Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Dell Security Alternatives

Dell Security Reviews & Product Details

Dell Security Overview

What is Dell Security?

Customer-inspired, future-ready technology goes into every PowerEdge server, offering exceptional performance for small-business offices to enterprise hyperscale environments.

Dell Security Details
Show LessShow More
Product Description

Customer-inspired, future-ready technology goes into every PowerEdge server, offering exceptional performance for small-business offices to enterprise hyperscale environments.


Seller Details
Year Founded
1984
HQ Location
Round Rock, TX
Twitter
@Dell
818,517 Twitter followers
LinkedIn® Page
www.linkedin.com
136,730 employees on LinkedIn®
Ownership
NYSE: DELL
Phone
1-800-WWW-DELL
Description

Dell has played a critical role in enabling more affordable and accessible technology around the world. As an end-to-end computing solutions company, Dell continues to transform computing and provide high quality solutions that empower people to do more all over the world.

Recent Dell Security Reviews

Verified User
G
Verified UserMid-Market (51-1000 emp.)
4.0 out of 5
"Experts on hand"
No matter what you need they have someone on staff that is an expert with the hardware, software, implementation or any other concerns.
PC
Paul C.Small-Business (50 or fewer emp.)
4.5 out of 5
"Security peace of mind!"
EMC Security is like the extra pair of eyes you need for network security, protection of network and data in today's world is vital and this really...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Dell Security Media

Answer a few questions to help the Dell Security community
Have you used Dell Security before?
Yes

2 Dell Security Reviews

4.3 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 Dell Security Reviews
4.3 out of 5
2 Dell Security Reviews
4.3 out of 5
G2 reviews are authentic and verified.
Verified User
G
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Dell Security?

No matter what you need they have someone on staff that is an expert with the hardware, software, implementation or any other concerns. Review collected by and hosted on G2.com.

What do you dislike about Dell Security?

They will call regularly to check on you. Even when you don't need anything they like to set up calls to convince you might need something. Or if you have a plan on upgrading some system but you are 2-4 years out they try to get you to commit to something before you are even ready to make a decision. Review collected by and hosted on G2.com.

What problems is Dell Security solving and how is that benefiting you?

At the moment everything is fine Review collected by and hosted on G2.com.

PC
Self
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Dell Security?

EMC Security is like the extra pair of eyes you need for network security, protection of network and data in today's world is vital and this really has helped protect our network from a range of abuse Review collected by and hosted on G2.com.

What do you dislike about Dell Security?

the cost, but really who likes costs? but the cost of not having the correct security I suspect would cost alot more, and in the world, that "what if" is more like "when" Review collected by and hosted on G2.com.

Recommendations to others considering Dell Security:

Security is a key aspect in business, and should be part of your core buiness plans and EMC Network Security can help protect your network and services from the digital world that is always at risk directly or indirectly Review collected by and hosted on G2.com.

What problems is Dell Security solving and how is that benefiting you?

Overall network security, end point protection and network security to protect from a range of abuce Review collected by and hosted on G2.com.

There are not enough reviews of Dell Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
ThreatDown Logo
ThreatDown
4.6
(1,016)
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.
2
Huntress Managed EDR Logo
Huntress Managed EDR
4.9
(716)
The Huntress Managed Security Platform combines automated detection with human threat hunters—providing the software and expertise needed to stop advanced attacks.
3
Acronis Cyber Protect Cloud Logo
Acronis Cyber Protect Cloud
4.7
(1,040)
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating costs. Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware (including anti-virus, anti-ransomware, and anti-cryptojacking) and security and management capabilities such as vulnerability assessments, patch management, URL filtering and more. Now, service providers can eliminate complexity and make security a centerpiece of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Get upgraded security with integrated AI-based defenses that protect clients from modern threats, make smarter use of resources so your team can focus on clients, and earn new recurring revenue and higher margins that strengthen your business. Enriched with next-gen, full-stack anti-malware protection and comprehensive yet simple management tools, built on top of our industry-leading backup and data recovery solution, Acronis Cyber Protect Cloud simplifies onboarding, daily operations, and reporting, and combats advanced attacks with new use cases enabled by integration. Acronis Cyber Protect Cloud makes it easy to deliver the modern cyber protection your clients seek.
4
Okta Logo
Okta
4.5
(886)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
5
ESET PROTECT Logo
ESET PROTECT
4.6
(834)
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next-gen prevention, detection, and proactive threat hunting capabilities. Complementing the platform is a comprehensive suite of services, including managed detection and response (MDR), ensuring robust and continuous protection.
6
Acronis Cyber Protect Logo
Acronis Cyber Protect
4.3
(700)
7
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
8
N-able N-central Logo
N-able N-central
4.4
(472)
As networks grow in complexity and scale to thousands or tens of thousands of devices, IT service providers need powerful tools to help them keep up. N-able N-central gives you that power.
9
BetterCloud Logo
BetterCloud
4.4
(457)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
10
Sophos Intercept X: Next-Gen Endpoint Logo
Sophos Intercept X: Next-Gen Endpoint
4.6
(447)
Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware and malware by leveraging a unique combination of next-generation techniques. This includes the ability to detect never-before-seen malware with deep learning, stop ransomware with Sophos anti-ransomware technology, and deny attacker tools with signatureless exploit prevention. Intercept X also includes root cause analysis to provide insight into threats, and instant malware removal to ensure no attack remnants remain.
Show More