Top Rated FireEye Endpoint Security Alternatives
21 FireEye Endpoint Security Reviews
Overall Review Sentiment for FireEye Endpoint Security
Log in to view review sentiment.
- Total visibility of all my company's endpoints
- Being able to directly contain any endpoint that may have been compromised
- Ability to feed it with external intelligence sources and integrate with MDR services
- Automatic agent update from the console
- To be able to perform an on-demand forensic analysis of any endpoint in my company. Review collected by and hosted on G2.com.
Some false positives sometimes occur, although it is easy to fine-tune the rules to prevent further false positives. Review collected by and hosted on G2.com.

Simplified management as the solution provides user friendly UI and interface. It also provides single console management feature which helps company to streamline their endpoint security and reduce cost Review collected by and hosted on G2.com.
Incident response time get delay if the event is not get reported in time. The solution is depends upon network availability and bandwidth they are consuming Review collected by and hosted on G2.com.

It has very less false positives and parent-child relationship of process makes it easy to investigate detections. Review collected by and hosted on G2.com.
Customer service is bad and feel the product is bit expensive. Review collected by and hosted on G2.com.

FES (API) allows users to automate many actions and integrate SIEM and other alerting/actioning products. Review collected by and hosted on G2.com.
Learning portal and documentation can improved. Review collected by and hosted on G2.com.

Fireeye Hx and fireeye NX will be deployed to secure the network Review collected by and hosted on G2.com.
no major dislikes but policies need to be upgraded on advaned level Review collected by and hosted on G2.com.
What I've found most helpful is that FireEye provides actionable intelligence. It's more of an endpoint detect and respond product instead of a typical A/V product that is there to block everything unknown in your environment. It has been fantastic at gathering data, and at providing the Right types of information that allows system administrators the ability to deep dive on the forensics of each alert to determine the best course of action to move forward with. Review collected by and hosted on G2.com.
Until recently, not having the option of having a GUI of any kind on the endpoint. The other pain point is that if a computer is contained, it'll display a "computer is contained" screen in the browser window, but only does that 1 time. Most of our users quickly close out of the window, and because it doesn't show up again, don't know why their machines aren't able to connect to the internet. Review collected by and hosted on G2.com.
FireEye Endpoint Security programming is valuable in making sure about the most effective data in the association. Fire Eye Endpoint security programming is a sort of programming that gives consistent observing frameworks to any association. Fire Eye Endpoint security programming likewise gives instruments that help to wipe out various dangers like infections and rootkits and some more. Fire Eye Endpoint security programming is additionally used to screen the extensive danger against any association or business ranches and supportive in the interesting and significant data which is put away in an Endpoint and shield organizations from digital criminal which can harm organizations individual data and insider facts. Review collected by and hosted on G2.com.
FireEye Endpoint security programming cannot be introduced on android and IOS gadgets which is a Demerit of this product. Not performing multiple tasks programming, be that as it may, can do fast reaction on the given undertaking. Review collected by and hosted on G2.com.
FireEye Endpoint Security is an endpoint security system for our company and it not only secures the information but also protects the system against cyber threats. This application takes the other campaigns to operate along the system for protecting data and folders. Thus, everything is secured and on high-end protection, by applying this application because nothing can wash up its powerful networking during system clearance. FireEye can catch the unusual files and trap those files to remove from the system. Review collected by and hosted on G2.com.
This software is an anti-virus and can slow down the system to an extent, so, it provides security with some hindrance to the operating system. Moreover, on that point should be good networking to upload the software because its installation is very important for its proper working. Review collected by and hosted on G2.com.
FireEye Endpoint Security is an anti-virus application to find any unusual thing in the system and provide protection against that culprits. This software is not merely helpful in delivering the backlit plan, but also manipulates the system to manage and carry out the best solutions for removing the viruses from the system. Powerful management is planned by this tool, and everything comes in collaboration with the system's demand. This application is highly secured to detect behavior analytics and find threats to resolve. Review collected by and hosted on G2.com.
This application can detect the single vector but can't identify the group of viruses coming in the system, so this application needs to be upgraded to show some latest approaches. The password should be secured and protected from other people, so avoid sharing the password and preserve the files on cloud storage. Establish a good internet connection to accomplish work. Review collected by and hosted on G2.com.