Best Software for 2025 is now live!
Save to My Lists
Claimed
Claimed

Avast Endpoint Protection Features

What are the features of Avast Endpoint Protection?

Administration

  • Policy Management
  • Logging and Reporting
  • Application Gateway
  • Concurrent Sessions

Monitoring

  • Load Balancing
  • Continuous Analysis
  • Intrusion Prevention
  • Intrusion Detection

Functionality

  • Virtual Private Network (VPN)
  • Antivirus
  • URL Filtering
  • Availability

Top Rated Avast Endpoint Protection Alternatives

Filter for Features

Administration

Policy Management

Provides network security features to customize network access rules, workflows, and compliance requirements. 15 reviewers of Avast Endpoint Protection have provided feedback on this feature.
88%
(Based on 15 reviews)

Logging and Reporting

As reported in 15 Avast Endpoint Protection reviews. Captures logs for all firewall functions, storing information, incidents, and activity for user reference and analysis.
89%
(Based on 15 reviews)

Application Gateway

As reported in 14 Avast Endpoint Protection reviews. Application-level proxy that applies security mechanisms to connect clients to applications while concealing client network and computers.
93%
(Based on 14 reviews)

Concurrent Sessions

Determines the number of connections a firewall is able to track and facilitate securely. 15 reviewers of Avast Endpoint Protection have provided feedback on this feature.
91%
(Based on 15 reviews)

Compliance

Monitors assets and enforces security policies to audit assets and infrastructure security.

Not enough data

Web Control

Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.

Not enough data

Application Control

Blocks endpoint users from accessing restricted applications.

Not enough data

Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

Not enough data

Device Control

Manages user network accessibility on laptops and mobile devices.

Not enough data

Monitoring

Load Balancing

Monitors traffic and distribute resources and scales infrastructure workloads to match traffic. 14 reviewers of Avast Endpoint Protection have provided feedback on this feature.
93%
(Based on 14 reviews)

Continuous Analysis

Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering. This feature was mentioned in 16 Avast Endpoint Protection reviews.
90%
(Based on 16 reviews)

Intrusion Prevention

Based on 14 Avast Endpoint Protection reviews. Enforces security paramaters to prevent unauthorized access.
92%
(Based on 14 reviews)

Intrusion Detection

Detects unauthorized access and use of privileged systems. 15 reviewers of Avast Endpoint Protection have provided feedback on this feature.
93%
(Based on 15 reviews)

Functionality

Virtual Private Network (VPN)

Provides a virtualized network for client network to mask identity, location, and other sensitive information. This feature was mentioned in 14 Avast Endpoint Protection reviews.
94%
(Based on 14 reviews)

Antivirus

As reported in 17 Avast Endpoint Protection reviews. Provides malware protection capabilities in addition to traditional firewall barrier technology.
95%
(Based on 17 reviews)

URL Filtering

As reported in 16 Avast Endpoint Protection reviews. Provides access control tools to categorize and block traffic and match traffic to firewall policies.
92%
(Based on 16 reviews)

Availability

Deploys firewall(s) configured in sync to prevent network failure and provide business continuity. 16 reviewers of Avast Endpoint Protection have provided feedback on this feature.
91%
(Based on 16 reviews)

System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

Not enough data

Firewall

Protects endpoint devices from a variety of attacks and malware threats.

Not enough data

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Analysis

Automated Remediation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data

Behavioral Analysis

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.

Not enough data