Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs a
Also listed in Endpoint Protection Platforms, Endpoint Detection & Response (EDR), Managed Detection and Response (MDR), Endpoint Management, Antivirus
It is simple to use and to implement and integrate to an API REST for example, efficient, and charge very litle the endpoint.
The actualization is continuous.
You have many useful add ons that help you, for example Vulnerability and Patch management.
The Customer support is very good and easy to contact them.
ThreatDown EDR works for you every time that the endpoint is on.
I use it every work day, and the Dashboard view is excellent to have a very good idea of the status, and what to do. Review collected by and hosted on G2.com.
Modernize your clients' security and backup with integrated cyber protection
Also listed in Cloud Email Security, Server Backup, SaaS Backup, Patch Management, Endpoint Detection & Response (EDR)
Acronis Cyber Protect Cloud is known for its integration of backup, disaster recovery, anti-malware, and endpoint protection into a single platform, which sets it apart from many other solutions
the biggest advantage of Acronis Cyber Protect Cloud is its integration of multiple security and backup functionalities in one platform, offering a streamlined, efficient solution for data protection and cybersecurity. Review collected by and hosted on G2.com.
Equipped with proactive malware defense, protection against ransomware & zero-day threats, consistently ranked with the lowest false positives, and renowned for the light dema
Also listed in Endpoint Protection Platforms, Malware Analysis Tools, Antivirus, Extended Detection and Response (XDR) Platforms, Patch Management
ESET Protect is relatively easy to deploy in your environment, especially if you leverage the Cloud platform.
Protect elevates all ESET features that were present in the Business product-serie and brings the missing visibility that was missing to make a complete EDR.
It requires a daily surveillance from your team to ensure a constant monitoring of your assets' health.
Protect integrates directly into the Cloud platform and pairs with the other ESET products, although it's important to mention that this is a separate component/service. Review collected by and hosted on G2.com.
Complete security that includes encryption, web filtering and patch assessment
Also listed in Antivirus, Endpoint Detection & Response (EDR), Extended Detection and Response (XDR) Platforms, Endpoint Protection Platforms
Lo que mas me gusta de Sofos Intercept X: Next-Gen Endpoint es su capacidad para detetar y neutralisar amenazas cibérneticas de manera proactiba, incluyendo tanto las conocidas como las nuevas o desconosidas. Utilisa intelijencia artifisial y tecnolohias avanzadas para brindar una protecsión solida y adaptable contra un amplio espectro de amenazas, lo que proporciona una tranquilidad invaluable en un entorno de seguridad en constante evolusión. Review collected by and hosted on G2.com.
Microsoft Defender for Endpoint is a unified platform for preventative protection, post-breach detection, automated investigation, and response.
Also listed in Antivirus, Endpoint Protection Suites, Endpoint Protection Platforms
It provides endpoint protection against cyber threats. It has a combination of machine learning , behavioural analytics and the best part which I personally like is that it has cloud-based security intelligence to detect and response to the threats in real-time. It is seamlessly works with Windows, Mac.
The best thing about the EDR is that it can analyze the behavior patterns and trriger alerts when unusual or malicious activities are detected. Review collected by and hosted on G2.com.
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene,
Also listed in Identity Threat Detection and Response (ITDR), Endpoint Protection Platforms, AWS Marketplace, Extended Detection and Response (XDR) Platforms, User and Entity Behavior Analytics (UEBA)
We used to have a different application earlier named SentinelOne ranger.
However, we switched from that to CrowdStrike, reason being the application is more secure and reliable.
It runs in the background daily on all the Commscope computers.
It is integrated into all the computers, servers and share drives to protect our computers.
Easy to use and well optimized.
It automatically detects any threats or files when any external source is connected, or any unknown file is downloaded from the web to keep secure the computer. Review collected by and hosted on G2.com.
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, ra
Also listed in Identity Threat Detection and Response (ITDR), Endpoint Protection Platforms, Extended Detection and Response (XDR) Platforms, Deception Technology, Endpoint Protection Suites
So, First of all SentinelOne Singularity provides the best visibility of all the threats, covering network to every connectivity layers with very Easy and Simple GUI. Singularity not only covers the Endpoint but also covers the Infection Layers if any attack or malware is detected. You can integrate this Singularity with multiple threat analytics and threat feeders, also with your On-going SIEM/SOAR platform. If i talk about implementation it's basically SaaS, so you dont need to worry about the complex and lengthy process while implementing SentinelOne Singularity. We all know this SentinelOne is amongst the Market LEADER, hence it's customer support is really quick and effective. Review collected by and hosted on G2.com.
Bitdefender Antivirus Plus 2018 delivers multiple layers of protection against ransomware. It uses behavioral threat detection to prevent infections, and protects your most im
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vu
Also listed in Endpoint Management, Antivirus, Zero Trust Networking
With the COVID-19 we shifted to working remotely from home for over a year with few in-office workdays. Our company chose this software to make a secure connection to our work systems. I provide after-hours support, so I still need this essential software when providing support from home. We are now back to 4 days a week in-office as of this week. I love how I just log in to FortiClient and I am quickly secure. Review collected by and hosted on G2.com.
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how
Also listed in Managed Detection and Response (MDR), Endpoint Protection Suites, Endpoint Detection & Response (EDR), Threat Intelligence
Application Allowlisting: This feature enables organizations to permit only approved software to run, effectively blocking unauthorized applications and reducing the risk of malware infections.
Ringfencing™: ThreatLocker creates boundaries around approved applications, controlling their interactions with other software, the internet, and system resources. This containment strategy helps prevent the exploitation of legitimate tools by malicious actors.
Elevation Control: This function allows administrators to manage and approve requests for elevated privileges on specific applications, ensuring users have the necessary access without compromising security.
Network Control: ThreatLocker provides a cloud-managed endpoint and server firewall with dynamic Access Control Lists (ACLs), enabling organizations to regulate inbound traffic
Storage Control: This feature offers granular control over storage devices, including USB drives and network shares, allowing administrators to set policies that govern data access and transfers.
Additionally, ThreatLocker is known for its responsive support team, which is available 24/7 to assist with any issues or questions. Review collected by and hosted on G2.com.
Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. AMP can uncover even
Also listed in Endpoint Detection & Response (EDR), Antivirus, Endpoint Management, Endpoint Protection Platforms
Ease of use and deployment to our endpoints. Policy customization and reporting is excellent. Reasearching and finding root cause of an issue with tools provided helps tremendously as well. Review collected by and hosted on G2.com.
Agency for Business provides personalized managed cybersecurity for your organization's most vulnerable threat surface, the digital lives of your employees. Businesses use Age
Also listed in Digital Risk Protection (DRP) Platforms, Employee Identity Theft Protection
I appreciate how proactive they are in protecting us. They do not wait for something to happen; they actively monitor threats and alert us to suspicious activity, especially on the dark web. It is reassuring to have a partner who's always a step ahead. This makes their services very easy to use and low lift for us. The onboarding process was smooth, efficient and customer-friendly. We got all our team onboarded quickly and they were all happy with the service. Review collected by and hosted on G2.com.
Also listed in Disaster Recovery, Online Backup, Server Backup, File Recovery, Patch Management
Acronis Cyber protect is a good solution to have backup. Usefull if you have hundred computers to manage around the world Review collected by and hosted on G2.com.
Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Mode
Also listed in Antivirus
It has given us confidence in securing critical systems by preventing unauthorized apps from running reducing out attack surface. The best part is it is easy to use and implement with good integration capabilities. Carbon Black Support is awesome and the long-term benefits of using the product every day helped us enhance security and compliance. Review collected by and hosted on G2.com.
MetaDefender is a software that analises suspicious files.
Also listed in Data Loss Prevention (DLP), Threat Intelligence, Cloud File Security, Vulnerability Scanner
The software is great as it helps one to scan the whole computer hence eliminating threats. The platform helps users to know and get all the solutions to the problems that they may experience when they are operating the computer. The software has also a splendid supportive team that is always on the foremost path in helping their customers and this leads to great customer satisfaction. Review collected by and hosted on G2.com.
CylanceENDPOINT transforms your organization to become self-defending from all types of cyberthreats from file-based malware to sophisticated script and memory attacks. In add
Also listed in Antivirus, Endpoint Detection & Response (EDR), Browser Isolation, Endpoint Protection Platforms
- El producto es muy liviano y ni se siente cuando está instalado o analizando, no consume casi recursos y en esto supera a cualquier otra marca.
- Su proteccion se basa mas en la inteligencia artificial residente en el agente y no en actualización de definición de virus como otros productos de su misma gama.
- Tiene una consola de administración que es muy amigable y facil de utilizar e implementar. Review collected by and hosted on G2.com.
Bastion is a new breed of cybersecurity platform for small and mid-sized businesses (SMBs) and the Managed Service Providers (MSPs) that support them. A single platform that s
Also listed in Cloud Email Security, Security Awareness Training
In less than one hour, I’ve been able to protect my employees, e-mails, endpoints, Google Workspace and websites all within the same interface. It’s super intuitive and provided actionable feedback on how to improve my company’s security posture. The most impactful features are the phishing / awareness suites and the external surface scan.
On a weekly basis, it now provides in-depth visibility on my exposure. The reporting modules are also super useful to demonstrate our company’s commitment to cyber security to customers & partners. Review collected by and hosted on G2.com.
Powertech Antivirus is a server-level antivirus solution that protects your IT environment from viruses, worms, Trojans, and other complex malware. It runs natively on IBM sys
Powertech Antivirus is an added on extra layer of protection on our network. We have this running native on the IBMi, and it gives us peace of mind, just knowing that our files are safe from threats. Review collected by and hosted on G2.com.
Kaspersky Anti-Ransomware Tool provides lightweight protection against malware, adware and other riskware objects including crypto-mining software. This lightweight tool uses
For someone who has been a victim to Ransomware, this tool brings you peace of mind. "For free", thats the important part because i like this incentive. Unsure about the reliability at first, I tried installing several Ransomware on a fresh installation of windows with this tool on. Since then, i have never doubted its performance! Review collected by and hosted on G2.com.
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X
Also listed in Endpoint Management, Antivirus
It offers strong protection againts various threats, helping keep devices secure and user safe making it simple for it teams to navigate and manage security settings. Review collected by and hosted on G2.com.