Best Software for 2025 is now live!

Anti-Malware Software

Typically, Anti-Malware is a capability of a variety of other G2 Software categories. See more below to select the

best Anti-Malware Software.

Anti-malware software is used to prevent malware attacks on corporate and individual information technology (IT) systems. Since there is a rise in cyber attacks, cybersecurity is a must for all devices. A device falls prey to a malware attack in various ways such as by plugging in an infected USB drive, opening an infected file or a link sent over phishing emails, downloading suspicious apps, and more. All systems, be it Windows, iOS, or Android are susceptible to these malware attacks. It is not to be mistaken with antivirus software, which does not have sufficient capabilities to detect ransomware and other forms of malicious threats. Users can also consider endpoint protection suites for an all-in-one security solution.
ThreatDown

ThreatDown

(1,016)4.6 out of 5

ThreatDown

(1,016)4.6 out of 5

Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs a

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Endpoint Protection Platforms, Endpoint Detection & Response (EDR), Managed Detection and Response (MDR), Endpoint Management, Antivirus


GW
“Malwareytes Technical Support”
What do you like best about ThreatDown?

I was pleasantly surprised at the speed in which they got back with me on an issue I was having with a false\positive reading. They were able to walk me through a process to figure out what was going on and how to fix it. Review collected by and hosted on G2.com.

What do you dislike about ThreatDown?

When removing an endpoint from the console, it removes it immediately. This part I like. The thing I dislike is that it takes up to 48 hours to remove the vulnerabilities that endpoint was generating. I would be great if the vulnerabilities from that endpoint were removed immediately as well! Review collected by and hosted on G2.com.

What problems is ThreatDown solving and how is that benefiting you?

As I stated earlier, I had a vulnerability that was a false\positive. Malwarebytes was showing a vulnerability for a program that was not on the computer. Turns out that the program was on there (once upon a time), but was uninstalled. What I didn't know, but Malwarebytes helped me figure out, is that there were still remnants of the program still in the registry. Once those were removed, the vulnerability went away. With their help, I am able to protect my endpoints. Review collected by and hosted on G2.com.

Show More
Show Less

Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation

Top Anti-Malware Software Result from Cloud Data Security

Also listed in Cloud Email Security, Server Backup, SaaS Backup, Patch Management, Endpoint Detection & Response (EDR)


JS
“Acronis Cyber Protect - Múltiples Capas de Seguridad”
What do you like best about Acronis Cyber Protect Cloud?

Acronis Cyber Protect permite a los proveedores de servicios como nosotros ofrecer a nuestros clientes múltiples capas de seguridad, copias de seguridad en cloud o locales, antivirus, monitoreo en tiempo real de equipos y servidores, generar alertas, aplicar contramedidas ante incidentes, recuperaciones rápidas y agiles de sus copias de seguridad, etc... Sin olvidar el Disaster Recovery que nos permite aplicar planes de continuidad de los servicios de los clientes.

Utilizar Acronis Cyber Protect es como tener al alcance de la mano una "navaja suiza" con múltiples funciones que nos permiten ofrecer soluciones ajustadas a las necesidades de los clientes. Además de estar siempre atentos a las necesidades y sugerencias de los partners.

En resumen Acronis Cyber Protect ofrecer facilidad de implementación y facilidad de integración con los diferentes entornos y/o configuraciones de los clientes. Review collected by and hosted on G2.com.

What do you dislike about Acronis Cyber Protect Cloud?

Nos ofrecer una amplia gama de herramientas y soluciones en materia de Ciberseguridad a nuestro clientes. Acronis nos ofrecer un panel central de control desde el cual podemos administrar todas las funciones de una manera ágil.

Además de disponer un soporte a los clientes y partners de una calidad superior. Review collected by and hosted on G2.com.

What problems is Acronis Cyber Protect Cloud solving and how is that benefiting you?

El único pero que hay con Acronis es la dificultad de entender las facturas y que no sea posible conocer en tiempo real el coste de la configuración activa de un cliente. Review collected by and hosted on G2.com.

Show More
Show Less

Microsoft Defender for Endpoint is a unified platform for preventative protection, post-breach detection, automated investigation, and response.

Top Anti-Malware Software Result from Endpoint Detection & Response (EDR)

Also listed in Antivirus, Endpoint Protection Suites, Endpoint Protection Platforms


Verified User in Manufacturing
AM
(Original )Information
“Endpoint security solution that includes EDR, ASR, Email Security and more”
What do you like best about Microsoft Defender for Endpoint?

We use Microsoft Defender for Endpoint on a very large deployment and most of the endpoints were previously running Cortex XDR. Defender provides high level of protections against cyber treats. Our GSOC team investigates incidents and deploys security policies via the Microsoft Defender portal. We were able to detect and stop cyber attacks in the very early stages and this helps us keep the environment clean. So far we haven't had any major incidents. Review collected by and hosted on G2.com.

What do you dislike about Microsoft Defender for Endpoint?

It takes a lot of training and constant learning, managing the security policies for all protection modules is a complex process. There is no Linux support at this time. Review collected by and hosted on G2.com.

What problems is Microsoft Defender for Endpoint solving and how is that benefiting you?

Helps us quickly and efficiently detect and stop cyber attacks. Integration through third party CTI platforms allows us to import EDL block lists and to assign risk scores to IOCs, which helps when investigating incidents in the Microsoft Defender portal. Review collected by and hosted on G2.com.

Show More
Show Less
ESET PROTECT

ESET PROTECT

(834)4.6 out of 5

ESET PROTECT

(834)4.6 out of 5

ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from e

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Endpoint Protection Platforms, Extended Detection and Response (XDR) Platforms, Malware Analysis Tools, Patch Management, Antivirus


RK
“ESET Protect is both efficient and secure and costs significantly less”
What do you like best about ESET PROTECT?

Eset Protect's proactive threat detection and zero day attack prevention tools are quite helpful in my present remote work setup as it has the ability to find and isolate affected endpoints without involving user outreach and its great insight into our whole IT infrastructure also helps to simplify maintenance and improve system security. Review collected by and hosted on G2.com.

What do you dislike about ESET PROTECT?

Navigation of the dashboard and the statistics may need a certain level of technical competence and it also took longer than required to implement Eset Protect, leading to a few unanticipated delays and failures. Review collected by and hosted on G2.com.

What problems is ESET PROTECT solving and how is that benefiting you?

Eset Protect contains a great quarantine feature which separates the malware before it can be used and Eset Protect can also simultaneously find and handle threats without manual intervention. And apart from helping me to make our system more secure, it is also quite light weight and efficient and runs quitely in the background and provides real time scanning. Review collected by and hosted on G2.com.

Show More
Show Less

Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the m

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Antivirus, Endpoint Detection & Response (EDR), Extended Detection and Response (XDR) Platforms, Endpoint Protection Platforms


Cristian C.
CC
(Original )Information
“Sophos Intercept X Next-Gen Endpoint: a robust protection against cyber threats.”
What do you like best about Sophos Intercept X: Next-Gen Endpoint?

What I like most about Sophos Intercept X: Next-Gen Endpoint is its ability to detect and neutralize cyber threats proactively, including both known and new or unknown ones. It uses artificial intelligence and advanced technologies to provide solid and adaptable protection against a wide range of threats, which provides invaluable peace of mind in a constantly evolving security environment. Review collected by and hosted on G2.com.

What do you dislike about Sophos Intercept X: Next-Gen Endpoint?

One aspect to improve in Sophos Intercept X: Next-Gen Endpoint is the initial learning curve due to the complexity of its interface and options, which can be overwhelming for some less technical users. Simplifying the user experience and offering a clearer guide for initial setup could facilitate the adoption of the solution. Review collected by and hosted on G2.com.

What problems is Sophos Intercept X: Next-Gen Endpoint solving and how is that benefiting you?

Sophos Intercept X: Next-Gen Endpoint presents challenges in terms of the initial learning curve and the complexity of its interface for some less technical users. However, this can also offer benefits by providing a wide range of configuration options and advanced features for those seeking more personalized and robust protection against cyber threats. Review collected by and hosted on G2.com.

Show More
Show Less

CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene,

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Identity Threat Detection and Response (ITDR), Endpoint Protection Platforms, AWS Marketplace, Extended Detection and Response (XDR) Platforms, User and Entity Behavior Analytics (UEBA)


BP
(Original )Information
“Good performance and protection during any malware are detected during any implementation.”
What do you like best about CrowdStrike Falcon Endpoint Protection Platform?

Easy for useage and implementation. Strength that I like most during sensor stuck, we require token from console, we can retrieve the token and execute on command prompt. If any system is stuck with an old version and if we are not able to uninstall it, then the team guides us in other ways within the guidelines is good support we are getting. If we knowingly or unknowingly install other third-party applications, if it harmful this antivirus detects and gives some information that this application is harmful. It has good features and performs smoothly. Review collected by and hosted on G2.com.

What do you dislike about CrowdStrike Falcon Endpoint Protection Platform?

During the uninstallation of CrowdStrike we are facing some issues, on the host management console maintenance token is not accepted when the host is disconnected. Again, we need to go to the CS API console and then execute the commands to get the specified token then it is getting uninstalled. Mostly on server time taking to uninstall and upgrade the sensor. Review collected by and hosted on G2.com.

What problems is CrowdStrike Falcon Endpoint Protection Platform solving and how is that benefiting you?

I am glad to have this CrowdStrike application in my organization. I have been working on this application since 1.5years, seen many operations on endpoint systems through the policy it is installed. As we work on detections and incidents on priority to close and navigation totally understandable to work exact category. We have multiple servers in multiple locations across India that are communicating with CS that are working it and fine, if facing any issues will TAC with Falcon team address and they will provide good support to us until we fix the issue. Overall, a good experience, recommended application with circle members. Review collected by and hosted on G2.com.

Show More
Show Less
ThreatLocker

ThreatLocker

(265)4.8 out of 5

ThreatLocker

(265)4.8 out of 5

Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Managed Detection and Response (MDR), Endpoint Protection Suites, Endpoint Detection & Response (EDR), Threat Intelligence


Thomas L.
TL
“ThreatLocker gives us real control over security without the usual headaches.”
What do you like best about ThreatLocker?

It allows me to sleep easier knowing that we have a much stronger barrier. With how good the Cyber Hero team is, it really takes away any headaches when it comes to security—they’re incredibly quick and helpful with anything I need assistance on. Knowing I have the support of their MDR team 24/7 gives us real security no matter what. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

It takes some time to fine-tune policies, especially in the beginning, and managing approvals can be a bit of a learning curve. It’s not a “set-it-and-forget-it” tool, but once properly configured, it provides solid security without too much ongoing hassle. Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

ThreatLocker helps us lock down what runs in our environment, so we’re not constantly worrying about ransomware, malware, or unauthorized software slipping through. The default-deny approach means only approved applications can run, giving us way more control. On top of that, their storage and network controls help keep things even tighter. Having their 24/7 MDR support is a huge plus—it means if anything does pop up, we’ve got a team ready to jump on it, so we can focus on our work instead of stressing about security. Review collected by and hosted on G2.com.

Show More
Show Less
FortiClient

FortiClient

(204)4.4 out of 5

FortiClient

(204)4.4 out of 5

FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vu

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Endpoint Management, Antivirus, Zero Trust Networking


Glenn B.
GB
(Original )Information
“FortiClient excellent for secure remote work connecting to work systems.”
What do you like best about FortiClient?

With the COVID-19 we shifted to working remotely from home for over a year with few in-office workdays. Our company chose this software to make a secure connection to our work systems. I provide after-hours support, so I still need this essential software when providing support from home. We are now back to 4 days a week in-office as of this week. I love how I just log in to FortiClient and I am quickly secure. Review collected by and hosted on G2.com.

What do you dislike about FortiClient?

I have not encountered a dislike, if I lose connection; I can quickly log in again. Review collected by and hosted on G2.com.

Recommendations to others considering FortiClient:

FortiClient is easy to use and I have never had any problems. I have never had to contact support. There are very few software items I can say I never had problems with. I have been using this tool for several years now. I on my second work laptop using this software. Review collected by and hosted on G2.com.

What problems is FortiClient solving and how is that benefiting you?

I am able to access secure systems from home that I otherwise would not be able to perform. My support is seamless regardless of whether I am on my company systems in-office or remote from home. Review collected by and hosted on G2.com.

Show More
Show Less

Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, ra

Top Anti-Malware Software Result from Endpoint Detection & Response (EDR)

Also listed in Identity Threat Detection and Response (ITDR), Endpoint Protection Platforms, Extended Detection and Response (XDR) Platforms, Deception Technology, Endpoint Protection Suites


Ankit  A.
AA
“Single Visibility Platform (SVP)”
What do you like best about SentinelOne Singularity?

So, First of all SentinelOne Singularity provides the best visibility of all the threats, covering network to every connectivity layers with very Easy and Simple GUI. Singularity not only covers the Endpoint but also covers the Infection Layers if any attack or malware is detected. You can integrate this Singularity with multiple threat analytics and threat feeders, also with your On-going SIEM/SOAR platform. If i talk about implementation it's basically SaaS, so you dont need to worry about the complex and lengthy process while implementing SentinelOne Singularity. We all know this SentinelOne is amongst the Market LEADER, hence it's customer support is really quick and effective. Review collected by and hosted on G2.com.

What do you dislike about SentinelOne Singularity?

Personally i dont dislike anything in SentinelOne Singularity as it provides numerous benefitial features which will help and sorted out the complex scenarios in multiple organisation. Review collected by and hosted on G2.com.

What problems is SentinelOne Singularity solving and how is that benefiting you?

SentinelOne Singularity is not only a generic EDR, infact it's a bundle of EDR, Advanced Threat Detection, XDR, VA Scan, EPP which covers each and every unique and important cyber security portfolios. This will help not only me but many organisation as i have pitched this product to multple customers and they're already very much satisfied with this Singularity solution as they dont need multiple product to be managed separately. This is a USP of SentinelOne Singularity which benefits the customer with the ease of usage. Review collected by and hosted on G2.com.

Show More
Show Less

EA
“Overall security providing solution”
What do you like best about Symantec Integrated Cyber Defense?

Symantec Cyber Defense prevents systems from external vulnerabilities and threats by identifying them and notifying the user about it. It prevents viruses and spyware from attacking the systems by constantly monitoring the devices for any malwares. As it continues running in the background, it is very easy to use and implement too. The dashboard provides a complete health check of the system and keeps the users up to date about the identified digital threats. Review collected by and hosted on G2.com.

What do you dislike about Symantec Integrated Cyber Defense?

The software on its own consumes a lot of disk space. Moreover, as it needs to run in the background all the time, the software is configured by the IT department to startup at boot time, due to which the system performance decreases further. As this setup cannot be altered by users, there is always a lag at system startup. Review collected by and hosted on G2.com.

What problems is Symantec Integrated Cyber Defense solving and how is that benefiting you?

Symantec is providing a complete comprehensive security solution from analyzing the digital threats to monitoring the incoming emails and files to identify and later quarantine any malwares and virus from systems. Unsecure websites are restricted from being opened thus preventing any vulnerabilities entering the devices. Due to this, the systems remain up all the time, preventing any financial losses to customers due to system downtime caused by any digital attacks. Review collected by and hosted on G2.com.

Show More
Show Less

Bitdefender Antivirus Plus 2018 delivers multiple layers of protection against ransomware. It uses behavioral threat detection to prevent infections, and protects your most im

Top Anti-Malware Software Result from Antivirus


janus a.
JA
“bitdefender antivirus plus 2020 user review”
What do you like best about Bitdefender Antivirus Plus 2020?

It is very secure and vigilant against all links, websites, and files you are opening. Review collected by and hosted on G2.com.

What do you dislike about Bitdefender Antivirus Plus 2020?

As I have said, it is very secure and vigilant. It sometimes block even the app or websites you frequently use. Review collected by and hosted on G2.com.

What problems is Bitdefender Antivirus Plus 2020 solving and how is that benefiting you?

It helps keeps your computer/phone/gadgets safe. It automatically blocks everything it detects that are not safe. Review collected by and hosted on G2.com.

Show More
Show Less

Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. AMP can uncover even

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Endpoint Detection & Response (EDR), Antivirus, Endpoint Management, Endpoint Protection Platforms


Jay K.
JK
“Superior in Endpoint Security”
What do you like best about Cisco Secure Endpoints?

Ease of use and deployment to our endpoints. Policy customization and reporting is excellent. Reasearching and finding root cause of an issue with tools provided helps tremendously as well. Review collected by and hosted on G2.com.

What do you dislike about Cisco Secure Endpoints?

Only issue we have come accross is the usability of the product with deprecated operating systems. We understand the risk in that area, but some systems take time to upgrade and many moving parts on said systems might not support newer operating systems. Review collected by and hosted on G2.com.

What problems is Cisco Secure Endpoints solving and how is that benefiting you?

It helps us solve issues with software vulnerabilties, provides solid antivirus and the ability to isolate a machine off the network if a problem is found. Plus so much more. Review collected by and hosted on G2.com.

Show More
Show Less

Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Mode

Top Anti-Malware Software Result from Endpoint Management

Also listed in Antivirus


PV
“Powerful Application Control enabling Enhanced Security”
What do you like best about Carbon Black App Control?

It has given us confidence in securing critical systems by preventing unauthorized apps from running reducing out attack surface. The best part is it is easy to use and implement with good integration capabilities. Carbon Black Support is awesome and the long-term benefits of using the product every day helped us enhance security and compliance. Review collected by and hosted on G2.com.

What do you dislike about Carbon Black App Control?

While rare, we have encountered a few false positives like any other tool. But we took care of this with manual whitelisting. Carbon Black provides excellend value for organizations with strict security needs and hence, smaller organizations may find the pricing on the higher side. Review collected by and hosted on G2.com.

What problems is Carbon Black App Control solving and how is that benefiting you?

It has reduced Unauthorized Apps from running on our Endpoints significantly thus reducing the risk of malware infections. It also helps us meet compliance requirements where we allow only authorized applications to run. Another benefit is we can have strict lockdown on critical servers where security is crucial. Review collected by and hosted on G2.com.

Show More
Show Less

Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Endpoint Management, Antivirus


Aashish K.
AK
“Best dashboard or management”
What do you like best about Check Point Harmony Endpoint?

Ease to use, check and maintain all the devices under one portal or dashboard, easy to deply Review collected by and hosted on G2.com.

What do you dislike about Check Point Harmony Endpoint?

One feature that could use improvement is the reporting capabilities. While the essential reports are available, having more customization options for data analysis would be beneficial. Review collected by and hosted on G2.com.

What problems is Check Point Harmony Endpoint solving and how is that benefiting you?

Advanced Threat Protection Review collected by and hosted on G2.com.

Show More
Show Less

DD
“Several years using Acronis”
What do you like best about Acronis Cyber Protect?

Acronis Cyber protect is a good solution to have backup. Usefull if you have hundred computers to manage around the world Review collected by and hosted on G2.com.

What do you dislike about Acronis Cyber Protect?

To manage the backup for Windows 7 or 10 is very good (backup and restore) but less for old systems (Win XP). The local client can't be updated by remote and we need to do that manually. Review collected by and hosted on G2.com.

What problems is Acronis Cyber Protect solving and how is that benefiting you?

We have a lot of sensible test bench with old operating system around the world. Acronis Cyber Protect allow us to reduce the production stop in case of PC's crash Review collected by and hosted on G2.com.

Show More
Show Less
MetaDefender

MetaDefender

(14)4.5 out of 5

MetaDefender

(14)4.5 out of 5

MetaDefender is a software that analises suspicious files.

Top Anti-Malware Software Result from Antivirus

Also listed in Data Loss Prevention (DLP), Threat Intelligence, Cloud File Security, Vulnerability Scanner


AS
“Seamless software for file security and protection against malware and data breaches”
What do you like best about MetaDefender?

The software is great as it helps one to scan the whole computer hence eliminating threats. The platform helps users to know and get all the solutions to the problems that they may experience when they are operating the computer. The software has also a splendid supportive team that is always on the foremost path in helping their customers and this leads to great customer satisfaction. Review collected by and hosted on G2.com.

What do you dislike about MetaDefender?

The platform is a game-changer in every sense!! it has exceeded my expectations as it has a low price that is budget-friendly and a great user interface that is simple to use and I could recommend it to all individuals. Review collected by and hosted on G2.com.

What problems is MetaDefender solving and how is that benefiting you?

The platform is great as it enables its users to have a clean computer that is free from malicious files. The platform is an indispensable tool to most users as it allows them to upload all kinds of documents as it scans online before saving them on the system. The platform enables most of the companies to secure their data and sensitive files that could be in a computer and it erase the dangerous files that could corrupt the computer. Review collected by and hosted on G2.com.

Show More
Show Less
Agency

Agency

(41)4.8 out of 5

Agency

(41)4.8 out of 5

Agency for Business provides personalized managed cybersecurity for your organization's most vulnerable threat surface, the digital lives of your employees. Businesses use Age

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Digital Risk Protection (DRP) Platforms, Employee Identity Theft Protection


Herman P.
HP
(Original )Information
“Fantastic cybersecurity, and a great team”
What do you like best about Agency?

Vicky, Tyler, and the whole Agency team are fantastic and have made the process for maintaining our security posture simple and straightforward. To give you an idea about how good they are, I really haven't thought about our cybersecurity or device management at all in the almost year that we've been using Agency. Implementing it took maybe 30 minutes total, with our whole team getting on a Zoom and it was done. Review collected by and hosted on G2.com.

What do you dislike about Agency?

I think Agency is most useful for companies with high risk devices. The UI / UX on their platform could use some work. Review collected by and hosted on G2.com.

What problems is Agency solving and how is that benefiting you?

Agency helped us get set up with multi-device management on high risk employee devices, along with installing VPNs and other monitoring services. This helps us with security compliance and simply maintaining our security posture. Their threat detection is great, and so is their penetration testing which revealed some vulnerabilities which we were quickly able to remediate. Review collected by and hosted on G2.com.

Show More
Show Less

CylanceENDPOINT transforms your organization to become self-defending from all types of cyberthreats from file-based malware to sophisticated script and memory attacks. In add

Top Anti-Malware Software Result from Endpoint Protection Suites

Also listed in Antivirus, Endpoint Detection & Response (EDR), Browser Isolation, Endpoint Protection Platforms


Patricio I.
PI
“Excellent Endpoint Security product that revolutionized with Artificial Intelligence”
What do you like best about CylanceENDPOINT?

- The product is very lightweight and is hardly noticeable when installed or analyzing, it barely consumes resources and in this aspect surpasses any other brand.

- Its protection is based more on artificial intelligence residing in the agent and not on virus definition updates like other products in its range.

- It has a management console that is very user-friendly and easy to use and implement. Review collected by and hosted on G2.com.

What do you dislike about CylanceENDPOINT?

- The Endpoint agent (Cylance Protect) is separate from the EDR agent (Cylance Optics) and must be installed separately, I think this takes a significant amount of time if the implementation is carried out on a large number of devices, and it should improve by unifying the installation packages.

- It does not have installation through unattended deployment, and deployment must be done from other external tools (via GPO if MSI, or through another product that deploys installations). Review collected by and hosted on G2.com.

What problems is CylanceENDPOINT solving and how is that benefiting you?

- Protection of equipment (workstations and servers) for small, medium, and large organizations.

- Detailed personalized reports.

- From the EDR, it is used as an Application control by blocking executables. Review collected by and hosted on G2.com.

Show More
Show Less

Absolute accelerates its customers’ shift to work-from-anywhere through the industry’s first self-healing Zero Trust platform, helping to ensure maximum security and uncomprom

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Endpoint Protection Suites, Endpoint Management, Unified Endpoint Management (UEM)


Joseph T.
JT
(Original )Information
“Secure Protection for Endpoints”
What do you like best about Absolute Secure Endpoint?

Absolutes automation services are what really makes it stand out. Geo-tracking is extremely important, and when a system leaves the fenced area, we can have it frozen nearly immediately automatically. Additional plans even allow Absolute to regularly validate your security stack installed on end clients to make sure that it is installed, and up to date. All of this is extremely important in a world where more and more workers are remote or travelling. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

So far the only downside we have had is with getting the agents to check in initially. There is also sometimes a delay between when the system is detected outside of the geofence, and when that is reported to Absolute. It most has to do with the interval of the data transmission, and the Absolute team has been great at working with us on improving this service. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

We need to ensure that the data on our systems does not leave the United States. Absolute's geo-fence helps to facilitate this with geo-gencing and the ability to remotely freeze devices so that the data is not accessable.

We currently have additional plans to use the remote wipe feature to ensure extra security measures are met when scrapping hardware that will no longer be used. Review collected by and hosted on G2.com.

Show More
Show Less

Antivirus uses real-time virus signatures and anomaly-based protections from ThreatCloud, extensive threat intelligence to proactively stop threats and manage security service

Top Anti-Malware Software Result from Antivirus


Rosemary G.
RG
“The real star for threat mitigation”
What do you like best about Check Point Antivirus?

Check Point Antivirus has been my primary tool for securing my desktop and mobile devices from internet threats. It detects malware attacks that may be contained in links and file attachments. It updates me regularly with real-time health reports of my computing devices. Review collected by and hosted on G2.com.

What do you dislike about Check Point Antivirus?

The software has maintained stable performance of my office desktop and blocked several threats that could stall our projects. Review collected by and hosted on G2.com.

What problems is Check Point Antivirus solving and how is that benefiting you?

The software offers best security insights and reports that enables me to initiate investigation incase my data is compromised. Check Point Antivirus has totally reduced rate of malware attacks and boosted network security. Review collected by and hosted on G2.com.

Show More
Show Less