Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs a
Also listed in Endpoint Protection Platforms, Endpoint Detection & Response (EDR), Managed Detection and Response (MDR), Endpoint Management, Antivirus
I like how ThreatDown does patch management. Since we are a small/mid business, we don't have an MDM in place, most of our systems are desktops. This software really helps keep systems up to date and reports out-of-date systems.
Not only does it patch the OS, it also patches Software. There are many things that I was amazed with.
It helps with inventory. Knowing what each OS is running, what software is on the machine, what version of the software, knows what needs updated.
Schedules. The fact that you can customize the schedule down to a 'T', is great. You can group systems with different policies for systems that need to stay online 24/7 vs end-user machines.
The Portal. Very easy to use, and the layout is excellent. I use the portal frequently to see where our computer systems are if they're updated, pending restart, and what has been detected.
The installation went well; there were only a few machines that I had to physically install the software on because they weren't on the domain. Review collected by and hosted on G2.com.
Microsoft Defender for Endpoint is a unified platform for preventative protection, post-breach detection, automated investigation, and response.
Also listed in Antivirus, Endpoint Protection Suites, Endpoint Protection Platforms
It provides endpoint protection against cyber threats. It has a combination of machine learning , behavioural analytics and the best part which I personally like is that it has cloud-based security intelligence to detect and response to the threats in real-time. It is seamlessly works with Windows, Mac.
The best thing about the EDR is that it can analyze the behavior patterns and trriger alerts when unusual or malicious activities are detected. Review collected by and hosted on G2.com.
Modernize your clients' security and backup with integrated cyber protection
Also listed in Cloud Email Security, Server Backup, SaaS Backup, Patch Management, Endpoint Detection & Response (EDR)
Acronis Cyber Protect Cloud is known for its integration of backup, disaster recovery, anti-malware, and endpoint protection into a single platform, which sets it apart from many other solutions
the biggest advantage of Acronis Cyber Protect Cloud is its integration of multiple security and backup functionalities in one platform, offering a streamlined, efficient solution for data protection and cybersecurity. Review collected by and hosted on G2.com.
Equipped with proactive malware defense, protection against ransomware & zero-day threats, consistently ranked with the lowest false positives, and renowned for the light dema
Also listed in Endpoint Protection Platforms, Malware Analysis Tools, Antivirus, Extended Detection and Response (XDR) Platforms, Patch Management
I have been using ESET NOD32 since 20 years. It is so light you wouldn't even think you have a security program running on your computer, ideal for both low end computers and high end ones. Even their basic protection which is NOD32 Antivirus has a built in HTTP scanner so if you ever click on a malicious link or download, it would block it before the connection even starts. Additionally, it has a 0 false positive rate in my experience, the last thing you want is to run a program and get a warning that it's not safe when it actually is. ESET has mastered this and have the lowest false positive rates amongst all other security solutions Review collected by and hosted on G2.com.
Complete security that includes encryption, web filtering and patch assessment
Also listed in Antivirus, Endpoint Detection & Response (EDR), Extended Detection and Response (XDR) Platforms, Endpoint Protection Platforms
What I like most about Sophos Intercept X: Next-Gen Endpoint is its ability to detect and neutralize cyber threats proactively, including both known and new or unknown ones. It uses artificial intelligence and advanced technologies to provide solid and adaptable protection against a wide range of threats, which provides invaluable peace of mind in a constantly evolving security environment. Review collected by and hosted on G2.com.
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene,
Also listed in Identity Threat Detection and Response (ITDR), Endpoint Protection Platforms, AWS Marketplace, Extended Detection and Response (XDR) Platforms, User and Entity Behavior Analytics (UEBA)
This is NextGen Antivirus/EPP. It operates on the basis of AI and ML, distinguishing it from other EPP Platforms.
It is straightforward to install and has a file size of less than 150mb.
It supports Windows, Linux distributions, MAC, and even Android.
Customer service is really responsive and helpfull. Review collected by and hosted on G2.com.
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vu
Also listed in Endpoint Management, Antivirus, Zero Trust Networking
With the COVID-19 we shifted to working remotely from home for over a year with few in-office workdays. Our company chose this software to make a secure connection to our work systems. I provide after-hours support, so I still need this essential software when providing support from home. We are now back to 4 days a week in-office as of this week. I love how I just log in to FortiClient and I am quickly secure. Review collected by and hosted on G2.com.
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, ra
Also listed in Identity Threat Detection and Response (ITDR), Endpoint Protection Platforms, Extended Detection and Response (XDR) Platforms, Deception Technology, Endpoint Protection Suites
So, First of all SentinelOne Singularity provides the best visibility of all the threats, covering network to every connectivity layers with very Easy and Simple GUI. Singularity not only covers the Endpoint but also covers the Infection Layers if any attack or malware is detected. You can integrate this Singularity with multiple threat analytics and threat feeders, also with your On-going SIEM/SOAR platform. If i talk about implementation it's basically SaaS, so you dont need to worry about the complex and lengthy process while implementing SentinelOne Singularity. We all know this SentinelOne is amongst the Market LEADER, hence it's customer support is really quick and effective. Review collected by and hosted on G2.com.
Also listed in Data Loss Prevention (DLP), Identity and Access Management (IAM), Privileged Access Management (PAM), Antivirus, Endpoint Management
Symantec Cyber Defense prevents systems from external vulnerabilities and threats by identifying them and notifying the user about it. It prevents viruses and spyware from attacking the systems by constantly monitoring the devices for any malwares. As it continues running in the background, it is very easy to use and implement too. The dashboard provides a complete health check of the system and keeps the users up to date about the identified digital threats. Review collected by and hosted on G2.com.
Bitdefender Antivirus Plus 2018 delivers multiple layers of protection against ransomware. It uses behavioral threat detection to prevent infections, and protects your most im
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how
Also listed in Managed Detection and Response (MDR), Endpoint Protection Suites, Endpoint Detection & Response (EDR), Threat Intelligence
The product itself is excellent, but the standout is how Threatlocker work with your to make sure your environments are secured correctly, with monthly reviews. The support is top notch too, they are a real pleasure to work with. We are so pleased with the product it is not included in our stack as standard, especially now it has even more features. Deployment is a total breeze, and implementation via intune or your RMM of choice will have it in the wild in seconds. We would not be without this product as it works so well and detecting things on a daily basis. Review collected by and hosted on G2.com.
Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. AMP can uncover even
Also listed in Endpoint Detection & Response (EDR), Antivirus, Endpoint Management, Endpoint Protection Platforms
Ease of use and deployment to our endpoints. Policy customization and reporting is excellent. Reasearching and finding root cause of an issue with tools provided helps tremendously as well. Review collected by and hosted on G2.com.
Absolute accelerates its customers’ shift to work-from-anywhere through the industry’s first self-healing Zero Trust platform, helping to ensure maximum security and uncomprom
Also listed in Endpoint Protection Suites, Endpoint Management, Unified Endpoint Management (UEM)
Absolutes automation services are what really makes it stand out. Geo-tracking is extremely important, and when a system leaves the fenced area, we can have it frozen nearly immediately automatically. Additional plans even allow Absolute to regularly validate your security stack installed on end clients to make sure that it is installed, and up to date. All of this is extremely important in a world where more and more workers are remote or travelling. Review collected by and hosted on G2.com.
Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Mode
Also listed in Antivirus
It has given us confidence in securing critical systems by preventing unauthorized apps from running reducing out attack surface. The best part is it is easy to use and implement with good integration capabilities. Carbon Black Support is awesome and the long-term benefits of using the product every day helped us enhance security and compliance. Review collected by and hosted on G2.com.
Also listed in Disaster Recovery, Online Backup, Server Backup, File Recovery, Patch Management
Acronis Cyber protect is a good solution to have backup. Usefull if you have hundred computers to manage around the world Review collected by and hosted on G2.com.
Agency for Business provides personalized managed cybersecurity for your organization's most vulnerable threat surface, the digital lives of your employees. Businesses use Age
Also listed in Digital Risk Protection (DRP) Platforms, Employee Identity Theft Protection
I appreciate how proactive they are in protecting us. They do not wait for something to happen; they actively monitor threats and alert us to suspicious activity, especially on the dark web. It is reassuring to have a partner who's always a step ahead. This makes their services very easy to use and low lift for us. The onboarding process was smooth, efficient and customer-friendly. We got all our team onboarded quickly and they were all happy with the service. Review collected by and hosted on G2.com.
MetaDefender is a software that analises suspicious files.
Also listed in Data Loss Prevention (DLP), Threat Intelligence, Cloud File Security, Vulnerability Scanner
The software is great as it helps one to scan the whole computer hence eliminating threats. The platform helps users to know and get all the solutions to the problems that they may experience when they are operating the computer. The software has also a splendid supportive team that is always on the foremost path in helping their customers and this leads to great customer satisfaction. Review collected by and hosted on G2.com.
CylanceENDPOINT transforms your organization to become self-defending from all types of cyberthreats from file-based malware to sophisticated script and memory attacks. In add
Also listed in Antivirus, Endpoint Detection & Response (EDR), Browser Isolation, Endpoint Protection Platforms
- The product is very lightweight and is hardly noticeable when installed or analyzing, it barely consumes resources and in this aspect surpasses any other brand.
- Its protection is based more on artificial intelligence residing in the agent and not on virus definition updates like other products in its range.
- It has a management console that is very user-friendly and easy to use and implement. Review collected by and hosted on G2.com.
ServerProtect scans and detects malware in real time and incorporates cleanup capabilities to help remove malicious code and repair system damage. Administrators can use one m
This product makes it easy for an experienced or non-experienced user to maneuver around in. This is one of the most helpful options this software contains among others in its.
Contacting and looking for assistance is no problem the staff gets back to you as soon as they can. Answering all questions and giving you the assistance you deserve with any issues that may come across. Review collected by and hosted on G2.com.
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X
Also listed in Endpoint Management, Antivirus
What I like most about the solution is that it supports almost all Operating Systems (OS) with a single agent and provides excellent endpoint security from emerging threats. Review collected by and hosted on G2.com.