# Best Antivirus Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Endpoint antivirus software is any program that prevents and/or detects the presence of malicious software within an endpoint device. These tools typically contain detection features for identifying potential malware and computer viruses that attempt to, or actually penetrate, a device. Most tools possess some form of firewall to stop any virus, worm, trojan, or adware that attempts to penetrate the device. Companies use these tools to protect their devices and the sensitive information within them. These tools typically possess some feature to assess a device’s or network’s health and alert administrators of any infection present. This can help ensure each device in a company’s system is secure. These tools should not be confused with [firewall](https://www.g2.com/categories/firewall) tools, which may have the same features, but also prevent hackers and other parties from penetrating networks and devices. Other endpoint security tools include [endpoint detection and response (EDR)](https://www.g2.com/categories/endpoint-detection-response-edr) and [endpoint management](https://www.g2.com/categories/endpoint-management) software. EDR tools possess a wider range of capabilities for identifying malware and device penetration, along with tools to remove malicious elements. Endpoint management tools help users manage which devices are connected to networks and ensure the security features of those devices are up to date.

To qualify for inclusion in the Endpoint Antivirus category, a product must:

- Possess malware identification and/or removal features
- Possess anti-virus and/or antispyware features
- Show health status of individual devices
- Distribute updates as new virus signatures are detected





## Best Antivirus Software At A Glance

- **Leader:** [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews)
- **Highest Performer:** [Heimdal](https://www.g2.com/products/heimdal/reviews)
- **Easiest to Use:** [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews)
- **Top Trending:** [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews)
- **Best Free Software:** [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews)


## Top-Rated Products (Ranked by G2 Score)
  ### 1. [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews)
  Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Experience best-in-class protection thanks to our in-house global cyber threat intelligence, compiled and examined for over 30 years, which drives our extensive R&amp;D network led by industry-acclaimed researchers. ESET PROTECT, our cloud-first XDR cybersecurity platform combines next-gen prevention, detection, and proactive threat hunting capabilities. ESET&#39;s highly customizable solutions include local support and have minimal impact on performance, identify and neutralize known and emerging threats before they can be executed, support business continuity, and reduce the cost of implementation and management. HOW YOUR ORGANIZATION WILL BENEFIT - Improved protection against ransomware and zero-day threats via cloud-based sandboxing technology. - Helps comply with data regulations thanks to full disk encryption capabilities on Windows and macOS. - Easily accessible ESET PROTECT console improves TCO of security management. - Single-pane-of-glass remote management for visibility of threats, users, and quarantined items. - Company endpoints and mobiles are protected via advanced multilayered technology, now with brute-force attack protection.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 937

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.9/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 6.1/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [ESET](https://www.g2.com/sellers/eset)
- **Company Website:** https://www.eset.com
- **Year Founded:** 1992
- **HQ Location:** Bratislava, Slovak Republic
- **Twitter:** @ESET (276,178 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/28967/ (1,944 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Network Administrator
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 47% Mid-Market, 46% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (95 reviews)
- Protection (79 reviews)
- Reliability (71 reviews)
- Security (64 reviews)
- Centralized Management (58 reviews)

**Cons:**

- Learning Curve (32 reviews)
- Difficult Configuration (31 reviews)
- Not User-Friendly (25 reviews)
- Lack of Clarity (23 reviews)
- Difficult Navigation (20 reviews)

  ### 2. [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews)
  Sophos Endpoint is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Sophos Endpoint has been proven to prevent even the most advanced ransomware and malware by leveraging a unique combination of next-generation techniques. This includes the ability to detect never-before-seen malware with deep learning, stop ransomware with Sophos anti-ransomware technology, and deny attacker tools with signatureless exploit prevention. Sophos Endpoint also includes root cause analysis to provide insight into threats, and instant malware removal to ensure no attack remnants remain.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 781

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 8.9/10)
- **Quality of Support:** 9.0/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 7.7/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Sophos](https://www.g2.com/sellers/sophos)
- **Company Website:** https://www.sophos.com/
- **Year Founded:** 1985
- **HQ Location:** Oxfordshire
- **Twitter:** @Sophos (36,719 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5053/ (5,561 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 59% Mid-Market, 17% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (191 reviews)
- Protection (180 reviews)
- Security (165 reviews)
- Threat Detection (129 reviews)
- Easy Management (124 reviews)

**Cons:**

- Slow Performance (73 reviews)
- High Resource Usage (52 reviews)
- Learning Curve (50 reviews)
- Difficult Configuration (36 reviews)
- High CPU Usage (34 reviews)

  ### 3. [ManageEngine Endpoint Central](https://www.g2.com/products/manageengine-endpoint-central/reviews)
  ManageEngine Endpoint Central is an all-in-one unified endpoint management and security (UEMS) solution that delivers end-to-end life cycle management and endpoint protection. From automated multi-OS patching and software deployment to asset intelligence and mobile device management, it unifies the core workflows IT teams rely on every day. On the security side, its next-generation antivirus (NGAV) uses behavioral detection, AI, and real-time analytics to detect and stop advanced threats, while built-in attack surface management, browser security, and data loss prevention keep sensitive data protected across office, remote, and frontline endpoints alike. Endpoint Central also prioritizes productivity through digital employee experience (DEX) monitoring, delivering real-time insights into device health, application performance, and endpoint telemetry so IT teams can resolve issues before they impact employees. Recognized as a leader by Gartner®, IDC, and Forrester, Endpoint Central is trusted by over 31, 000 enterprises worldwide and available in both on-premises and SaaS editions. This solution streamlines the complex landscape of endpoint management, empowering IT and security teams to manage more with less, delivering intelligent automation and AI-powered threat mitigation through one unified platform. Business benefits and ROI A commissioned Forrester Total Economic Impact™ study found that organizations deploying Endpoint Central achieved several significant business benefits, including: - 442% return on investment over three years, driven by tool consolidation, automation, and reduced operational overhead. - $4.5 million in total quantified economic benefits (present value), a net present value of $3.7 million, and a payback period of under six months. - 95% reduction in manual patching time, as well as cut licensing and insurance costs through improved security posture and compliance. - Significant reductions in compliance violations and security-related disruptions driven by Endpoint Central’s capability to convert endpoint stability and risk reduction into measurable business outcomes.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1,067

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.4/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.7/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 10.0/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Zoho](https://www.g2.com/sellers/zoho-b00ca9d5-bca8-41b5-a8ad-275480841704)
- **Year Founded:** 1996
- **HQ Location:** Austin, TX
- **Twitter:** @Zoho (137,047 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/38373/ (30,531 employees on LinkedIn®)
- **Phone:** +1 (888) 900-9646 

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 65% Mid-Market, 23% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (472 reviews)
- Patch Management (407 reviews)
- Features (292 reviews)
- Software Deployment (283 reviews)
- Endpoint Management (247 reviews)

**Cons:**

- Missing Features (154 reviews)
- Feature Issues (119 reviews)
- Patching Issues (114 reviews)
- Complexity (111 reviews)
- Needs Improvement (103 reviews)

  ### 4. [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews)
  Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster, and more evasive, launching complex attacks that can strike in minutes or even seconds. Traditional security approaches struggle to keep pace, leaving businesses vulnerable. The CrowdStrike Falcon Platform addresses this by offering a unified, cloud-native solution. It consolidates previously siloed security solutions and incorporates third-party data into a single platform with one efficient and resource-conscious agent, leveraging advanced AI and real-time threat intelligence. This approach simplifies security operations, speeds analyst decision making, and enhances protection to stop the breach, allowing organizations to reduce risk with less complexity and lower costs. CrowdStrike&#39;s Falcon Platform includes: - Endpoint Security: Secure the endpoint, stop the breach - Identify Protection: Identity is the front line, defend it - Next-Gen SIEM: The future of SIEM, today - Data Protection: Real-time data protection from endpoint to cloud - Exposure Management: Understand risk to stop breaches - Charlotte AI: Powering the next evolution of the SOC


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 366

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.9/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 8.3/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [CrowdStrike](https://www.g2.com/sellers/crowdstrike)
- **Company Website:** https://www.crowdstrike.com
- **Year Founded:** 2011
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @CrowdStrike (110,002 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2497653/ (11,258 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Analyst, Cyber Security Analyst
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 46% Enterprise, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Features (113 reviews)
- Threat Detection (103 reviews)
- Ease of Use (98 reviews)
- Security (97 reviews)
- Detection (86 reviews)

**Cons:**

- Expensive (54 reviews)
- Complexity (39 reviews)
- Learning Curve (35 reviews)
- Limited Features (31 reviews)
- Pricing Issues (29 reviews)

  ### 5. [ThreatDown](https://www.g2.com/products/threatdown/reviews)
  ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – to protect people, devices, and data in minutes. The ThreatDown product line is enriched by Malwarebytes global threat intelligence, its patented remediation engine that removes every trace of malware to prevent reinfection, and its nearly two decades of experience detecting and remediating threats. With one agent and one console, ThreatDown solutions are purpose-built to simplify cybersecurity for organizations with limited IT resources. ThreatDown solutions bundle technology with services to streamline security and provide robust protection that’s efficient and cost-effective. With a channel-first mindset across the globe, we empower our partners to help resource-constrained IT organizations. ThreatDown Solutions: ThreatDown MDR (managed detection and response) combines Malwarebytes’ renowned detection, with AI-powered engines, and around-the-clock human intervention to streamline security and allow organizations to focus on business growth. ThreatDown MDR simply and effectively closes your security resources gap, reduces your risk of unknown threats, and increases your security efficiency exponentially. ThreatDown EDR (endpoint detection and response) is enriched by Malwarebytes global threat intelligence and its patented remediation engine that removes every trace of malware to prevent reinfection. It provides protection against a range of threats, including malware, ransomware, zero-day exploits, phishing, and other threats with a suite of tools to detect, investigate and contain even the stealthiest human-operated attacks that bypass prevention layers. Seven-day ransomware rollback ensures organizations can turn the clock back on attacks and restore systems. ThreatDown Security Advisor provides customers with a security score to illustrate their current level of protection, offers guidance on how to make improvements and enables them to take immediate action. ThreatDown Bundles: ThreatDown Core is a complete malware prevention solution with vulnerability assessment and application blocking. It features our award-winning prevention technologies, visibility to assess your risk for vulnerability exploits (one of the most common attack vectors), and the blocking of malicious and unwanted applications. ThreatDown Advanced includes award-winning technologies such as endpoint detection and response, ransomware rollback, patch management, and managed threat hunting to appreciably enhance endpoint security. ThreatDown Elite is purpose-built for organizations with small (to non-existent) security teams that lack the resources to address all security alerts. Beyond the Advanced bundle, Elite includes 24x7x365 expert-managed detection and response. ThreatDown Ultimate includes the technologies and human expertise you need for comprehensive protection wrapped up and delivered as a single, hassle-free solution. Ultimate also includes easy-to-use, website content filtering (DNS Filtering). For Partners Our multi-tenant ThreatDown OneView platform enables MSPs and IT admins to streamline operations with centralized management of customer endpoints, license subscriptions, reporting, and global policies. With products and services like Endpoint Detection and Response (EDR), Managed Detection and Response (MDR) and the rest of our technologies in our portfolio, partners can offer the right product or service to each customer, tailored to their specific needs. Find out more about our partner program at https://www.threatdown.com/partner-program.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,039

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.8/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 6.9/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Malwarebytes](https://www.g2.com/sellers/malwarebytes)
- **Company Website:** https://www.malwarebytes.com
- **Year Founded:** 2008
- **HQ Location:** Santa Clara, CA
- **Twitter:** @Malwarebytes (87,362 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/malwarebytes/ (613 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 48% Small-Business, 41% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (99 reviews)
- Features (68 reviews)
- Security (59 reviews)
- Threat Detection (56 reviews)
- Customer Support (54 reviews)

**Cons:**

- Poor Customer Support (23 reviews)
- Lack of Clarity (22 reviews)
- Missing Features (20 reviews)
- False Positives (18 reviews)
- Communication Issues (16 reviews)

  ### 6. [Check Point Harmony Endpoint](https://www.g2.com/products/check-point-harmony-endpoint/reviews)
  Harmony Endpoint is a complete endpoint security solution offering a fleet of advanced endpoint threat prevention capabilities so you can safely navigate today’s menacing threat landscape. It provides a comprehensive system to proactively prevent, detect, and remediate evasive malware attacks.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 255

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.7/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.9/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 7.9/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,927 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Who Uses This:** Network Engineer, Security Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 53% Mid-Market, 27% Enterprise


#### Pros & Cons

**Pros:**

- Security (73 reviews)
- Features (57 reviews)
- Threat Detection (51 reviews)
- Protection (50 reviews)
- Ease of Use (46 reviews)

**Cons:**

- Slow Performance (27 reviews)
- High Resource Usage (25 reviews)
- Difficult Configuration (21 reviews)
- Expensive (21 reviews)
- Learning Curve (21 reviews)

  ### 7. [FortiClient](https://www.g2.com/products/forticlient/reviews)
  Integrated endpoint protection that provides automated next-generation threat protection, as well as visibility and control of your software and hardware inventory across the entire security fabric. Identify and remediate vulnerable or compromised hosts across your attack surface.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 266

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.7/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 8.3/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,247 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)
- **Ownership:** NASDAQ: FTNT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 58% Mid-Market, 26% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (40 reviews)
- Security (38 reviews)
- VPN Efficiency (31 reviews)
- Connectivity (25 reviews)
- Reliability (24 reviews)

**Cons:**

- Unstable Connection (21 reviews)
- Slow Performance (20 reviews)
- Connection Issues (19 reviews)
- Remote Access Issues (16 reviews)
- Update Issues (13 reviews)

  ### 8. [Kaspersky AntiVirus](https://www.g2.com/products/kaspersky-antivirus/reviews)
  Kaspersky Anti-Virus is a comprehensive security solution designed to protect computers from a wide range of malware threats, including viruses, trojans, worms, spyware, adware, keyloggers, and rootkits. It offers real-time protection, ensuring that systems are safeguarded against both known and emerging threats without compromising performance. The software is compatible with multiple operating systems, including Windows, macOS, Linux, Android, and iOS, making it a versatile choice for diverse user needs. Key Features and Functionality: - Real-Time Antivirus Protection: Continuously monitors the system to detect and neutralize malware threats as they arise. - Two-Way Firewall: Provides an additional layer of defense by monitoring incoming and outgoing network traffic to prevent unauthorized access. - Online Payment Protection: Secures financial transactions by safeguarding sensitive information during online payments. - Data Leak Checker: Alerts users if their personal data is found in data leaks, enabling prompt action to secure their information. - Unlimited Superfast VPN: Ensures privacy and security during online activities by encrypting internet connections. Primary Value and User Solutions: Kaspersky Anti-Virus addresses the critical need for robust cybersecurity by offering comprehensive protection against a wide array of digital threats. Its real-time monitoring and advanced features ensure that users&#39; devices and personal information remain secure, providing peace of mind in an increasingly digital world. By integrating multiple security tools into a single solution, it simplifies the process of maintaining digital safety, making it accessible for both individual users and businesses.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 89

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.6/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.7/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 10.0/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Kaspersky](https://www.g2.com/sellers/kaspersky-bce2dc7f-2586-4e87-96da-114de2c40584)
- **Year Founded:** 1997
- **HQ Location:** Moscow
- **Twitter:** @kasperskylabind (1,293 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaspersky/ (4,494 employees on LinkedIn®)
- **Phone:** 1-866-328-5700

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 45% Small-Business, 37% Mid-Market


  ### 9. [Microsoft Defender for Endpoint](https://www.g2.com/products/microsoft-defender-for-endpoint/reviews)
  Microsoft Defender for Endpoint is a complete endpoint security solution that delivers preventative protection, post-breach detection, automated investigation, and response. With Defender for Endpoint, you have: Agentless, cloud powered - No additional deployment or infrastructure. No delays or update compatibility issues. Always up to date. Unparalleled optics - Built on the industry’s deepest insight into Windows threats and shared signals across devices, identities, and information. Automated security - Take your security to a new level by going from alert to remediation in minutes—at scale.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 299

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.5/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.6/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 8.0/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,090,464 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Security Analyst
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 39% Enterprise, 35% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (20 reviews)
- Threat Detection (18 reviews)
- Security (17 reviews)
- Protection (15 reviews)
- Cybersecurity Protection (14 reviews)

**Cons:**

- Compatibility Issues (8 reviews)
- Complexity (8 reviews)
- Difficult Configuration (7 reviews)
- Improvements Needed (7 reviews)
- Lack of Clarity (7 reviews)

  ### 10. [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews)
  SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and empowers leading global enterprises with real-time visibility, cross-platform correlation, and AI-powered response across endpoints, cloud workloads and containers, network-connected (IoT) devices and identity-centric attack surfaces. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, on LinkedIn or Facebook. Over 9,250 customers, including 4 of the Fortune 10, hundreds of the Global 2000, prominent governments, healthcare providers, and educational institutions, trust SentinelOne to bring their defenses into the future, gaining more capability with less complexity. SentinelOne is a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms, and is a go-to platform across all customer profiles, as highlighted in Gartner’s Critical Capabilities report. SentinelOne continues to prove its industry-leading capabilities in the MITRE Engenuity ATT&amp;CK® Evaluation, with 100% protection detection, 88% less noise, and zero delays in the 2024 MITRE ATT&amp;CK Engenuity evaluations, demonstrating our dedication to keeping our customers ahead of threats from every vector.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 193

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.9/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.9/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 7.7/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [SentinelOne](https://www.g2.com/sellers/sentinelone)
- **Company Website:** https://www.sentinelone.com
- **Year Founded:** 2013
- **HQ Location:** Mountain View, CA
- **Twitter:** @SentinelOne (57,389 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2886771/ (3,183 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 45% Mid-Market, 37% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (16 reviews)
- Features (11 reviews)
- Threat Detection (11 reviews)
- Customer Support (10 reviews)
- Security (7 reviews)

**Cons:**

- Learning Curve (4 reviews)
- Not User-Friendly (4 reviews)
- Slow Performance (4 reviews)
- Complexity (3 reviews)
- Difficult Configuration (3 reviews)

  ### 11. [Malwarebytes for Teams](https://www.g2.com/products/malwarebytes-for-teams/reviews)
  Malwarebytes for Teams is cybersecurity for the sole proprietor, boutique business, or small office – no IT skills required. Protection for all your business devices, including: Scam Guard: Built-in AI-powered chat companion to stop scams in real-time. Simply upload a suspicious text, link or screenshot for on-the-spot advice to help your small business avoid scams. AI-powered hacker and malware defense: Multi-layered technology offers always-on protection against malware, viruses, spyware, brute-force attacks, and more. Scam and ransomware protection: Prevent ransomware attacks that could halt your operations. Shut down robocalls, scam texts, phishing attempts, and dangerous decoy websites. Uncompromising speed and ease: Keep your business on the fast track. Boost browsing by up to 4x. All with our easy-to-use, intuitive dashboard. Dedicated, priority support: Get expert guidance with 24/7 human support, tailored security assessments, and a 60-day money-back guarantee. Trusted Advisor: Your personalized security assistant in an all-in-one dashboard. Uncover potential security risks and get easy expert-driven advice on fortifying your device, all so you can focus on what matters most: running your small business. Personal VPN: Ultimate privacy for the professional on the go. Connect to public Wi-Fi and maintain browsing speed without compromising privacy or risking your data.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 36

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.9/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.6/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 10.0/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Malwarebytes](https://www.g2.com/sellers/malwarebytes)
- **Year Founded:** 2008
- **HQ Location:** Santa Clara, CA
- **Twitter:** @Malwarebytes (87,362 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/malwarebytes/ (613 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 70% Small-Business, 24% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (3 reviews)
- Efficiency (3 reviews)
- Malware Protection (2 reviews)
- Protection (2 reviews)
- Reliability (2 reviews)

**Cons:**

- False Positives (2 reviews)
- Delay Issues (1 reviews)
- Insufficient Features (1 reviews)
- Lack of Clarity (1 reviews)
- Poor Management Control (1 reviews)

  ### 12. [MetaDefender](https://www.g2.com/products/metadefender/reviews)
  MetaDefender Platform is an advanced threat prevention solution that lets organizations embed multi-layer file security into existing applications and security architectures, especially to protect common attack vectors like malicious file uploads, untrusted file transfers, and file-based supply chain risk. It’s designed for environments that need stronger protection against highly evasive malware, zero-day attacks, and APTs, including IT and OT/critical infrastructure use cases. MetaDefender easily integrates into your existing IT solutions and can be deployed on-premises (including air-gapped), in cloud/IaaS, or as SaaS. We offer flexible implementation options for ICAP enabled devices, containerized applications, AWS, Azure, NAS/Storage workflows and Rest API. Overview: Multi-engine malware scanning: Quickly scan files with 30+ antivirus engines and detect over 99% of known malware. Deep CDR (Content Disarm &amp; Reconstruction): Recursively sanitize and rebuild 200+ file types to neutralize embedded threats while maintaining file usability, with extensive reconstruction and file conversion options. Proactive DLP: Remove, redact, or watermark sensitive data in files before content enters or leaves the organization; also supports AI-powered document classification. File-based Vulnerability Assessment: Identify vulnerabilities in installers, binaries, and applications before they are installed/executed and reduce exposure to known software flaws. Threat intelligence-driven detection: Identify malicious domains and IPs embedded in documents and support near real-time blocking using curated threat intelligence. Adaptive threat analysis (sandboxing): Detonate and analyze suspicious files in a controlled environment and improve zero-day detection. SBOM &amp; software supply chain visibility: Generate SBOMs and identify vulnerabilities in source code and containers. Reputation Engine: Use file hash reputation (known good/known bad/unknown) and advanced analysis to remediate false positives faster. Visibility, reporting, and policy control: Gain operational visibility, use automated reports for remediation, and configure workflow/analysis rules based on user, business priority, file source, and file type. Free Training - OPSWAT Academy: https://www.opswat.com/academy


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 21

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.9/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.2/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 8.3/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [OPSWAT](https://www.g2.com/sellers/opswat)
- **Company Website:** https://www.opswat.com
- **Year Founded:** 2002
- **HQ Location:** Tampa, Florida
- **Twitter:** @OPSWAT (7,227 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/opswat/ (1,124 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 67% Mid-Market, 43% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (12 reviews)
- Security (11 reviews)
- Protection (10 reviews)
- Scanning Efficiency (10 reviews)
- Scanning (9 reviews)

**Cons:**

- Complex Configuration (3 reviews)
- Difficult Setup (3 reviews)
- Excessive Blocking (3 reviews)
- Overblocking (3 reviews)
- Policy Management (3 reviews)

  ### 13. [Cisco Secure Endpoints](https://www.g2.com/products/cisco-secure-endpoints/reviews)
  Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader. Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Quality of Support:** 9.4/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.8/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 8.3/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (720,884 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Reviewer Demographics:**
  - **Company Size:** 37% Mid-Market, 33% Enterprise


#### Pros & Cons

**Pros:**

- Features (6 reviews)
- Threat Detection (6 reviews)
- Ease of Use (5 reviews)
- Integrations (5 reviews)
- Protection (5 reviews)

**Cons:**

- Complexity (3 reviews)
- Complex Interface (2 reviews)
- Difficult Configuration (2 reviews)
- Expensive (2 reviews)
- Learning Curve (2 reviews)

  ### 14. [Bitdefender Antivirus Plus 2020](https://www.g2.com/products/bitdefender-antivirus-plus-2020/reviews)
  Bitdefender Antivirus Plus 2020 is a comprehensive cybersecurity solution designed to protect Windows PCs from a wide range of online threats, including viruses, malware, ransomware, and phishing attacks. It combines advanced threat detection with privacy tools to ensure a secure and efficient computing experience. Key Features and Functionality: - Real-Time Threat Detection: Continuously monitors and identifies potential threats, providing immediate protection against malware, spyware, and other malicious software. - Multi-Layer Ransomware Protection: Employs multiple layers of defense to safeguard sensitive documents, photos, and videos from ransomware attacks. - Advanced Threat Defense: Utilizes behavioral detection to closely monitor active applications, instantly taking action against suspicious activities. - Web Protection: Blocks phishing and fraudulent websites, ensuring safe browsing and online transactions. - Bitdefender VPN: Includes a basic VPN service with 200MB of daily traffic per device, enhancing online privacy and security, especially on public Wi-Fi networks. - Safepay: Provides a secure browser for online banking and shopping, protecting against fraud and unauthorized access. - Vulnerability Assessment: Scans the system for security vulnerabilities, such as outdated software and missing Windows security patches, offering recommendations for fixes. - Minimal System Impact: Designed to deliver top-notch protection without compromising system performance or battery life. Primary Value and User Solutions: Bitdefender Antivirus Plus 2020 offers robust and efficient protection against a broad spectrum of cyber threats, ensuring users can operate their Windows PCs securely and without interruption. Its multi-layered defense mechanisms, combined with privacy-enhancing tools like VPN and Safepay, address the growing concerns of online security and data privacy. By providing real-time threat detection and proactive defense strategies, it minimizes the risk of data breaches, financial loss, and identity theft, offering peace of mind to users in an increasingly digital world.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 62

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.9/10)
- **Quality of Support:** 9.4/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 8.9/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Bitdefender](https://www.g2.com/sellers/bitdefender)
- **Year Founded:** 2001
- **HQ Location:** Bucuresti, Romania
- **Twitter:** @Bitdefender (113,610 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6825/ (2,317 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security
  - **Company Size:** 44% Small-Business, 32% Enterprise


  ### 15. [Trellix Endpoint Security](https://www.g2.com/products/trellix-endpoint-security/reviews)
  Trellix Endpoint Security Suite gives your security team the context, visibility, and capabilities to identify, investigate, and remediate threats across your hybrid environment. And it provides the data essential for your extended detection and response.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 319

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.1/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.5/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.6/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 8.1/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Trellix](https://www.g2.com/sellers/trellix)
- **Year Founded:** 2004
- **HQ Location:** Milpitas, CA
- **Twitter:** @Trellix (241,624 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/44195/ (811 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Senior Software Engineer, Software Developer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 41% Mid-Market, 41% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (6 reviews)
- Features (4 reviews)
- Threat Detection (4 reviews)
- Customer Support (3 reviews)
- Protection (3 reviews)

**Cons:**

- Difficult Configuration (2 reviews)
- Expensive (2 reviews)
- Agent Issues (1 reviews)
- Complex Installation (1 reviews)
- Complex Interface (1 reviews)

  ### 16. [Kaspersky Anti-Ransomware Tool](https://www.g2.com/products/kaspersky-anti-ransomware-tool/reviews)
  Kaspersky Anti-Ransomware Tool provides lightweight protection against malware, adware, and other riskware (including crypto-mining software). Uses cloud-assisted behavior detection from Kaspersky’s endpoint technologies to scan and block ransomware and crypto-malware immediately. Free, lightweight tool that detects and blocks ransomware, adware, and crypto‑miners using cloud‑assisted behavior detection from Kaspersky’s endpoint technologies – scans and stops threats immediately: • Crypto-miners detection In addition to ransomware, Kaspersky Anti-Ransomware Tool can detect and block adware, pornware and riskware objects including crypto-mining software. • Works with most security software It doesn&#39;t matter which software you use. Kaspersky Anti-Ransomware Tool is compatible with most cybersecurity solutions. • Ransomware scanning The Anti-Ransomware Tool automatically scans and monitors files on your computer to proactively identify and neutralize threats.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 44

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.5/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 10.0/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Kaspersky](https://www.g2.com/sellers/kaspersky-bce2dc7f-2586-4e87-96da-114de2c40584)
- **Year Founded:** 1997
- **HQ Location:** Moscow
- **Twitter:** @kasperskylabind (1,293 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaspersky/ (4,494 employees on LinkedIn®)
- **Phone:** 1-866-328-5700

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 58% Small-Business, 24% Mid-Market


  ### 17. [Webroot Business Endpoint Protection](https://www.g2.com/products/webroot-business-endpoint-protection/reviews)
  It’s the digital armor protecting you and your business from devastating, multi-layered cyberattacks. The truth is, antivirus just isn&#39;t enough anymore. Today’s cybercriminals layer their attack methods to maximize the likelihood of success. That&#39;s why Webroot Business Endpoint Protection is backed by real-time threat intelligence to protect businesses from threats across email, web browsing, files, URLs, malicious ads, apps, and more. Plus, in the event that a system does get compromised, Webroot Business Endpoint Protection offers unique journaling and rollback remediation that can help return local drives to their uninfected state, minimizing (and even eliminating) the need to reimage systems. Start building out your security layers with Webroot Business Endpoint Protection for defense in depth and a more resilient business. Trials are free for 30 days and the no-software-conflict design means you can install and run it alongside existing security. That way, your business, users and clients never have to worry about gaps in their protection.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 481

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.8/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.2/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 6.0/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Webroot](https://www.g2.com/sellers/webroot)
- **Year Founded:** 1997
- **HQ Location:** Broomfield, CO
- **Twitter:** @Webroot (60,297 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/7434/ (249 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 54% Small-Business, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (5 reviews)
- Console Management (3 reviews)
- Performance (3 reviews)
- Protection (3 reviews)
- Setup Ease (3 reviews)

**Cons:**

- Compatibility Issues (2 reviews)
- Ineffective Antivirus Protection (2 reviews)
- Lack of Clarity (2 reviews)
- Limited Features (2 reviews)
- Poor Interface Design (2 reviews)

  ### 18. [360 Total Security](https://www.g2.com/products/360-total-security/reviews)
  360 Total Security offers your PC complete protection from Viruses, Trojans and other emerging threats. Whether you are shopping online, downloading files or chatting with your friends you can be sure that 360 Total Security is there to keep you safe and your computer optimized.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 46

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.4/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.4/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Qihoo 360](https://www.g2.com/sellers/qihoo-360)
- **Year Founded:** 2005
- **HQ Location:** Beijing, China
- **Twitter:** @360TotalSec (3,449 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1413523/ (3,043 employees on LinkedIn®)
- **Ownership:** NYSE:QIHU

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 39% Small-Business, 39% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (1 reviews)
- Malware Protection (1 reviews)
- Product Quality (1 reviews)


  ### 19. [WatchGuard Endpoint Security](https://www.g2.com/products/watchguard-endpoint-security/reviews)
  WatchGuard Endpoint Security solutions help you safeguard devices against cyber threats. WatchGuard EPDR and Advanced EPDR, our AI-powered flagship endpoint solutions, enhance your security posture by seamlessly integrating endpoint protection (EPP) with detection and response (EDR) capabilities alongside our Zero-Trust Application and Threat Hunting Services. All are tightly integrated within WatchGuard Cloud and ThreatSync, delivering valuable visibility and intelligence while fortifying cross-product detection and response (XDR).


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 115

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.4/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.9/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 7.8/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [WatchGuard](https://www.g2.com/sellers/watchguard)
- **Company Website:** https://www.watchguard.com
- **Year Founded:** 1996
- **HQ Location:** Seatle, WA
- **Twitter:** @watchguard (19,437 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/166878/ (1,218 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Developer, IT Manager
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 55% Small-Business, 34% Mid-Market


#### Pros & Cons

**Pros:**

- Features (3 reviews)
- Protection (3 reviews)
- Security (3 reviews)
- Cybersecurity Protection (2 reviews)
- Ease of Use (2 reviews)

**Cons:**

- Complex Interface (1 reviews)
- Complexity (1 reviews)
- Difficult Configuration (1 reviews)
- Expensive (1 reviews)
- Setup Complexity (1 reviews)

  ### 20. [AVG Internet Security Business Edition](https://www.g2.com/products/avg-internet-security-business-edition/reviews)
  More powerful than ever, our latest edition works even harder and smarter for you and your business. It comes with - \* Accelerated scanning engine \* Link protection \* Enhanced Firewall \* Advanced encryption for your critical folders and files \* Secure deletion of unwanted files \* Protects against Ransom ware \* Email Server Security \* Email Protection \* Remote admin Tools \* 24/7 support


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 33

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.9/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.1/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.2/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 10.0/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Gen Digital](https://www.g2.com/sellers/gen-digital)
- **Year Founded:** 2022
- **HQ Location:** Tempe, Arizona
- **Twitter:** @GenDigitalInc (4,460 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/gendigitalinc (3,421 employees on LinkedIn®)
- **Ownership:** NASDAQ: GEN

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 59% Small-Business, 24% Enterprise


  ### 21. [Avast Endpoint Protection](https://www.g2.com/products/avast-endpoint-protection/reviews)
  Avast delivers all-in-one cybersecurity solutions, protecting over 400 million users. Our Endpoint Protection solutions like Next-gen Antivirus and automated Patch Management work together to protect your devices, data, and applications - saving both time and money.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 99

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.8/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Gen Digital](https://www.g2.com/sellers/gen-digital)
- **Year Founded:** 2022
- **HQ Location:** Tempe, Arizona
- **Twitter:** @GenDigitalInc (4,460 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/gendigitalinc (3,421 employees on LinkedIn®)
- **Ownership:** NASDAQ: GEN

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 63% Small-Business, 25% Mid-Market


#### Pros & Cons

**Pros:**

- Centralized Management (1 reviews)
- Dashboard Usability (1 reviews)
- Deployment Ease (1 reviews)
- Easy Management (1 reviews)
- Efficiency (1 reviews)

**Cons:**

- Alert Issues (1 reviews)
- Configuration Issues (1 reviews)

  ### 22. [Avast Small Office Protection](https://www.g2.com/products/avast-small-office-protection/reviews)
  Reliable protection for your small office Comprehensive online cybersecurity for small offices that want protection against phishing, ransomware, and advanced cyberattacks for all devices.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 12

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 8.9/10)
- **Quality of Support:** 9.0/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.8/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 10.0/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Gen Digital](https://www.g2.com/sellers/gen-digital)
- **Year Founded:** 2022
- **HQ Location:** Tempe, Arizona
- **Twitter:** @GenDigitalInc (4,460 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/gendigitalinc (3,421 employees on LinkedIn®)
- **Ownership:** NASDAQ: GEN

**Reviewer Demographics:**
  - **Company Size:** 75% Small-Business, 17% Mid-Market


#### Pros & Cons

**Pros:**

- Malware Protection (3 reviews)
- Protection (3 reviews)
- Security (2 reviews)
- Blocking (1 reviews)
- Console Management (1 reviews)

**Cons:**

- Slow Performance (2 reviews)
- Expensive (1 reviews)
- Pricing Issues (1 reviews)
- Slow Scanning (1 reviews)

  ### 23. [Avast Small Business Cybersecurity Solutions](https://www.g2.com/products/avast-small-business-cybersecurity-solutions/reviews)
  Essential cyber protection and security control for your small business Avast Essential Business Security helps deliver device security for small businesses that want remote visibility and centrally controlled protection against viruses, phishing, ransomware, and advanced cyberattacks.  Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser. Our robust, easy-to-use security for devices and data is designed to keep small organizations and their employees safer online. Avast antivirus with multiple layers of security, online privacy, and remote-control features provides powerful cybersecurity controlled via a cloud-based management console.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 109

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.7/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 1.7/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Gen Digital](https://www.g2.com/sellers/gen-digital)
- **Year Founded:** 2022
- **HQ Location:** Tempe, Arizona
- **Twitter:** @GenDigitalInc (4,460 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/gendigitalinc (3,421 employees on LinkedIn®)
- **Ownership:** NASDAQ: GEN

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 42% Mid-Market, 39% Small-Business


#### Pros & Cons

**Pros:**

- Customization (2 reviews)
- Monitoring (2 reviews)
- Protection (2 reviews)
- Security (2 reviews)
- Accessibility (1 reviews)

**Cons:**

- Compatibility Issues (1 reviews)
- Complex Installation (1 reviews)
- Complexity (1 reviews)
- Complex Setup (1 reviews)
- Inadequate Protection (1 reviews)

  ### 24. [Symantec End-user Endpoint Security](https://www.g2.com/products/symantec-end-user-endpoint-security/reviews)
  Symantec Endpoint Protection (SEP) is designed to protect against malware attacks including targeted attacks, advanced persistent threats, and zero-day threats with a layered approach to security at the endpoint. Superior protection that fuses essential and next-gen technologies in a multi-layered fashion. High-performance, lightweight single client, single management console across both physical and virtual protection and orchestrated response delivered at scale


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 515

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.4/10 (Category avg: 8.9/10)
- **Quality of Support:** 8.7/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.9/10 (Category avg: 9.0/10)
- **AI Text Summarization:** 6.0/10 (Category avg: 7.6/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (62,960 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Who Uses This:** Marketeer, Engineer
  - **Top Industries:** Information Technology and Services, Events Services
  - **Company Size:** 48% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Threat Detection (4 reviews)
- Security (3 reviews)
- Configuration Ease (2 reviews)
- Ease of Use (2 reviews)
- Features (2 reviews)

**Cons:**

- Slow Performance (3 reviews)
- High CPU Usage (2 reviews)
- High Resource Usage (2 reviews)
- Limited Features (2 reviews)
- Complex Installation (1 reviews)

  ### 25. [Carbon Black App Control](https://www.g2.com/products/carbon-black-app-control/reviews)
  With the rise of security threats and malware, organizations need technologies to combat these risks. Unplanned downtime and performance degradation from security breaches impact productivity and reputation. As IT and security shift to the cloud, it&#39;s crucial to stay vigilant about security gaps. Many companies still rely on air-gapped servers or outdated operating systems (EOL OS) for critical systems and data storage. Carbon Black App Control offers proactive security for data centers, AWS, Azure, GCP, or hosted private clouds. App Control ensures trusted software runs, monitors file integrity, controls devices, protects memory and registry keys on Windows.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 44

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 8.9/10)
- **Quality of Support:** 9.3/10 (Category avg: 8.6/10)
- **Ease of Use:** 7.9/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (62,960 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 64% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Easy Implementation (1 reviews)
- Easy Integrations (1 reviews)
- Features (1 reviews)

**Cons:**

- Expensive (1 reviews)
- False Positives (1 reviews)
- Whitelisting Issues (1 reviews)



## Parent Category

[Endpoint Protection Software](https://www.g2.com/categories/endpoint-protection)



## Related Categories

- [Endpoint Detection &amp; Response (EDR) Software](https://www.g2.com/categories/endpoint-detection-response-edr)
- [Endpoint Management Software](https://www.g2.com/categories/endpoint-management)
- [Endpoint Protection Platforms](https://www.g2.com/categories/endpoint-protection-platforms)



---

## Buyer Guide

### What You Should Know About Antivirus Software

### What is Antivirus Software?

Viruses are a specific type of malware that infects a computer, system or network and spreads like a contagion, hence the name. Most modern antivirus solutions protect against many types of malware including viruses, adware, spyware, trojans, and ransomware attacks.

Antivirus tools make up one component of the endpoint protection ecosystem. While antivirus covers malware protection, features for detection, remediation, and device governance may not be included. [EDR tools](https://www.g2.com/categories/endpoint-detection-response-edr) typically provide a wider breadth of features for incident detection, malware isolation, and infection remediation. Endpoint management tools will supply additional features such as asset management, system requirements updates, and network monitoring. Endpoint locations and technology infrastructure are key considerations for security software.

Antivirus solutions are a necessity, especially with the rise of bring-your-own-device (BYOD) policies. BYOD practices provide a wealth of benefits, but they can make it more difficult to close the security loop. Some antivirus apps will only support Windows or Mac devices; others support everything from tablets to smart devices. It’s important to pair your endpoint management policies with security tools that support the range of devices accessing your network. Since some employees are slow to update applications and operating systems, conflicts may arise and force administrators to regulate system requirements.

Key Benefits of Antivirus Software

- Block malware from infecting devices
- Protect against phishing, spam, and hackers
- Increase endpoint lifetime
- Reduce risk of data theft, loss, or corruption
- Regulate antivirus policies companywide

### Why Use Antivirus Software?

Antivirus software is an important component of a well-rounded security software stack and can be a valuable addition to existing software programs. These solutions effectively reduce the presence of malware able to gain access to your company’s sensitive information. Many antivirus vendors even offer free antivirus programs for personal use.

**Information security —** Companies are becoming more vigilant in protecting their sensitive business data. Industries such as financial services and banking are obvious places where it is important to keep data safe. But hackers target all kinds of companies and individuals, as almost all organizations and people have some level of valuable data stored on their networks.

**Device protection —** Endpoints are disparate and plentiful in the modern world. Companies often allow users to access business data and applications on whatever device they have on hand. It’s important, however, to ensure each of those endpoints is secure. Cross-platform availability is important for companies with BYOD practices. But antivirus tools help keep dangerous programs and hackers out of your business network, regardless of the type of device they’re using.

**Browsing safety —** Employees often surf the web and end up on potentially dangerous sites. If your company’s network doesn’t block unapproved sites or employees surf on their own network, it’s fairly likely they’ll end up encountering some kind of malware. Antivirus solutions are useful tools for identifying potentially dangerous material and preventing users from obtaining it. This includes clicking dangerous ads, downloading suspicious files, or getting caught in a phishing incident. All of these user behaviors can end up allowing malware entrance into a network and put business data at risk.

**Employee unreliability —** Like the browser issue, employees aren’t always skilled in best practices for internet security. Many users will download an extension or program simply because a site said they have to; antivirus solutions help make it more difficult, or even impossible, to download a malicious program. These downloads could very easily include malware and wreak havoc on a company’s network. That puts both the individual user’s data at risk. And because of a virus’ ability to replicate and spread, the company’s entire network becomes a target.

### What are the Different Kinds of Antivirus Software?

**Antivirus —** These are the longest-standing software type of the bunch. Viruses are the best-known and debatably the oldest forms of malware. Viruses differentiate themselves through their ability to replicate and spread. They can be attached to files from the internet, suspicious applications, and dangerous websites.

Once a virus is downloaded, it can replicate and distribute its copies across computer networks. These viruses can be used for a number of nefarious purposes, such as remote access and data theft. Antivirus solutions identify known variants of viral malware. Many antivirus solutions also cover a number of the following cyberthreats, but they have historically focused on viruses.

**Anti-malware —** Anti-malware solutions will cover most kinds of cyber threats that are delivered in the form of files or applications. There are millions of different malware forms that range from adware to ransomware; anti-malware software aims to prevent all kinds from harming your devices.

These dangerous programs can mutate and adapt to slip by traditional firewalls and discover new exploits and zero-day vulnerabilities. As a result, many are synced to threat intelligence networks in addition to malware libraries to identify evolving forms of malware and protect against zero-day attacks.

**Anti-spyware —** Spyware is a common form of malware used to secretly gather sensitive information from their targets. These can be used to track cookies, monitor systems, or harvest identity data.

The most common way to infect a device with spyware is through a program called adware. These usually create popups or windows within browsers that trigger downloads when the user attempts to close them. Other forms of spyware include systems monitors, cookie trackers, and trojans, which present themselves as harmless components, but secretly possess spyware within their files.

**Anti-worm —** A computer worm is a malware program that functions similarly to a virus in that it replicates itself and spreads within computer networks. Unlike viruses, worms typically don’t modify or corrupt the target’s files. They’re used for hacking practices such as creating backdoors and botnets, or launching ransomware attacks.

Worms are effective ransomware attack tools since they are designed to replicate and spread quickly across large networks. A worm will lock down a network’s endpoints and require payment in return for access to the end user’s files. If they refuse, the virus may destroy or harvest an entire network’s data.

**Anti-phishing —** Phishing is a common practice used to take advantage of human error. Attacks may come in the form of emails, ads, or other means of electronic communication. Phishing content mimics legitimate messages or websites and asks a user to submit credentials or banking information.

Many [email gateways](https://www.g2.com/categories/secure-email-gateway) have filters to prevent phishing content from reaching users. Some antivirus solutions will also identify suspicious websites and alert users if the programs suspects a site may contain phishing content.

### Antivirus Software Features

**Malware scanning —** Malware scanning features allow antivirus tools to scan devices, browsers and networks for the presence of malware. The tools will identify the location of the computer virus and alert either you or your IT administrator of its presence.

Some dangerous software programs may lay dormant for extended periods of time without displaying symptoms. Hackers could leave a backdoor to gain access to your systems; they could also be waiting to execute a dangerous application. Malware scanning will identify these threats and expedite the remediation process.

**Continuous scanning —** On-demand or periodic scans, while helpful, can miss malware for as long as your settings allow. Continuous scanning keeps your systems safer by constantly analyzing endpoints to identify threats as they arise.

Users may forget to run scans or the periodic scans may be poorly timed, allowing a virus to infect a network. Instead of finding out once you run the scan, a continuous scanning antivirus application will alert users of threats as they emerge.

**Firewall —** Firewalls provide an added layer of security by monitoring and filtering network traffic. These tools will prevent intrusions by identifying suspicious activity and either block access to the network or alert an administrator of the threat.

There are multiple kinds of firewalls built for specific uses or devices. Some are designed to protect applications, while others only support specific operating systems. However, just because an application says it has firewall features, does not mean it will be effective for your specific use case.

**Web protection —** Many antivirus solutions have features designed to identify potentially dangerous websites or online downloads. An antivirus program with web protection features may scan downloads before saving them or disable a site possessing adware.

There are a number of different browser-based threats that can automatically trigger downloads of dangerous malware. Some even automatically download files upon entering a website without the user ever clicking a button.

**Email protection —** Email protection features act like additional spam filters and file scanners. Emails from sites known to possess malware will be automatically moved to a spam folder or other isolated area.

Some tools will move files to an isolated environment and scan them for dangerous components prior to actually downloading them. Other tools may identify phishing attacks before a user can input sensitive information or be led to a dangerous website.

**Automatic updates —** Because there are millions of different computer viruses that could threaten your endpoints, antivirus programs must be frequently updated. These will inform the program of new threats and look out for them in the future.

Automatic updates increase the antivirus tool’s effectiveness by limiting potential human error. Some users may not understand the effects of not updating their security tools; others may simply forget. Automatic updates take the responsibility out of your employee’s hands and do the job for them.

**Cross-platform use —** If your company uses a variety of devices or hopes to add antivirus protection to different IT infrastructure components such as servers or computing appliances, a cross-platform tool is entirely necessary.

Some programs may only function as a Mac antivirus or a Windows antivirus program. Some tools might not cover mobile devices or Linux systems. Be sure the antivirus program system requirements are met by your array of devices.

### Potential Issues with Antivirus Software

**Updating software —** Employees are not always the most reliable users when it comes to keeping software applications up-to-date. Many don’t remember and others just don’t care. Failing to update antivirus software will prevent the tool from identifying new threats and informing users of potential vulnerabilities.

Updated software can improve the effectiveness of an antivirus program by adding malware signatures to its database. There are millions of unique malware programs threatening companies today. Without an up-to-date database, antivirus programs may miss new and existing malware and put companies at risk.

**Existing malware —** Antivirus programs provide a lot of features for analyzing systems, detecting the presence of malware, and preventing new viruses from infecting networks. But companies adopting antivirus software for the first time likely already have some malware on their devices. Antivirus software doesn’t always provide the tools necessary to remove complex forms of malware.

Without the ability to detect and remove malware, companies are susceptible to a wide range of programs hackers use to access networks and steal valuable information. As a result, some antivirus solutions should be paired with an [endpoint detection and response (EDR)](https://www.g2.com/categories/endpoint-detection-response-edr) or [incident response](https://www.g2.com/categories/incident-response) solution to investigate and remove existing threats.




