57 reviews)
- Threat Detection (51 reviews)
- Protection (50 reviews)
- Ease of Use (46 reviews)

**Cons:**

- Slow Performance (27 reviews)
- High Resource Usage (25 reviews)
- Difficult Configuration (21 reviews)
- Expensive (21 reviews)
- Learning Curve (21 reviews)

  ### 10. [Microsoft Defender for Endpoint](https://www.g2.com/products/microsoft-defender-for-endpoint/reviews)
  Microsoft Defender for Endpoint is a complete endpoint security solution that delivers preventative protection, post-breach detection, automated investigation, and response. With Defender for Endpoint, you have: Agentless, cloud powered - No additional deployment or infrastructure. No delays or update compatibility issues. Always up to date. Unparalleled optics - Built on the industry’s deepest insight into Windows threats and shared signals across devices, identities, and information. Automated security - Take your security to a new level by going from alert to remediation in minutes—at scale.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 299

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 8.9/10)
- **Compliance:** 8.7/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.9/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,105,844 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Security Analyst
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 39% Enterprise, 35% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (20 reviews)
- Threat Detection (18 reviews)
- Security (17 reviews)
- Protection (15 reviews)
- Cybersecurity Protection (14 reviews)

**Cons:**

- Compatibility Issues (8 reviews)
- Complexity (8 reviews)
- Difficult Configuration (7 reviews)
- Improvements Needed (7 reviews)
- Lack of Clarity (7 reviews)

  ### 11. [Symantec End-user Endpoint Security](https://www.g2.com/products/symantec-end-user-endpoint-security/reviews)
  Symantec Endpoint Protection (SEP) is designed to protect against malware attacks including targeted attacks, advanced persistent threats, and zero-day threats with a layered approach to security at the endpoint. Superior protection that fuses essential and next-gen technologies in a multi-layered fashion. High-performance, lightweight single client, single management console across both physical and virtual protection and orchestrated response delivered at scale


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 516

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.4/10 (Category avg: 8.9/10)
- **Compliance:** 9.2/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.0/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Who Uses This:** Marketeer, Engineer
  - **Top Industries:** Information Technology and Services, Events Services
  - **Company Size:** 48% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Threat Detection (4 reviews)
- Security (3 reviews)
- Configuration Ease (2 reviews)
- Ease of Use (2 reviews)
- Features (2 reviews)

**Cons:**

- Slow Performance (3 reviews)
- High CPU Usage (2 reviews)
- High Resource Usage (2 reviews)
- Limited Features (2 reviews)
- Complex Installation (1 reviews)

  ### 12. [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews)
  Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Experience best-in-class protection thanks to our in-house global cyber threat intelligence, compiled and examined for over 30 years, which drives our extensive R&amp;D network led by industry-acclaimed researchers. ESET PROTECT, our cloud-first XDR cybersecurity platform combines next-gen prevention, detection, and proactive threat hunting capabilities. ESET&#39;s highly customizable solutions include local support and have minimal impact on performance, identify and neutralize known and emerging threats before they can be executed, support business continuity, and reduce the cost of implementation and management. HOW YOUR ORGANIZATION WILL BENEFIT - Improved protection against ransomware and zero-day threats via cloud-based sandboxing technology. - Helps comply with data regulations thanks to full disk encryption capabilities on Windows and macOS. - Easily accessible ESET PROTECT console improves TCO of security management. - Single-pane-of-glass remote management for visibility of threats, users, and quarantined items. - Company endpoints and mobiles are protected via advanced multilayered technology, now with brute-force attack protection.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 942

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Compliance:** 9.3/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.2/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [ESET](https://www.g2.com/sellers/eset)
- **Company Website:** https://www.eset.com
- **Year Founded:** 1992
- **HQ Location:** Bratislava, Slovak Republic
- **Twitter:** @ESET (276,397 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/28967/ (1,944 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Network Administrator
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 47% Mid-Market, 46% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (95 reviews)
- Protection (79 reviews)
- Reliability (71 reviews)
- Security (64 reviews)
- Centralized Management (58 reviews)

**Cons:**

- Learning Curve (32 reviews)
- Difficult Configuration (31 reviews)
- Not User-Friendly (25 reviews)
- Lack of Clarity (23 reviews)
- Difficult Navigation (20 reviews)

  ### 13. [Trend Vision One - Endpoint Security](https://www.g2.com/products/trend-vision-one-endpoint-security/reviews)
  Trend Micro Endpoint Security provides immediate protection for enterprise endpoints lowering infections by instantly securing end-points from sophisticated cybercriminal attacks


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 111

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 8.9/10)
- **Compliance:** 9.1/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.2/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 9.1/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager
  - **Top Industries:** Information Technology and Services, Banking
  - **Company Size:** 58% Mid-Market, 35% Enterprise


#### Pros & Cons

**Pros:**

- Centralized Management (2 reviews)
- Ease of Use (2 reviews)
- Features (2 reviews)
- Threat Detection (2 reviews)
- Blocking (1 reviews)

**Cons:**

- Integration Issues (2 reviews)
- Learning Curve (2 reviews)
- Console Issues (1 reviews)
- Difficult Configuration (1 reviews)
- High System Requirements (1 reviews)

  ### 14. [Cynet](https://www.g2.com/products/cynet/reviews)
  Cynet is the unified, AI-powered cybersecurity platform that delivers robust and comprehensive protection for security teams while maximizing operational efficiency for managed service providers (MSPs). This platform consolidates a wide array of security capabilities into a single, user-friendly interface, ensuring that organizations can effectively safeguard their digital assets without the complexity often associated with multi-solution environments. Cynet’s platform simplifies security management by integrating various functionalities, such as endpoint protection, threat detection, and incident response, into one cohesive system. This integration not only streamlines operations but also allows organizations to allocate their resources more effectively, ultimately enhancing their overall security posture. One of the standout features of Cynet’s platform is its remarkable performance in the MITRE ATT&amp;CK Evaluations. Cynet delivered 100% visibility and 100% analytic coverage without requiring any configuration changes three years in a row. This capability ensures that organizations can monitor their environments comprehensively and respond to threats with precision. The platform’s built-in analytics and reporting tools provide actionable insights, enabling users to make informed decisions about their cybersecurity strategies. Additionally, Cynet offers 24/7 expert support, which is crucial for organizations that may not have in-house cybersecurity expertise. This round-the-clock assistance ensures that users can quickly address any security incidents or concerns, minimizing potential downtime and damage. The combination of advanced technology and dedicated support positions Cynet as a valuable partner for SMEs and service providers looking to enhance their cybersecurity measures. In summary, Cynet’s unified, AI-powered cybersecurity platform stands out in the crowded cybersecurity market by offering a unified solution tailored to the needs of MSPs. Its comprehensive features, exceptional performance in industry evaluations, and continuous expert support make it a compelling choice for organizations seeking to bolster their cybersecurity defenses while maintaining operational efficiency.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 208

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.5/10 (Category avg: 8.9/10)
- **Compliance:** 9.3/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.5/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 9.4/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Cynet](https://www.g2.com/sellers/cynet)
- **Company Website:** https://www.cynet.com/
- **Year Founded:** 2014
- **HQ Location:** Boston, MA
- **LinkedIn® Page:** https://www.linkedin.com/company/cynet-security/ (329 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** SOC Analyst, Technical Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 58% Mid-Market, 30% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (48 reviews)
- Features (36 reviews)
- Threat Detection (34 reviews)
- Customer Support (32 reviews)
- Security (31 reviews)

**Cons:**

- Limited Customization (11 reviews)
- Feature Limitations (10 reviews)
- Lack of Customization (10 reviews)
- Limited Features (10 reviews)
- Missing Features (10 reviews)

  ### 15. [ThreatDown](https://www.g2.com/products/threatdown/reviews)
  ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – to protect people, devices, and data in minutes. The ThreatDown product line is enriched by Malwarebytes global threat intelligence, its patented remediation engine that removes every trace of malware to prevent reinfection, and its nearly two decades of experience detecting and remediating threats. With one agent and one console, ThreatDown solutions are purpose-built to simplify cybersecurity for organizations with limited IT resources. ThreatDown solutions bundle technology with services to streamline security and provide robust protection that’s efficient and cost-effective. With a channel-first mindset across the globe, we empower our partners to help resource-constrained IT organizations. ThreatDown Solutions: ThreatDown MDR (managed detection and response) combines Malwarebytes’ renowned detection, with AI-powered engines, and around-the-clock human intervention to streamline security and allow organizations to focus on business growth. ThreatDown MDR simply and effectively closes your security resources gap, reduces your risk of unknown threats, and increases your security efficiency exponentially. ThreatDown EDR (endpoint detection and response) is enriched by Malwarebytes global threat intelligence and its patented remediation engine that removes every trace of malware to prevent reinfection. It provides protection against a range of threats, including malware, ransomware, zero-day exploits, phishing, and other threats with a suite of tools to detect, investigate and contain even the stealthiest human-operated attacks that bypass prevention layers. Seven-day ransomware rollback ensures organizations can turn the clock back on attacks and restore systems. ThreatDown Security Advisor provides customers with a security score to illustrate their current level of protection, offers guidance on how to make improvements and enables them to take immediate action. ThreatDown Bundles: ThreatDown Core is a complete malware prevention solution with vulnerability assessment and application blocking. It features our award-winning prevention technologies, visibility to assess your risk for vulnerability exploits (one of the most common attack vectors), and the blocking of malicious and unwanted applications. ThreatDown Advanced includes award-winning technologies such as endpoint detection and response, ransomware rollback, patch management, and managed threat hunting to appreciably enhance endpoint security. ThreatDown Elite is purpose-built for organizations with small (to non-existent) security teams that lack the resources to address all security alerts. Beyond the Advanced bundle, Elite includes 24x7x365 expert-managed detection and response. ThreatDown Ultimate includes the technologies and human expertise you need for comprehensive protection wrapped up and delivered as a single, hassle-free solution. Ultimate also includes easy-to-use, website content filtering (DNS Filtering). For Partners Our multi-tenant ThreatDown OneView platform enables MSPs and IT admins to streamline operations with centralized management of customer endpoints, license subscriptions, reporting, and global policies. With products and services like Endpoint Detection and Response (EDR), Managed Detection and Response (MDR) and the rest of our technologies in our portfolio, partners can offer the right product or service to each customer, tailored to their specific needs. Find out more about our partner program at https://www.threatdown.com/partner-program.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,039

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Compliance:** 9.1/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.0/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Malwarebytes](https://www.g2.com/sellers/malwarebytes)
- **Company Website:** https://www.malwarebytes.com
- **Year Founded:** 2008
- **HQ Location:** Santa Clara, CA
- **Twitter:** @Malwarebytes (87,543 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/malwarebytes/ (613 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 48% Small-Business, 41% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (99 reviews)
- Features (68 reviews)
- Security (59 reviews)
- Threat Detection (56 reviews)
- Customer Support (54 reviews)

**Cons:**

- Poor Customer Support (23 reviews)
- Lack of Clarity (22 reviews)
- Missing Features (20 reviews)
- False Positives (18 reviews)
- Communication Issues (16 reviews)

  ### 16. [Acronis Cyber Protect Cloud](https://www.g2.com/products/acronis-cyber-protect-cloud/reviews)
  Acronis delivers the world’s most complete cyber resilience platform, combining backup, disaster recovery, cybersecurity, RMM, and business operations tools into a single, natively integrated solution. Built specifically for Managed Service Providers (MSPs) and IT teams, Acronis simplifies operations with one agent, one console, and one license model. Automation, AI-driven insights, and multi-tenant management ensure that fewer technicians can manage more clients at lower cost. With predictable pricing and transparent billing, Acronis enables partners and IT teams to scale efficiently, comply with regulations, and deliver unmatched resilience. No other vendor delivers this level of integration, efficiency, and MSP alignment. Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating costs. Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware (including anti-virus, anti-ransomware, and anti-cryptojacking) and security and management capabilities such as vulnerability assessments, patch management, URL filtering and more. Now, service providers can eliminate complexity and make security a centerpiece of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Get upgraded security with integrated AI-based defenses that protect clients from modern threats, make smarter use of resources so your team can focus on clients, and earn new recurring revenue and higher margins that strengthen your business. Enriched with next-gen, full-stack anti-malware protection and comprehensive yet simple management tools, built on top of our industry-leading backup and data recovery solution, Acronis Cyber Protect Cloud simplifies onboarding, daily operations, and reporting, and combats advanced attacks with new use cases enabled by integration. Acronis Cyber Protect Cloud makes it easy to deliver the modern cyber protection your clients seek. Acronis is majority-owned by EQT.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 1,260

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 8.9/10)
- **Compliance:** 9.2/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.1/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 9.1/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Acronis](https://www.g2.com/sellers/acronis)
- **Company Website:** https://www.acronis.com/
- **Year Founded:** 2003
- **HQ Location:** Schaffhausen
- **Twitter:** @acronis (94,780 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/13179/ (1,917 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Director, CEO
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 68% Small-Business, 28% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (217 reviews)
- Backup Solutions (213 reviews)
- Backup Ease (169 reviews)
- Protection (159 reviews)
- Security (158 reviews)

**Cons:**

- Slow Performance (77 reviews)
- Expensive (65 reviews)
- Complexity (53 reviews)
- Poor Customer Support (50 reviews)
- Backup Issues (41 reviews)

  ### 17. [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews)
  SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and empowers leading global enterprises with real-time visibility, cross-platform correlation, and AI-powered response across endpoints, cloud workloads and containers, network-connected (IoT) devices and identity-centric attack surfaces. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, on LinkedIn or Facebook. Over 9,250 customers, including 4 of the Fortune 10, hundreds of the Global 2000, prominent governments, healthcare providers, and educational institutions, trust SentinelOne to bring their defenses into the future, gaining more capability with less complexity. SentinelOne is a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms, and is a go-to platform across all customer profiles, as highlighted in Gartner’s Critical Capabilities report. SentinelOne continues to prove its industry-leading capabilities in the MITRE Engenuity ATT&amp;CK® Evaluation, with 100% protection detection, 88% less noise, and zero delays in the 2024 MITRE ATT&amp;CK Engenuity evaluations, demonstrating our dedication to keeping our customers ahead of threats from every vector.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 193

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 8.9/10)
- **Compliance:** 8.8/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.4/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 9.6/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [SentinelOne](https://www.g2.com/sellers/sentinelone)
- **Company Website:** https://www.sentinelone.com
- **Year Founded:** 2013
- **HQ Location:** Mountain View, CA
- **Twitter:** @SentinelOne (57,607 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2886771/ (3,183 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 45% Mid-Market, 37% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (16 reviews)
- Features (11 reviews)
- Threat Detection (11 reviews)
- Customer Support (10 reviews)
- Security (7 reviews)

**Cons:**

- Learning Curve (4 reviews)
- Not User-Friendly (4 reviews)
- Slow Performance (4 reviews)
- Complexity (3 reviews)
- Difficult Configuration (3 reviews)

  ### 18. [Trellix Endpoint Security](https://www.g2.com/products/trellix-endpoint-security/reviews)
  Trellix Endpoint Security Suite gives your security team the context, visibility, and capabilities to identify, investigate, and remediate threats across your hybrid environment. And it provides the data essential for your extended detection and response.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 319

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.1/10 (Category avg: 8.9/10)
- **Compliance:** 9.0/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.8/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.6/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Trellix](https://www.g2.com/sellers/trellix)
- **Year Founded:** 2004
- **HQ Location:** Milpitas, CA
- **Twitter:** @Trellix (241,709 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/44195/ (811 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Senior Software Engineer, Software Developer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 41% Mid-Market, 41% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (6 reviews)
- Features (4 reviews)
- Threat Detection (4 reviews)
- Customer Support (3 reviews)
- Protection (3 reviews)

**Cons:**

- Difficult Configuration (2 reviews)
- Expensive (2 reviews)
- Agent Issues (1 reviews)
- Complex Installation (1 reviews)
- Complex Interface (1 reviews)

  ### 19. [Webroot Business Endpoint Protection](https://www.g2.com/products/webroot-business-endpoint-protection/reviews)
  It’s the digital armor protecting you and your business from devastating, multi-layered cyberattacks. The truth is, antivirus just isn&#39;t enough anymore. Today’s cybercriminals layer their attack methods to maximize the likelihood of success. That&#39;s why Webroot Business Endpoint Protection is backed by real-time threat intelligence to protect businesses from threats across email, web browsing, files, URLs, malicious ads, apps, and more. Plus, in the event that a system does get compromised, Webroot Business Endpoint Protection offers unique journaling and rollback remediation that can help return local drives to their uninfected state, minimizing (and even eliminating) the need to reimage systems. Start building out your security layers with Webroot Business Endpoint Protection for defense in depth and a more resilient business. Trials are free for 30 days and the no-software-conflict design means you can install and run it alongside existing security. That way, your business, users and clients never have to worry about gaps in their protection.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 481

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 8.9/10)
- **Compliance:** 8.8/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.0/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.8/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Webroot](https://www.g2.com/sellers/webroot)
- **Year Founded:** 1997
- **HQ Location:** Broomfield, CO
- **Twitter:** @Webroot (60,328 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/7434/ (249 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 54% Small-Business, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (5 reviews)
- Console Management (3 reviews)
- Performance (3 reviews)
- Protection (3 reviews)
- Setup Ease (3 reviews)

**Cons:**

- Compatibility Issues (2 reviews)
- Ineffective Antivirus Protection (2 reviews)
- Lack of Clarity (2 reviews)
- Limited Features (2 reviews)
- Poor Interface Design (2 reviews)

  ### 20. [Absolute Secure Endpoint](https://www.g2.com/products/absolute-secure-endpoint/reviews)
  The Absolute Secure Endpoint product portfolio leverages the unbreakable connection provided by Absolute Persistence® to enable IT and security personnel to monitor and address computers&#39; problems and enables the computers and their mission-critical applications to self-heal. This helps with IT management, strengthening a company’s security posture, and maintaining compliance • Absolute Visibility collects data about the endpoints&#39; location, security posture, and hardware/software inventory. It provides analysis of software and hardware utilization and identifies potential failure points and suspicious use patterns. • Absolute Control adds to these capabilities to control endpoints over the Internet, allowing for critical functions such as remote file deletion and data wipe, freezing devices on demand when at-risk, end user messaging, as well as establishing geo-fences and alerts. • Absolute Resilience adds further capabilities to secure endpoints from threats and vulnerabilities, respond to security breaches and incidents, and enable Application Resilience to automatically monitor and detect unhealthy applications and automatically heal them. • Absolute Ransomware Response is a standalone offering that enables organizations to assess their ransomware preparedness and cyber hygiene across endpoints; ensures mission-critical security applications such as anti-malware and device management tools remain healthy and capable of self-healing; and expedites the quarantine and recovery of endpoints if a ransomware attack occurs.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 399

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 8.9/10)
- **Compliance:** 8.9/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.6/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.4/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Absolute Security](https://www.g2.com/sellers/absolute-security)
- **Company Website:** https://www.absolute.com
- **Year Founded:** 1993
- **HQ Location:** British Columbia, Canada
- **Twitter:** @absolutecorp (3,908 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/14388/ (1,248 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Hospital &amp; Health Care
  - **Company Size:** 50% Mid-Market, 38% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (39 reviews)
- Features (25 reviews)
- Security (25 reviews)
- Patch Management (19 reviews)
- Customer Support (18 reviews)

**Cons:**

- Missing Features (10 reviews)
- Learning Curve (9 reviews)
- Limited Features (8 reviews)
- Needs Improvement (8 reviews)
- Not User-Friendly (8 reviews)

  ### 21. [WatchGuard Endpoint Security](https://www.g2.com/products/watchguard-endpoint-security/reviews)
  WatchGuard Endpoint Security solutions help you safeguard devices against cyber threats. WatchGuard EPDR and Advanced EPDR, our AI-powered flagship endpoint solutions, enhance your security posture by seamlessly integrating endpoint protection (EPP) with detection and response (EDR) capabilities alongside our Zero-Trust Application and Threat Hunting Services. All are tightly integrated within WatchGuard Cloud and ThreatSync, delivering valuable visibility and intelligence while fortifying cross-product detection and response (XDR).


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 115

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 8.9/10)
- **Compliance:** 8.8/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.3/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [WatchGuard](https://www.g2.com/sellers/watchguard)
- **Company Website:** https://www.watchguard.com
- **Year Founded:** 1996
- **HQ Location:** Seatle, WA
- **Twitter:** @watchguard (19,459 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/166878/ (1,218 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Software Developer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 55% Small-Business, 34% Mid-Market


#### Pros & Cons

**Pros:**

- Features (3 reviews)
- Protection (3 reviews)
- Security (3 reviews)
- Cybersecurity Protection (2 reviews)
- Ease of Use (2 reviews)

**Cons:**

- Complex Interface (1 reviews)
- Complexity (1 reviews)
- Difficult Configuration (1 reviews)
- Expensive (1 reviews)
- Setup Complexity (1 reviews)

  ### 22. [Carbon Black Cloud](https://www.g2.com/products/carbon-black-cloud/reviews)
  The Carbon Black Cloud security platform helps you strengthen and unify security tools to see more and stop more. Carbon Black unifies visibility across your endpoints, networks, and containers to enable you to stop threats targeting your organization with speed and confidence. Carbon Black protects against the full spectrum of modern cyber-attacks, including emerging threats and ransomware. Top SOC teams, IR firms and MSSPs have adopted Carbon Black as a core component of their prevention, detection, and response capability stack. Carbon Black is available via MSSP or directly.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 38

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Compliance:** 8.0/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.9/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Financial Services
  - **Company Size:** 56% Mid-Market, 33% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Antivirus Protection (1 reviews)
- Artificial Intelligence (1 reviews)
- Easy Management (1 reviews)
- Efficiency (1 reviews)

**Cons:**

- Compatibility Issues (1 reviews)
- Complex Implementation (1 reviews)
- Configuration Issues (1 reviews)
- Excessive Blocking (1 reviews)
- False Positives (1 reviews)

  ### 23. [Kaspersky Next Optimum](https://www.g2.com/products/kaspersky-next-optimum/reviews)
  Kaspersky Next Optimum is the ideal choice for small and mid-sized businesses with lean cybersecurity teams. The offering is uniting in itself with strong endpoint protection, essential detection and response capabilities (EDR), and a seamless upgrade to XDR and MXDR for sophisticated cybersecurity. Layers of Kaspersky Next Optimum: • Kaspersky Next EDR Foundations – Powerful ML-based EPP, flexible security controls and EDR root cause analysis tools equip you with the most straightforward way to build a strong foundation for your cybersecurity. • Kaspersky Next EDR Optimum – Combines strong endpoint protection with enhanced controls, patch and encryption management, training for IT staff, cloud security and more – all boosted by essential EDR functionality to help you deflect attacks rapidly, with minimal demand on your resources. • Kaspersky Next XDR Optimum – In addition to exceptional EPP and automatic response capabilities that help identify, analyze and neutralize evasive threats, the solution gives you affordable, user-friendly detection and response tools that go beyond endpoints, as well as access to our online learning platform to raise the security awareness of your employees. • Kaspersky Next MXDR Optimum – Get expert-managed protection against sophisticated threats, delivered by Kaspersky’s globally renowned SOC experts with 24/7 infrastructure monitoring – while keeping essential XDR capabilities in-house.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 195

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.2/10 (Category avg: 8.9/10)
- **Compliance:** 8.9/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.9/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Kaspersky](https://www.g2.com/sellers/kaspersky-bce2dc7f-2586-4e87-96da-114de2c40584)
- **Year Founded:** 1997
- **HQ Location:** Moscow
- **Twitter:** @kasperskylabind (1,294 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaspersky/ (4,494 employees on LinkedIn®)
- **Phone:** 1-866-328-5700

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 47% Mid-Market, 33% Small-Business


#### Pros & Cons

**Pros:**

- Blocking (5 reviews)
- Ease of Use (5 reviews)
- Threat Protection (5 reviews)
- Protection (4 reviews)
- Threat Detection (4 reviews)

**Cons:**

- High Resource Usage (6 reviews)
- Slow Performance (5 reviews)
- Compatibility Issues (2 reviews)
- Complex Setup (2 reviews)
- Difficult Configuration (2 reviews)

  ### 24. [Avast Endpoint Protection](https://www.g2.com/products/avast-endpoint-protection/reviews)
  Avast delivers all-in-one cybersecurity solutions, protecting over 400 million users. Our Endpoint Protection solutions like Next-gen Antivirus and automated Patch Management work together to protect your devices, data, and applications - saving both time and money.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 99

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Compliance:** 8.3/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.1/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Gen Digital](https://www.g2.com/sellers/gen-digital)
- **Year Founded:** 2022
- **HQ Location:** Tempe, Arizona
- **Twitter:** @GenDigitalInc (4,477 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/gendigitalinc (3,421 employees on LinkedIn®)
- **Ownership:** NASDAQ: GEN

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 63% Small-Business, 25% Mid-Market


#### Pros & Cons

**Pros:**

- Centralized Management (1 reviews)
- Dashboard Usability (1 reviews)
- Deployment Ease (1 reviews)
- Easy Management (1 reviews)
- Efficiency (1 reviews)

**Cons:**

- Alert Issues (1 reviews)
- Configuration Issues (1 reviews)

  ### 25. [WithSecure Elements Extended Detection and Response (XDR)](https://www.g2.com/products/withsecure-elements-extended-detection-and-response-xdr/reviews)
  WithSecure Elements Extended Detection and Response (XDR) is a unified solution, designed to protect modern IT estates. It minimizes the impact of attacks by using automated and advanced preventative controls that keep incident volumes and lower-level attacks at bay. AI-powered tooling enables fast detection, investigation, and response to threats. Luminen GenAI assistant is automatically included with Elements XDR, further empowering your analyst. Secure your digital environment: - Endpoints (laptops and workstations, mobiles, servers) - Digital identities and their user credentials (Microsoft Entra ID) - Cloud resources (Microsoft Azure) - Emails and cloud-based collaboration services (Microsoft 365 including Exchange, SharePoint sites, OneDrive, and Microsoft Teams)


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 117

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.9/10)
- **Compliance:** 9.0/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.3/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 9.1/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [WithSecure](https://www.g2.com/sellers/withsecure)
- **Year Founded:** 1988
- **HQ Location:** Helsinki, Finland
- **Twitter:** @WithSecure (66,645 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6219/ (1,746 employees on LinkedIn®)
- **Ownership:** FSOYF

**Reviewer Demographics:**
  - **Company Size:** 45% Mid-Market, 40% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Efficiency (2 reviews)
- Alerting (1 reviews)
- Cloud Management (1 reviews)
- Easy Management (1 reviews)

**Cons:**

- Not User-Friendly (2 reviews)
- Alert Issues (1 reviews)
- Console Issues (1 reviews)
- Delay Issues (1 reviews)
- False Positives (1 reviews)



## Parent Category

[Endpoint Protection Software](https://www.g2.com/categories/endpoint-protection)



## Related Categories

- [Endpoint Detection &amp; Response (EDR) Software](https://www.g2.com/categories/endpoint-detection-response-edr)
- [Antivirus Software](https://www.g2.com/categories/antivirus)
- [Endpoint Management Software](https://www.g2.com/categories/endpoint-management)




