
What I like best about N-able EDR is its proactive threat detection and real-time response capabilities. It effectively identifies and neutralizes threats before they cause harm, and the easy-to-use dashboard makes monitoring endpoints simple and efficient. Review collected by and hosted on G2.com.
One downside of N-able EDR is that the false positives can sometimes be a bit high, requiring additional time for verification. Additionally, the learning curve for fully understanding all the advanced features can be steep for new users. Review collected by and hosted on G2.com.
It's support for ransomeware detection and removal
Best in class threat detection across all platforms like win, Mac, Linux and win servers aswell.
Sentinel one powered. Review collected by and hosted on G2.com.
Nothing new ground breaking as other end point security. Since most endpoint security uses sentinel as protection. Review collected by and hosted on G2.com.
I like hoow it responds and the ability to customize it's responses for what you want it to perform. Review collected by and hosted on G2.com.
The difficulty of installing edr on some devices. Whether it has remnants of sentinel one or has never used it. Review collected by and hosted on G2.com.
I love the auto rollback feature for infected machines. Review collected by and hosted on G2.com.
The integration with N-Sight RMM is still a little shakey and my admins also lose access periodically and have to raise a ticket. Review collected by and hosted on G2.com.
It utilizes AI and automation to help partners partners indentify and prevent cyber-threats fast. Leverage multiple engines, easily connect third party systems and accelerate your threat detection. Review collected by and hosted on G2.com.
I didn't find anything to dislike though. Review collected by and hosted on G2.com.
N-able can detect all of the devices on the network but allow us to choose whether or not one is added to the management as well as doing it for off site devices Review collected by and hosted on G2.com.
Using the remote connection tool can be quite tedious Review collected by and hosted on G2.com.
Most powerful technology, which enhance the way of customer service and collaboration and taking their pulse to reveal marketing. Review collected by and hosted on G2.com.
Complexity in product return and single point of contact may be necessary to achieve good repo Review collected by and hosted on G2.com.
SOTI has the most powerful and secure way to track, manage and, support your devices. Looking for more than a basic UEM platform to manage your enterprise devices. Review collected by and hosted on G2.com.
The main thing which I don't likes that is the user interface Review collected by and hosted on G2.com.
While compared to other industrial tools, it has enhanced detection and response. It helps in detection in threats for endpoints intermittently. Review collected by and hosted on G2.com.
Support from the team that needs to be slightly important Review collected by and hosted on G2.com.
It is the most useful and helpful solution for protecting malware from the cyber attacks,it is very easy to use and good customer support and ease of implementation and frequency of use and aswell as Number of Features and Ease of Integration. Review collected by and hosted on G2.com.
Nothing,it is very good product and we can use as much as. Review collected by and hosted on G2.com.