Anti-Malware Software

Typically, Anti-Malware is a capability of a variety of other G2 Software categories. See more below to select the

best Anti-Malware Software.

Anti-malware software is used to prevent malware attacks on corporate and individual information technology (IT) systems. Since there is a rise in cyber attacks, cybersecurity is a must for all devices. A device falls prey to a malware attack in various ways such as by plugging in an infected USB drive, opening an infected file or a link sent over phishing emails, downloading suspicious apps, and more. All systems, be it Windows, iOS, or Android are susceptible to these malware attacks. It is not to be mistaken with antivirus software, which does not have sufficient capabilities to detect ransomware and other forms of malicious threats. Users can also consider endpoint protection suites for an all-in-one security solution.
ThreatDown

ThreatDown

(1,005)4.6 out of 5

ThreatDown

(1,005)4.6 out of 5

Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs a

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Endpoint Protection Platforms, Endpoint Detection & Response (EDR), Managed Detection and Response (MDR), Endpoint Management, Antivirus


Enrique B.
EB
“EDR for all kind of endpoints and OS”
What do you like best about ThreatDown?

It is simple to use and to implement and integrate to an API REST for example, efficient, and charge very litle the endpoint.

The actualization is continuous.

You have many useful add ons that help you, for example Vulnerability and Patch management.

The Customer support is very good and easy to contact them.

ThreatDown EDR works for you every time that the endpoint is on.

I use it every work day, and the Dashboard view is excellent to have a very good idea of the status, and what to do. Review collected by and hosted on G2.com.

What do you dislike about ThreatDown?

Till now in the case of cellular endpoint, it isn't clear if it is conected because the green bullet don't appera in the other cases this green appears when the endponit is conected Review collected by and hosted on G2.com.

What problems is ThreatDown solving and how is that benefiting you?

As I mention, it is very efficient and charge very litle the endpoint.

The different protections are very good, also the ransomware rollback is a high point of the solution.

It´s very good to manage vulnerabilities and patch management, allowing you to be in better cybersecurity conditions. Review collected by and hosted on G2.com.

Show More
Show Less

Modernize your clients' security and backup with integrated cyber protection

Top Anti-Malware Software Result from Cloud Data Security

Also listed in Cloud Email Security, Server Backup, SaaS Backup, Patch Management, Endpoint Detection & Response (EDR)


AK
“Easy to use solid backup based product”
What do you like best about Acronis Cyber Protect Cloud?

Acronis Cyber Protect Cloud is known for its integration of backup, disaster recovery, anti-malware, and endpoint protection into a single platform, which sets it apart from many other solutions

the biggest advantage of Acronis Cyber Protect Cloud is its integration of multiple security and backup functionalities in one platform, offering a streamlined, efficient solution for data protection and cybersecurity. Review collected by and hosted on G2.com.

What do you dislike about Acronis Cyber Protect Cloud?

while Acronis Cyber Protect Cloud offers a lot of benefits, its complexity, potential system performance impact, and occasionally inconsistent customer support or pricing transparency could be drawbacks for some users, especially those without dedicated IT resources. Review collected by and hosted on G2.com.

What problems is Acronis Cyber Protect Cloud solving and how is that benefiting you?

Acronis Cyber Protect Cloud helps simplify data protection, improves resilience against cyber threats, and offers cost-effective scalability, especially for organizations managing multiple clients or systems. These benefits translate into time savings, cost efficiency, and peace of mind for IT teams and business leaders. Review collected by and hosted on G2.com.

Show More
Show Less
ESET PROTECT

ESET PROTECT

(815)4.6 out of 5

ESET PROTECT

(815)4.6 out of 5

Equipped with proactive malware defense, protection against ransomware & zero-day threats, consistently ranked with the lowest false positives, and renowned for the light dema

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Endpoint Protection Platforms, Malware Analysis Tools, Antivirus, Extended Detection and Response (XDR) Platforms, Patch Management


JB
“Great product placing ESET at the top of the list”
What do you like best about ESET PROTECT?

ESET Protect is relatively easy to deploy in your environment, especially if you leverage the Cloud platform.

Protect elevates all ESET features that were present in the Business product-serie and brings the missing visibility that was missing to make a complete EDR.

It requires a daily surveillance from your team to ensure a constant monitoring of your assets' health.

Protect integrates directly into the Cloud platform and pairs with the other ESET products, although it's important to mention that this is a separate component/service. Review collected by and hosted on G2.com.

What do you dislike about ESET PROTECT?

We could have benefited from a better customer success program to be guided through the deployment.

I feel like the solution requires a lot of tune up to only show accurate data, but that's also part of a learning process for this type of product. Review collected by and hosted on G2.com.

What problems is ESET PROTECT solving and how is that benefiting you?

Protect fills up the lack of EDR capability in the ESET Business Endpoint Security engine.

It brings a complete visibility of who does what, when and how with the ability to remmediate suspicious activity based on the existing 2000 detection models. Review collected by and hosted on G2.com.

Show More
Show Less

Complete security that includes encryption, web filtering and patch assessment

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Antivirus, Endpoint Detection & Response (EDR), Extended Detection and Response (XDR) Platforms, Endpoint Protection Platforms


Cristian C.
CC
(Original )Information
“Sophos Intercept X Next-Gen Endpoint: una protección robusta contra amenazas cibernéticas.”
What do you like best about Sophos Intercept X: Next-Gen Endpoint?

Lo que mas me gusta de Sofos Intercept X: Next-Gen Endpoint es su capacidad para detetar y neutralisar amenazas cibérneticas de manera proactiba, incluyendo tanto las conocidas como las nuevas o desconosidas. Utilisa intelijencia artifisial y tecnolohias avanzadas para brindar una protecsión solida y adaptable contra un amplio espectro de amenazas, lo que proporciona una tranquilidad invaluable en un entorno de seguridad en constante evolusión. Review collected by and hosted on G2.com.

What do you dislike about Sophos Intercept X: Next-Gen Endpoint?

Un aspecto a mejorar en Sofos Intercept X: Next-Gen Endpoint es la curba de aprendisaje inicial debido a la complegidad de su interfaz y opciones, lo que puede resultar abrumador para algunos usuarios menos técnicos. Simplificar la experiencia del usuario y ofrecer una guía mas clara para la configuración inicial podría facilitar la adopción de la solución. Review collected by and hosted on G2.com.

What problems is Sophos Intercept X: Next-Gen Endpoint solving and how is that benefiting you?

Sofos Intercept X: Next-Gen Endpoint presenta desafios en términos de la curba de aprendisaje inicial y la complejidad de su interfaz para algunos usuarios menos técnicos. Sin embargo, esto también puede ofrecer benefisios al proporcionar una amplia gama de opciones de configuración y características avanzadas para aquellos que buscan una protecsión mas personalizada y solida contra las amenazas cibérneticas. Review collected by and hosted on G2.com.

Show More
Show Less

Microsoft Defender for Endpoint is a unified platform for preventative protection, post-breach detection, automated investigation, and response.

Top Anti-Malware Software Result from Endpoint Detection & Response (EDR)

Also listed in Antivirus, Endpoint Protection Suites, Endpoint Protection Platforms


Akshat V.
AV
“Comprehensive Enterpirse Security Solution”
What do you like best about Microsoft Defender for Endpoint?

It provides endpoint protection against cyber threats. It has a combination of machine learning , behavioural analytics and the best part which I personally like is that it has cloud-based security intelligence to detect and response to the threats in real-time. It is seamlessly works with Windows, Mac.

The best thing about the EDR is that it can analyze the behavior patterns and trriger alerts when unusual or malicious activities are detected. Review collected by and hosted on G2.com.

What do you dislike about Microsoft Defender for Endpoint?

There are two, three things I want to mention about the EDR which I personally felt to mention is that it's complex liscensing model it can be confusing to the new user and for thr intermidiate as well , defender for endpoint is included in different packages and organizations may need help understanding which features are included in which package.

And the last thing I want to mention is intensive resource utilization on certain devices , perticularly on the older devices the software can be resource-intensive which may cause trouble in performance degradation, mainly during scans. Review collected by and hosted on G2.com.

What problems is Microsoft Defender for Endpoint solving and how is that benefiting you?

The best thing I like is it uses automated processes to investigate alerts and incidents , potentiall neutralizing threats without human interference. It can drastically reduce times by applying automated playbooks.

And the other thing is that it help in reducing the attack surface by applying security controls like blocking the use of exploit techniques, limiting access to critical data, and monitoring untrusted apps or document.

And the best part I want to mention is that it has centralized management via 365 defender portal in which administrators can manage all endpoints and threats from a unified dashboard. Integration with other Microsoft security solutions gives a good view of the organization's security posture. Review collected by and hosted on G2.com.

Show More
Show Less

CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene,

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Identity Threat Detection and Response (ITDR), Endpoint Protection Platforms, AWS Marketplace, Extended Detection and Response (XDR) Platforms, User and Entity Behavior Analytics (UEBA)


Rabbani S.
RS
(Original )Information
“Crowdstrike Falcon”
What do you like best about CrowdStrike Falcon Endpoint Protection Platform?

We used to have a different application earlier named SentinelOne ranger.

However, we switched from that to CrowdStrike, reason being the application is more secure and reliable.

It runs in the background daily on all the Commscope computers.

It is integrated into all the computers, servers and share drives to protect our computers.

Easy to use and well optimized.

It automatically detects any threats or files when any external source is connected, or any unknown file is downloaded from the web to keep secure the computer. Review collected by and hosted on G2.com.

What do you dislike about CrowdStrike Falcon Endpoint Protection Platform?

We can't generally go into much detail when we select the sensor from the system tray.

All it shows is running version and if the computer is online and if it is secure.

There should be a scan option to help check the computer status.

You need to reach the Customer Support to get those details. Review collected by and hosted on G2.com.

What problems is CrowdStrike Falcon Endpoint Protection Platform solving and how is that benefiting you?

It is keeping our devices secure be it on prem or on cloud.

So far the experience has been good and the computers are secure enough with CrowdStrike Falcon.

Unlike sentinelone this application detects threats and notifies the teams which are responsible to eliminate or take actions. Review collected by and hosted on G2.com.

Show More
Show Less

Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, ra

Top Anti-Malware Software Result from Endpoint Detection & Response (EDR)

Also listed in Identity Threat Detection and Response (ITDR), Endpoint Protection Platforms, Extended Detection and Response (XDR) Platforms, Deception Technology, Endpoint Protection Suites


Ankit  A.
AA
“Single Visibility Platform (SVP)”
What do you like best about SentinelOne Singularity?

So, First of all SentinelOne Singularity provides the best visibility of all the threats, covering network to every connectivity layers with very Easy and Simple GUI. Singularity not only covers the Endpoint but also covers the Infection Layers if any attack or malware is detected. You can integrate this Singularity with multiple threat analytics and threat feeders, also with your On-going SIEM/SOAR platform. If i talk about implementation it's basically SaaS, so you dont need to worry about the complex and lengthy process while implementing SentinelOne Singularity. We all know this SentinelOne is amongst the Market LEADER, hence it's customer support is really quick and effective. Review collected by and hosted on G2.com.

What do you dislike about SentinelOne Singularity?

Personally i dont dislike anything in SentinelOne Singularity as it provides numerous benefitial features which will help and sorted out the complex scenarios in multiple organisation. Review collected by and hosted on G2.com.

What problems is SentinelOne Singularity solving and how is that benefiting you?

SentinelOne Singularity is not only a generic EDR, infact it's a bundle of EDR, Advanced Threat Detection, XDR, VA Scan, EPP which covers each and every unique and important cyber security portfolios. This will help not only me but many organisation as i have pitched this product to multple customers and they're already very much satisfied with this Singularity solution as they dont need multiple product to be managed separately. This is a USP of SentinelOne Singularity which benefits the customer with the ease of usage. Review collected by and hosted on G2.com.

Show More
Show Less

Bitdefender Antivirus Plus 2018 delivers multiple layers of protection against ransomware. It uses behavioral threat detection to prevent infections, and protects your most im

Top Anti-Malware Software Result from Antivirus


janus a.
JA
“bitdefender antivirus plus 2020 user review”
What do you like best about Bitdefender Antivirus Plus 2020?

It is very secure and vigilant against all links, websites, and files you are opening. Review collected by and hosted on G2.com.

What do you dislike about Bitdefender Antivirus Plus 2020?

As I have said, it is very secure and vigilant. It sometimes block even the app or websites you frequently use. Review collected by and hosted on G2.com.

What problems is Bitdefender Antivirus Plus 2020 solving and how is that benefiting you?

It helps keeps your computer/phone/gadgets safe. It automatically blocks everything it detects that are not safe. Review collected by and hosted on G2.com.

Show More
Show Less
FortiClient

FortiClient

(204)4.4 out of 5

FortiClient

(204)4.4 out of 5

FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vu

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Endpoint Management, Antivirus, Zero Trust Networking


Glenn B.
GB
(Original )Information
“FortiClient excellent for secure remote work connecting to work systems.”
What do you like best about FortiClient?

With the COVID-19 we shifted to working remotely from home for over a year with few in-office workdays. Our company chose this software to make a secure connection to our work systems. I provide after-hours support, so I still need this essential software when providing support from home. We are now back to 4 days a week in-office as of this week. I love how I just log in to FortiClient and I am quickly secure. Review collected by and hosted on G2.com.

What do you dislike about FortiClient?

I have not encountered a dislike, if I lose connection; I can quickly log in again. Review collected by and hosted on G2.com.

Recommendations to others considering FortiClient:

FortiClient is easy to use and I have never had any problems. I have never had to contact support. There are very few software items I can say I never had problems with. I have been using this tool for several years now. I on my second work laptop using this software. Review collected by and hosted on G2.com.

What problems is FortiClient solving and how is that benefiting you?

I am able to access secure systems from home that I otherwise would not be able to perform. My support is seamless regardless of whether I am on my company systems in-office or remote from home. Review collected by and hosted on G2.com.

Show More
Show Less
ThreatLocker

ThreatLocker

(164)4.8 out of 5

ThreatLocker

(164)4.8 out of 5

Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Managed Detection and Response (MDR), Endpoint Protection Suites, Endpoint Detection & Response (EDR), Threat Intelligence


MT
“ThreatLocker: Locking Down Security with Precision and Power”
What do you like best about ThreatLocker?

Application Allowlisting: This feature enables organizations to permit only approved software to run, effectively blocking unauthorized applications and reducing the risk of malware infections.

Ringfencing™: ThreatLocker creates boundaries around approved applications, controlling their interactions with other software, the internet, and system resources. This containment strategy helps prevent the exploitation of legitimate tools by malicious actors.

Elevation Control: This function allows administrators to manage and approve requests for elevated privileges on specific applications, ensuring users have the necessary access without compromising security.

Network Control: ThreatLocker provides a cloud-managed endpoint and server firewall with dynamic Access Control Lists (ACLs), enabling organizations to regulate inbound traffic

Storage Control: This feature offers granular control over storage devices, including USB drives and network shares, allowing administrators to set policies that govern data access and transfers.

Additionally, ThreatLocker is known for its responsive support team, which is available 24/7 to assist with any issues or questions. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

Learning Curve: The platform's comprehensive capabilities can be complex, requiring significant time and effort to fully understand and implement effectively.

ThreatLocker outweigh these drawbacks, particularly with the support of their responsive customer service team. Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

Uncontrolled Network Access: With Network Control, ThreatLocker enables organizations to regulate inbound and outbound network traffic, blocking unauthorized connections and enhancing overall network security Review collected by and hosted on G2.com.

Show More
Show Less

Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. AMP can uncover even

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Endpoint Detection & Response (EDR), Antivirus, Endpoint Management, Endpoint Protection Platforms


Jay K.
JK
“Superior in Endpoint Security”
What do you like best about Cisco Secure Endpoints?

Ease of use and deployment to our endpoints. Policy customization and reporting is excellent. Reasearching and finding root cause of an issue with tools provided helps tremendously as well. Review collected by and hosted on G2.com.

What do you dislike about Cisco Secure Endpoints?

Only issue we have come accross is the usability of the product with deprecated operating systems. We understand the risk in that area, but some systems take time to upgrade and many moving parts on said systems might not support newer operating systems. Review collected by and hosted on G2.com.

What problems is Cisco Secure Endpoints solving and how is that benefiting you?

It helps us solve issues with software vulnerabilties, provides solid antivirus and the ability to isolate a machine off the network if a problem is found. Plus so much more. Review collected by and hosted on G2.com.

Show More
Show Less
Agency

Agency

(39)4.8 out of 5

Agency

(39)4.8 out of 5

Agency for Business provides personalized managed cybersecurity for your organization's most vulnerable threat surface, the digital lives of your employees. Businesses use Age

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Digital Risk Protection (DRP) Platforms, Employee Identity Theft Protection


Aimee B.
AB
“Great Threat Detection!”
What do you like best about Agency?

I appreciate how proactive they are in protecting us. They do not wait for something to happen; they actively monitor threats and alert us to suspicious activity, especially on the dark web. It is reassuring to have a partner who's always a step ahead. This makes their services very easy to use and low lift for us. The onboarding process was smooth, efficient and customer-friendly. We got all our team onboarded quickly and they were all happy with the service. Review collected by and hosted on G2.com.

What do you dislike about Agency?

We have not had any issues or problems to dislike, we are very happy with the service. Review collected by and hosted on G2.com.

What problems is Agency solving and how is that benefiting you?

Monitor our data for any signs of compromise or threat and protect all employee's devices. Their vigilance means we have avoided several potential breaches, keeping our operations running smoothly. Review collected by and hosted on G2.com.

Show More
Show Less

DD
“Several years using Acronis”
What do you like best about Acronis Cyber Protect?

Acronis Cyber protect is a good solution to have backup. Usefull if you have hundred computers to manage around the world Review collected by and hosted on G2.com.

What do you dislike about Acronis Cyber Protect?

To manage the backup for Windows 7 or 10 is very good (backup and restore) but less for old systems (Win XP). The local client can't be updated by remote and we need to do that manually. Review collected by and hosted on G2.com.

What problems is Acronis Cyber Protect solving and how is that benefiting you?

We have a lot of sensible test bench with old operating system around the world. Acronis Cyber Protect allow us to reduce the production stop in case of PC's crash Review collected by and hosted on G2.com.

Show More
Show Less

Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Mode

Top Anti-Malware Software Result from Endpoint Management

Also listed in Antivirus


PV
“Powerful Application Control enabling Enhanced Security”
What do you like best about Carbon Black App Control?

It has given us confidence in securing critical systems by preventing unauthorized apps from running reducing out attack surface. The best part is it is easy to use and implement with good integration capabilities. Carbon Black Support is awesome and the long-term benefits of using the product every day helped us enhance security and compliance. Review collected by and hosted on G2.com.

What do you dislike about Carbon Black App Control?

While rare, we have encountered a few false positives like any other tool. But we took care of this with manual whitelisting. Carbon Black provides excellend value for organizations with strict security needs and hence, smaller organizations may find the pricing on the higher side. Review collected by and hosted on G2.com.

What problems is Carbon Black App Control solving and how is that benefiting you?

It has reduced Unauthorized Apps from running on our Endpoints significantly thus reducing the risk of malware infections. It also helps us meet compliance requirements where we allow only authorized applications to run. Another benefit is we can have strict lockdown on critical servers where security is crucial. Review collected by and hosted on G2.com.

Show More
Show Less
MetaDefender

MetaDefender

(14)4.5 out of 5

MetaDefender

(14)4.5 out of 5

MetaDefender is a software that analises suspicious files.

Top Anti-Malware Software Result from Antivirus

Also listed in Data Loss Prevention (DLP), Threat Intelligence, Cloud File Security, Vulnerability Scanner


AS
“Seamless software for file security and protection against malware and data breaches”
What do you like best about MetaDefender?

The software is great as it helps one to scan the whole computer hence eliminating threats. The platform helps users to know and get all the solutions to the problems that they may experience when they are operating the computer. The software has also a splendid supportive team that is always on the foremost path in helping their customers and this leads to great customer satisfaction. Review collected by and hosted on G2.com.

What do you dislike about MetaDefender?

The platform is a game-changer in every sense!! it has exceeded my expectations as it has a low price that is budget-friendly and a great user interface that is simple to use and I could recommend it to all individuals. Review collected by and hosted on G2.com.

What problems is MetaDefender solving and how is that benefiting you?

The platform is great as it enables its users to have a clean computer that is free from malicious files. The platform is an indispensable tool to most users as it allows them to upload all kinds of documents as it scans online before saving them on the system. The platform enables most of the companies to secure their data and sensitive files that could be in a computer and it erase the dangerous files that could corrupt the computer. Review collected by and hosted on G2.com.

Show More
Show Less

CylanceENDPOINT transforms your organization to become self-defending from all types of cyberthreats from file-based malware to sophisticated script and memory attacks. In add

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Antivirus, Endpoint Detection & Response (EDR), Browser Isolation, Endpoint Protection Platforms


Patricio I.
PI
“Excelente producto de Seguridad Enndpoint que revolucionó con Inteligencia Artificial”
What do you like best about CylanceENDPOINT?

- El producto es muy liviano y ni se siente cuando está instalado o analizando, no consume casi recursos y en esto supera a cualquier otra marca.

- Su proteccion se basa mas en la inteligencia artificial residente en el agente y no en actualización de definición de virus como otros productos de su misma gama.

- Tiene una consola de administración que es muy amigable y facil de utilizar e implementar. Review collected by and hosted on G2.com.

What do you dislike about CylanceENDPOINT?

- El agente Endpoint (Cylance Protect) viene separado del agente EDR (Cylance Optics) y se deben instalar por separado, pienso que esto consume un tiempo importante si la implementacion se realiza a un numero grande de equipos, y que deberia de mejorar unificando los paquetes de instalación.

- No tiene instalacion mediante despliegue desatendido, y debe hacerse el despliegue desde otras herramientas externas (mediante GPO de si MSI, o mediante otro producto que despliegue instalaciones). Review collected by and hosted on G2.com.

What problems is CylanceENDPOINT solving and how is that benefiting you?

- Protección de los equipos (workstations y servidores) de organizaciones pequeñas, medianas y grandes.

- Informes detallados personalziados.

- Desde el EDR se utiliza como control de Aplicaciones bloqueando ejecutables. Review collected by and hosted on G2.com.

Show More
Show Less

Bastion is a new breed of cybersecurity platform for small and mid-sized businesses (SMBs) and the Managed Service Providers (MSPs) that support them. A single platform that s

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Cloud Email Security, Security Awareness Training


Nicolas D.
ND
“Easy, intuitive and really all-in-one cybersecurity solution”
What do you like best about Bastion Technologies?

In less than one hour, I’ve been able to protect my employees, e-mails, endpoints, Google Workspace and websites all within the same interface. It’s super intuitive and provided actionable feedback on how to improve my company’s security posture. The most impactful features are the phishing / awareness suites and the external surface scan.

On a weekly basis, it now provides in-depth visibility on my exposure. The reporting modules are also super useful to demonstrate our company’s commitment to cyber security to customers & partners. Review collected by and hosted on G2.com.

What do you dislike about Bastion Technologies?

I don’t see anything to complain really at this stage Review collected by and hosted on G2.com.

What problems is Bastion Technologies solving and how is that benefiting you?

Bastion Technologies is taking off me the burden of thinking about cyber and cover all items I need to protect my start up. I do not have time or knowledge to compare all solutions and know what is required for me. Bastion is tailored for SMBs and this is saving me hours and headhakes. I set it up quickly, support is super responsive when I had a question, and then I could fix all my issues on my own. Even my employees liked the trainings and phishing simulations and are challenging themselves with it. In a word Bastion is taking all the brain power and risks of cyber of me. Review collected by and hosted on G2.com.

Show More
Show Less

Powertech Antivirus is a server-level antivirus solution that protects your IT environment from viruses, worms, Trojans, and other complex malware. It runs natively on IBM sys

Top Anti-Malware Software Result from Antivirus


JZ
(Original )Information
“Easy to use and an extra layer of protection.”
What do you like best about Powertech Antivirus for IBM Systems?

Powertech Antivirus is an added on extra layer of protection on our network. We have this running native on the IBMi, and it gives us peace of mind, just knowing that our files are safe from threats. Review collected by and hosted on G2.com.

What do you dislike about Powertech Antivirus for IBM Systems?

One of the things that might be an issue is that with the automation of this product, you sometimes forget it's there running. Review collected by and hosted on G2.com.

What problems is Powertech Antivirus for IBM Systems solving and how is that benefiting you?

Powertech Antivirus is the security we need for customers who access our file system from outside of our protected sources. This is great for our security knowing that if someone from another company we do not manage is compromised, that we are still protected. Review collected by and hosted on G2.com.

Show More
Show Less

Kaspersky Anti-Ransomware Tool provides lightweight protection against malware, adware and other riskware objects including crypto-mining software. This lightweight tool uses

Top Anti-Malware Software Result from Antivirus


Akshit P.
AP
“Peace of mind, assured.”
What do you like best about Kaspersky Anti-Ransomware Tool?

For someone who has been a victim to Ransomware, this tool brings you peace of mind. "For free", thats the important part because i like this incentive. Unsure about the reliability at first, I tried installing several Ransomware on a fresh installation of windows with this tool on. Since then, i have never doubted its performance! Review collected by and hosted on G2.com.

What do you dislike about Kaspersky Anti-Ransomware Tool?

For one, i wish there were similar apps for Linux and MacOS devices(atleast the base package).

Another thing that concered me a bit was the reputation related worries. However, at the end, things worked out for me and I am happy. Review collected by and hosted on G2.com.

What problems is Kaspersky Anti-Ransomware Tool solving and how is that benefiting you?

For me and a lot of people out there who are hesistant about spending money in events related to ransomware either to the attacker or the defender, this tool lends a hand by providing the base package for free. I am glad to have a choice here to use the free app and optionally switch to the Pro versions as requirements change. Review collected by and hosted on G2.com.

Show More
Show Less

Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Endpoint Management, Antivirus


Tushar U.
TU
“Nevigating Security Settingmade Simple with Harmony Endpoint”
What do you like best about Check Point Harmony Endpoint?

It offers strong protection againts various threats, helping keep devices secure and user safe making it simple for it teams to navigate and manage security settings. Review collected by and hosted on G2.com.

What do you dislike about Check Point Harmony Endpoint?

As of now i do not dislike the product or service. Review collected by and hosted on G2.com.

What problems is Check Point Harmony Endpoint solving and how is that benefiting you?

it helps protect againts malware,ramsomware and phishing attacks, making it an ideal solution for environment where this threats are privalent. Review collected by and hosted on G2.com.

Show More
Show Less