Avast Endpoint Protection Features
What are the features of Avast Endpoint Protection?
Administration
- Policy Management
- Logging and Reporting
- Application Gateway
- Concurrent Sessions
Monitoring
- Load Balancing
- Continuous Analysis
- Intrusion Prevention
- Intrusion Detection
Functionality
- Virtual Private Network (VPN)
- Antivirus
- URL Filtering
- Availability
Top Rated Avast Endpoint Protection Alternatives
(261)
4.7 out of 5
Visit Website
Sponsored
Avast Categories on G2
Filter for Features
Administration
Policy Management | Provides network security features to customize network access rules, workflows, and compliance requirements. 15 reviewers of Avast Endpoint Protection have provided feedback on this feature. | 88% (Based on 15 reviews) | |
Logging and Reporting | As reported in 15 Avast Endpoint Protection reviews. Captures logs for all firewall functions, storing information, incidents, and activity for user reference and analysis. | 89% (Based on 15 reviews) | |
Application Gateway | As reported in 14 Avast Endpoint Protection reviews. Application-level proxy that applies security mechanisms to connect clients to applications while concealing client network and computers. | 93% (Based on 14 reviews) | |
Concurrent Sessions | Determines the number of connections a firewall is able to track and facilitate securely. 15 reviewers of Avast Endpoint Protection have provided feedback on this feature. | 91% (Based on 15 reviews) | |
Compliance | Monitors assets and enforces security policies to audit assets and infrastructure security. | Not enough data | |
Web Control | Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network. | Not enough data | |
Application Control | Blocks endpoint users from accessing restricted applications. | Not enough data | |
Asset Management | Keeps records of each network asset and its activity. Discovers new assets accessing the network. | Not enough data | |
Device Control | Manages user network accessibility on laptops and mobile devices. | Not enough data |
Monitoring
Load Balancing | Monitors traffic and distribute resources and scales infrastructure workloads to match traffic. 14 reviewers of Avast Endpoint Protection have provided feedback on this feature. | 93% (Based on 14 reviews) | |
Continuous Analysis | Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering. This feature was mentioned in 16 Avast Endpoint Protection reviews. | 90% (Based on 16 reviews) | |
Intrusion Prevention | Based on 14 Avast Endpoint Protection reviews. Enforces security paramaters to prevent unauthorized access. | 92% (Based on 14 reviews) | |
Intrusion Detection | Detects unauthorized access and use of privileged systems. 15 reviewers of Avast Endpoint Protection have provided feedback on this feature. | 93% (Based on 15 reviews) |
Functionality
Virtual Private Network (VPN) | Provides a virtualized network for client network to mask identity, location, and other sensitive information. This feature was mentioned in 14 Avast Endpoint Protection reviews. | 94% (Based on 14 reviews) | |
Antivirus | As reported in 17 Avast Endpoint Protection reviews. Provides malware protection capabilities in addition to traditional firewall barrier technology. | 95% (Based on 17 reviews) | |
URL Filtering | As reported in 16 Avast Endpoint Protection reviews. Provides access control tools to categorize and block traffic and match traffic to firewall policies. | 92% (Based on 16 reviews) | |
Availability | Deploys firewall(s) configured in sync to prevent network failure and provide business continuity. 16 reviewers of Avast Endpoint Protection have provided feedback on this feature. | 91% (Based on 16 reviews) | |
System Isolation | Cuts off network connection or temporarily inactivate applications until incidents are remedied. | Not enough data | |
Firewall | Protects endpoint devices from a variety of attacks and malware threats. | Not enough data | |
Endpoint Intelligence | Analysis for users to examine threat intelligence data specific to their endpoint devices. | Not enough data | |
Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data |
Analysis
Automated Remediation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Incident Reports | Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | Not enough data | |
Behavioral Analysis | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. | Not enough data |