Introducing G2.ai, the future of software buying.Try now

Best Endpoint Detection & Response (EDR) Software Solutions

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Endpoint detection and response (EDR) software is the newest member of the endpoint security family. EDR tools combine elements of both endpoint antivirus and endpoint management solutions to detect, investigate, and remove any malicious software that penetrates a network’s devices. EDR solutions give greater visibility of a system’s overall health including each specific device’s state. Companies use these tools to mitigate endpoint penetrations quickly and prevent data loss, theft, or system failures. They are typically used as a complement to larger security systems such as security information and event management (SIEM), vulnerability management, and incident response tools.

The best EDR software solutions record and store system behaviors, employing various data analytics techniques to identify suspicious activities. They also provide contextual information, block malicious actions, and offer remediation suggestions to restore affected systems.

To qualify for inclusion in the Endpoint Detection and Response (EDR) category, a product must:

Alert administrators when devices have been compromised
Search data and systems for the presence of malware
Possess analytics and anomaly detection features
Possess malware removal features

Best Endpoint Detection & Response (EDR) Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
113 Listings in Endpoint Detection & Response (EDR) Available
(1,039)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – with one agent and one console -- t

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Small-Business
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatDown Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    189
    Security
    122
    Features
    109
    Protection
    109
    Threat Detection
    103
    Cons
    Missing Features
    39
    Poor Customer Support
    38
    Communication Issues
    33
    False Positives
    33
    Poor Support Services
    28
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatDown features and usability ratings that predict user satisfaction
    9.1
    Ease of Admin
    Average: 8.8
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Quality of Support
    Average: 8.7
    9.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Santa Clara, CA
    Twitter
    @Malwarebytes
    81,803 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    678 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – with one agent and one console -- t

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Small-Business
  • 41% Mid-Market
ThreatDown Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
189
Security
122
Features
109
Protection
109
Threat Detection
103
Cons
Missing Features
39
Poor Customer Support
38
Communication Issues
33
False Positives
33
Poor Support Services
28
ThreatDown features and usability ratings that predict user satisfaction
9.1
Ease of Admin
Average: 8.8
9.1
Has the product been a good partner in doing business?
Average: 9.1
8.8
Quality of Support
Average: 8.7
9.3
Ease of Use
Average: 8.7
Seller Details
Company Website
Year Founded
2008
HQ Location
Santa Clara, CA
Twitter
@Malwarebytes
81,803 Twitter followers
LinkedIn® Page
www.linkedin.com
678 employees on LinkedIn®
(1,160)4.7 out of 5
6th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Acronis Cyber Protect Cloud
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease f

    Users
    • Director
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 71% Small-Business
    • 26% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Acronis Cyber Protect is a platform that combines advanced backup, anti-malware, end point protection, and disaster recovery into a single platform.
    • Reviewers like the platform's ease of use, implementation, scalability, integration, and its ability to control and monitor all aspects from a single dashboard.
    • Users experienced issues with the platform's pricing, support, limited flexibility on cloud storage, and some reported that the platform could be resource-intensive during some operations, slowing down their devices.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acronis Cyber Protect Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    293
    Backup Solutions
    246
    Backup Ease
    177
    Protection
    173
    Security
    171
    Cons
    Expensive
    68
    Slow Performance
    68
    Poor Customer Support
    64
    Backup Issues
    52
    Poor Support Services
    52
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acronis Cyber Protect Cloud features and usability ratings that predict user satisfaction
    9.1
    Ease of Admin
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Quality of Support
    Average: 8.7
    9.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Acronis
    Company Website
    Year Founded
    2003
    HQ Location
    Schaffhausen
    Twitter
    @acronis
    95,731 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,833 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease f

Users
  • Director
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 71% Small-Business
  • 26% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Acronis Cyber Protect is a platform that combines advanced backup, anti-malware, end point protection, and disaster recovery into a single platform.
  • Reviewers like the platform's ease of use, implementation, scalability, integration, and its ability to control and monitor all aspects from a single dashboard.
  • Users experienced issues with the platform's pricing, support, limited flexibility on cloud storage, and some reported that the platform could be resource-intensive during some operations, slowing down their devices.
Acronis Cyber Protect Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
293
Backup Solutions
246
Backup Ease
177
Protection
173
Security
171
Cons
Expensive
68
Slow Performance
68
Poor Customer Support
64
Backup Issues
52
Poor Support Services
52
Acronis Cyber Protect Cloud features and usability ratings that predict user satisfaction
9.1
Ease of Admin
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 9.1
8.8
Quality of Support
Average: 8.7
9.1
Ease of Use
Average: 8.7
Seller Details
Seller
Acronis
Company Website
Year Founded
2003
HQ Location
Schaffhausen
Twitter
@acronis
95,731 Twitter followers
LinkedIn® Page
www.linkedin.com
1,833 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(461)4.6 out of 5
Optimized for quick response
1st Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Sophos Endpoint
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware

    Users
    • IT Manager
    • IT Director
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Mid-Market
    • 21% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sophos Endpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    91
    Protection
    91
    Security
    72
    Features
    60
    Cybersecurity Protection
    57
    Cons
    High Resource Usage
    24
    Slow Performance
    21
    Difficult Configuration
    18
    Poor Customer Support
    18
    Compatibility Issues
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sophos Endpoint features and usability ratings that predict user satisfaction
    9.3
    Ease of Admin
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    8.7
    Quality of Support
    Average: 8.7
    9.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Company Website
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,926 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware

Users
  • IT Manager
  • IT Director
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Mid-Market
  • 21% Enterprise
Sophos Endpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
91
Protection
91
Security
72
Features
60
Cybersecurity Protection
57
Cons
High Resource Usage
24
Slow Performance
21
Difficult Configuration
18
Poor Customer Support
18
Compatibility Issues
17
Sophos Endpoint features and usability ratings that predict user satisfaction
9.3
Ease of Admin
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 9.1
8.7
Quality of Support
Average: 8.7
9.2
Ease of Use
Average: 8.7
Seller Details
Seller
Sophos
Company Website
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,757 Twitter followers
LinkedIn® Page
www.linkedin.com
4,926 employees on LinkedIn®
(749)4.9 out of 5
Optimized for quick response
2nd Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Huntress is a comprehensive cybersecurity solution designed specifically for the Fortune 5,000,000 and the managed service providers (MSPs) that support them. This platform combines advanced technolog

    Users
    • Owner
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 81% Small-Business
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Huntress Managed EDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    247
    Ease of Use
    214
    Threat Detection
    174
    Deployment Ease
    129
    Easy Deployment
    119
    Cons
    Improvements Needed
    37
    False Positives
    28
    Alert Issues
    25
    Integration Issues
    24
    Expensive
    23
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntress Managed EDR features and usability ratings that predict user satisfaction
    9.6
    Ease of Admin
    Average: 8.8
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.7
    Quality of Support
    Average: 8.7
    9.5
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Ellicott City, US
    Twitter
    @HuntressLabs
    35,762 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    603 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Huntress is a comprehensive cybersecurity solution designed specifically for the Fortune 5,000,000 and the managed service providers (MSPs) that support them. This platform combines advanced technolog

Users
  • Owner
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 81% Small-Business
  • 17% Mid-Market
Huntress Managed EDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
247
Ease of Use
214
Threat Detection
174
Deployment Ease
129
Easy Deployment
119
Cons
Improvements Needed
37
False Positives
28
Alert Issues
25
Integration Issues
24
Expensive
23
Huntress Managed EDR features and usability ratings that predict user satisfaction
9.6
Ease of Admin
Average: 8.8
9.7
Has the product been a good partner in doing business?
Average: 9.1
9.7
Quality of Support
Average: 8.7
9.5
Ease of Use
Average: 8.7
Seller Details
Company Website
Year Founded
2015
HQ Location
Ellicott City, US
Twitter
@HuntressLabs
35,762 Twitter followers
LinkedIn® Page
www.linkedin.com
603 employees on LinkedIn®
(865)4.6 out of 5
Optimized for quick response
7th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for ESET PROTECT
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 46% Small-Business
    • 44% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ESET PROTECT Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    148
    Security
    146
    Protection
    126
    Cybersecurity Protection
    93
    Features
    83
    Cons
    Expensive
    39
    Learning Curve
    30
    Slow Performance
    29
    Compatibility Issues
    25
    Missing Features
    22
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.5
    Ease of Admin
    Average: 8.8
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Quality of Support
    Average: 8.7
    8.9
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    286,399 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,870 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 46% Small-Business
  • 44% Mid-Market
ESET PROTECT Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
148
Security
146
Protection
126
Cybersecurity Protection
93
Features
83
Cons
Expensive
39
Learning Curve
30
Slow Performance
29
Compatibility Issues
25
Missing Features
22
ESET PROTECT features and usability ratings that predict user satisfaction
8.5
Ease of Admin
Average: 8.8
8.9
Has the product been a good partner in doing business?
Average: 9.1
8.9
Quality of Support
Average: 8.7
8.9
Ease of Use
Average: 8.7
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
286,399 Twitter followers
LinkedIn® Page
www.linkedin.com
1,870 employees on LinkedIn®
(273)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Arctic Wolf
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help organizations end cyber risk by providing security operations as a concierge service.

    Users
    • IT Manager
    • IT Director
    Industries
    • Hospital & Health Care
    • Financial Services
    Market Segment
    • 71% Mid-Market
    • 19% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Arctic Wolf Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    58
    Threat Detection
    47
    Ease of Use
    29
    Cybersecurity
    28
    Alerts
    18
    Cons
    Expensive
    10
    Learning Curve
    7
    False Positives
    6
    Inefficient Ticketing System
    6
    Cybersecurity Risks
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Arctic Wolf features and usability ratings that predict user satisfaction
    9.1
    Ease of Admin
    Average: 8.8
    9.5
    Has the product been a good partner in doing business?
    Average: 9.1
    9.4
    Quality of Support
    Average: 8.7
    9.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Eden Prairie, MN
    Twitter
    @AWNetworks
    4,173 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,983 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help organizations end cyber risk by providing security operations as a concierge service.

Users
  • IT Manager
  • IT Director
Industries
  • Hospital & Health Care
  • Financial Services
Market Segment
  • 71% Mid-Market
  • 19% Enterprise
Arctic Wolf Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
58
Threat Detection
47
Ease of Use
29
Cybersecurity
28
Alerts
18
Cons
Expensive
10
Learning Curve
7
False Positives
6
Inefficient Ticketing System
6
Cybersecurity Risks
5
Arctic Wolf features and usability ratings that predict user satisfaction
9.1
Ease of Admin
Average: 8.8
9.5
Has the product been a good partner in doing business?
Average: 9.1
9.4
Quality of Support
Average: 8.7
9.1
Ease of Use
Average: 8.7
Seller Details
Company Website
Year Founded
2012
HQ Location
Eden Prairie, MN
Twitter
@AWNetworks
4,173 Twitter followers
LinkedIn® Page
www.linkedin.com
2,983 employees on LinkedIn®
(297)4.7 out of 5
9th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    54
    Ease of Use
    43
    Security
    43
    Threat Detection
    38
    Detection
    36
    Cons
    Missing Features
    14
    Expensive
    11
    Limited Features
    11
    Complexity
    10
    Difficult Navigation
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.0
    Ease of Admin
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Quality of Support
    Average: 8.7
    9.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
54
Ease of Use
43
Security
43
Threat Detection
38
Detection
36
Cons
Missing Features
14
Expensive
11
Limited Features
11
Complexity
10
Difficult Navigation
10
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.0
Ease of Admin
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 9.1
8.9
Quality of Support
Average: 8.7
9.0
Ease of Use
Average: 8.7
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(307)4.4 out of 5
13th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Microsoft Defender for Endpoint
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Endpoint is a complete endpoint security solution that delivers preventative protection, post-breach detection, automated investigation, and response. With Defender for Endpoint

    Users
    • Software Engineer
    • Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Endpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    36
    Threat Detection
    31
    Ease of Use
    30
    Protection
    30
    Cybersecurity Protection
    28
    Cons
    Compatibility Issues
    10
    Complexity
    9
    Lack of Clarity
    9
    Improvements Needed
    8
    False Positives
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Endpoint features and usability ratings that predict user satisfaction
    8.6
    Ease of Admin
    Average: 8.8
    8.6
    Has the product been a good partner in doing business?
    Average: 9.1
    8.5
    Quality of Support
    Average: 8.7
    8.6
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Endpoint is a complete endpoint security solution that delivers preventative protection, post-breach detection, automated investigation, and response. With Defender for Endpoint

Users
  • Software Engineer
  • Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Enterprise
  • 33% Mid-Market
Microsoft Defender for Endpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
36
Threat Detection
31
Ease of Use
30
Protection
30
Cybersecurity Protection
28
Cons
Compatibility Issues
10
Complexity
9
Lack of Clarity
9
Improvements Needed
8
False Positives
7
Microsoft Defender for Endpoint features and usability ratings that predict user satisfaction
8.6
Ease of Admin
Average: 8.8
8.6
Has the product been a good partner in doing business?
Average: 9.1
8.5
Quality of Support
Average: 8.7
8.6
Ease of Use
Average: 8.7
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(187)4.7 out of 5
Optimized for quick response
12th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for SentinelOne Singularity
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    19
    Threat Detection
    13
    Features
    12
    Security
    12
    Customer Support
    9
    Cons
    False Positives
    6
    Compatibility Issues
    5
    Agent Issues
    4
    Blocking Issues
    4
    Missing Features
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity features and usability ratings that predict user satisfaction
    9.0
    Ease of Admin
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Quality of Support
    Average: 8.7
    9.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 37% Enterprise
SentinelOne Singularity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
19
Threat Detection
13
Features
12
Security
12
Customer Support
9
Cons
False Positives
6
Compatibility Issues
5
Agent Issues
4
Blocking Issues
4
Missing Features
4
SentinelOne Singularity features and usability ratings that predict user satisfaction
9.0
Ease of Admin
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 9.1
8.9
Quality of Support
Average: 8.7
9.0
Ease of Use
Average: 8.7
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
(205)4.7 out of 5
14th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Vision One is a cloud-native security operations platform, serving cloud, hybrid, and on-premises environments. It combines ASM and XDR in a single console to effectively manage cyber risk acros

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trend Vision One Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Visibility
    41
    Ease of Use
    36
    Detection Efficiency
    30
    Features
    26
    Protection
    25
    Cons
    Insufficient Information
    18
    Confusing Documentation
    12
    Limited Features
    12
    Integration Issues
    11
    Expensive
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Vision One features and usability ratings that predict user satisfaction
    8.7
    Ease of Admin
    Average: 8.8
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.7
    Quality of Support
    Average: 8.7
    8.6
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Vision One is a cloud-native security operations platform, serving cloud, hybrid, and on-premises environments. It combines ASM and XDR in a single console to effectively manage cyber risk acros

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
Trend Vision One Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Visibility
41
Ease of Use
36
Detection Efficiency
30
Features
26
Protection
25
Cons
Insufficient Information
18
Confusing Documentation
12
Limited Features
12
Integration Issues
11
Expensive
10
Trend Vision One features and usability ratings that predict user satisfaction
8.7
Ease of Admin
Average: 8.8
9.1
Has the product been a good partner in doing business?
Average: 9.1
8.7
Quality of Support
Average: 8.7
8.6
Ease of Use
Average: 8.7
Seller Details
Company Website
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
(218)4.7 out of 5
Optimized for quick response
3rd Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
Entry Level Price:Starting at $6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform. Coro’s platform e

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 57% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro Cybersecurity is a security platform that uses AI to identify and flag potential spam and phishing, and provides a single dashboard for managing white and black lists for Office 365.
    • Users frequently mention the ease of use, comprehensive protection, affordability, and excellent customer support as key benefits of using Coro Cybersecurity.
    • Reviewers noted some issues with the product, such as occasional false positives, minimal support for certain features, and the need for more robust console and additional features.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Coro Cybersecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    93
    Customer Support
    66
    Security
    63
    Protection
    50
    Easy Setup
    46
    Cons
    Performance Issues
    32
    Improvements Needed
    20
    Inaccuracy
    16
    False Positives
    15
    Limited Features
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.5
    Ease of Admin
    Average: 8.8
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Quality of Support
    Average: 8.7
    9.5
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,928 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    386 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform. Coro’s platform e

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 57% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro Cybersecurity is a security platform that uses AI to identify and flag potential spam and phishing, and provides a single dashboard for managing white and black lists for Office 365.
  • Users frequently mention the ease of use, comprehensive protection, affordability, and excellent customer support as key benefits of using Coro Cybersecurity.
  • Reviewers noted some issues with the product, such as occasional false positives, minimal support for certain features, and the need for more robust console and additional features.
Coro Cybersecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
93
Customer Support
66
Security
63
Protection
50
Easy Setup
46
Cons
Performance Issues
32
Improvements Needed
20
Inaccuracy
16
False Positives
15
Limited Features
14
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.5
Ease of Admin
Average: 8.8
9.7
Has the product been a good partner in doing business?
Average: 9.1
9.6
Quality of Support
Average: 8.7
9.5
Ease of Use
Average: 8.7
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,928 Twitter followers
LinkedIn® Page
www.linkedin.com
386 employees on LinkedIn®
(284)4.8 out of 5
8th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for ThreatLocker
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 61% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatLocker Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    91
    Threat Detection
    86
    Ease of Use
    78
    Security
    71
    Features
    68
    Cons
    Learning Curve
    42
    Difficult Learning Curve
    27
    Difficult Configuration
    14
    Difficult Navigation
    14
    Complexity
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker features and usability ratings that predict user satisfaction
    8.6
    Ease of Admin
    Average: 8.8
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.8
    Quality of Support
    Average: 8.7
    8.4
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    580 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 61% Small-Business
  • 32% Mid-Market
ThreatLocker Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
91
Threat Detection
86
Ease of Use
78
Security
71
Features
68
Cons
Learning Curve
42
Difficult Learning Curve
27
Difficult Configuration
14
Difficult Navigation
14
Complexity
13
ThreatLocker features and usability ratings that predict user satisfaction
8.6
Ease of Admin
Average: 8.8
9.7
Has the product been a good partner in doing business?
Average: 9.1
9.8
Quality of Support
Average: 8.7
8.4
Ease of Use
Average: 8.7
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,217 Twitter followers
LinkedIn® Page
www.linkedin.com
580 employees on LinkedIn®
(216)4.7 out of 5
Optimized for quick response
11th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

    Users
    • SOC Analyst
    • Technical Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 59% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cynet - All-in-One Cybersecurity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    48
    Security
    39
    Features
    38
    Threat Detection
    38
    Cybersecurity
    28
    Cons
    UX Improvement
    14
    Missing Features
    13
    Slow Performance
    12
    Limited Features
    11
    Alert Issues
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
    9.1
    Ease of Admin
    Average: 8.8
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Quality of Support
    Average: 8.7
    9.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynet
    Company Website
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @Cynet360
    1,106 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    287 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

Users
  • SOC Analyst
  • Technical Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 59% Mid-Market
  • 33% Small-Business
Cynet - All-in-One Cybersecurity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
48
Security
39
Features
38
Threat Detection
38
Cybersecurity
28
Cons
UX Improvement
14
Missing Features
13
Slow Performance
12
Limited Features
11
Alert Issues
10
Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
9.1
Ease of Admin
Average: 8.8
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.2
Quality of Support
Average: 8.7
9.0
Ease of Use
Average: 8.7
Seller Details
Seller
Cynet
Company Website
Year Founded
2014
HQ Location
Boston, MA
Twitter
@Cynet360
1,106 Twitter followers
LinkedIn® Page
www.linkedin.com
287 employees on LinkedIn®
(515)4.4 out of 5
Optimized for quick response
16th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Built with security in mind, N-central provides the visibility a

    Users
    • Owner
    • Director
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 62% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • N-able N-central Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    198
    Automation
    119
    Features
    114
    Remote Access
    91
    Customer Support
    84
    Cons
    Missing Features
    96
    Feature Issues
    71
    Needs Improvement
    57
    Limited Features
    52
    Learning Curve
    48
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • N-able N-central features and usability ratings that predict user satisfaction
    7.9
    Ease of Admin
    Average: 8.8
    8.6
    Has the product been a good partner in doing business?
    Average: 9.1
    7.9
    Quality of Support
    Average: 8.7
    7.8
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-able
    Company Website
    HQ Location
    Morrisville, North Carolina
    Twitter
    @Nable
    16,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,892 employees on LinkedIn®
    Ownership
    NYSE: NABL
Product Description
How are these determined?Information
This description is provided by the seller.

Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Built with security in mind, N-central provides the visibility a

Users
  • Owner
  • Director
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 62% Small-Business
  • 33% Mid-Market
N-able N-central Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
198
Automation
119
Features
114
Remote Access
91
Customer Support
84
Cons
Missing Features
96
Feature Issues
71
Needs Improvement
57
Limited Features
52
Learning Curve
48
N-able N-central features and usability ratings that predict user satisfaction
7.9
Ease of Admin
Average: 8.8
8.6
Has the product been a good partner in doing business?
Average: 9.1
7.9
Quality of Support
Average: 8.7
7.8
Ease of Use
Average: 8.7
Seller Details
Seller
N-able
Company Website
HQ Location
Morrisville, North Carolina
Twitter
@Nable
16,217 Twitter followers
LinkedIn® Page
www.linkedin.com
1,892 employees on LinkedIn®
Ownership
NYSE: NABL
(332)4.3 out of 5
Optimized for quick response
10th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    N-able N-sight™ RMM combines remote monitoring and management, remote access, ticketing, and billing capabilities, into one powerful yet easy to use platform that streamlines day-to-operations, combat

    Users
    • Owner
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 78% Small-Business
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • N-able N-Sight RMM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    97
    Remote Access
    63
    Automation
    41
    Customer Support
    39
    Integrations
    37
    Cons
    Feature Issues
    27
    Laggy Performance
    26
    Missing Features
    21
    Not User-Friendly
    21
    Learning Curve
    18
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • N-able N-Sight RMM features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.8
    8.4
    Has the product been a good partner in doing business?
    Average: 9.1
    8.2
    Quality of Support
    Average: 8.7
    8.4
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-able
    Company Website
    HQ Location
    Morrisville, North Carolina
    Twitter
    @Nable
    16,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,892 employees on LinkedIn®
    Ownership
    NYSE: NABL
Product Description
How are these determined?Information
This description is provided by the seller.

N-able N-sight™ RMM combines remote monitoring and management, remote access, ticketing, and billing capabilities, into one powerful yet easy to use platform that streamlines day-to-operations, combat

Users
  • Owner
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 78% Small-Business
  • 20% Mid-Market
N-able N-Sight RMM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
97
Remote Access
63
Automation
41
Customer Support
39
Integrations
37
Cons
Feature Issues
27
Laggy Performance
26
Missing Features
21
Not User-Friendly
21
Learning Curve
18
N-able N-Sight RMM features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.8
8.4
Has the product been a good partner in doing business?
Average: 9.1
8.2
Quality of Support
Average: 8.7
8.4
Ease of Use
Average: 8.7
Seller Details
Seller
N-able
Company Website
HQ Location
Morrisville, North Carolina
Twitter
@Nable
16,217 Twitter followers
LinkedIn® Page
www.linkedin.com
1,892 employees on LinkedIn®
Ownership
NYSE: NABL
(181)4.2 out of 5
Optimized for quick response
33rd Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for IBM MaaS360
Save to My Lists
Entry Level Price:$4.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM MaaS360 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    32
    Ease of Use
    27
    Security
    27
    Device Management
    26
    Integrations
    17
    Cons
    Learning Curve
    12
    Expensive
    9
    Slow Performance
    9
    Complexity
    8
    Complex Setup
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM MaaS360 features and usability ratings that predict user satisfaction
    8.0
    Ease of Admin
    Average: 8.8
    8.0
    Has the product been a good partner in doing business?
    Average: 9.1
    8.0
    Quality of Support
    Average: 8.7
    8.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Mid-Market
  • 38% Enterprise
IBM MaaS360 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
32
Ease of Use
27
Security
27
Device Management
26
Integrations
17
Cons
Learning Curve
12
Expensive
9
Slow Performance
9
Complexity
8
Complex Setup
7
IBM MaaS360 features and usability ratings that predict user satisfaction
8.0
Ease of Admin
Average: 8.8
8.0
Has the product been a good partner in doing business?
Average: 9.1
8.0
Quality of Support
Average: 8.7
8.2
Ease of Use
Average: 8.7
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
(31)4.3 out of 5
15th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Kaspersky Endpoint Detection and Response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 35% Mid-Market
    • 29% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaspersky Endpoint Detection and Response features and usability ratings that predict user satisfaction
    9.5
    Ease of Admin
    Average: 8.8
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Quality of Support
    Average: 8.7
    9.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaspersky
    Year Founded
    1997
    HQ Location
    Moscow
    Twitter
    @kasperskylabind
    1,309 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,258 employees on LinkedIn®
    Phone
    1-866-328-5700
Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 35% Mid-Market
  • 29% Enterprise
Kaspersky Endpoint Detection and Response features and usability ratings that predict user satisfaction
9.5
Ease of Admin
Average: 8.8
9.4
Has the product been a good partner in doing business?
Average: 9.1
8.3
Quality of Support
Average: 8.7
9.2
Ease of Use
Average: 8.7
Seller Details
Seller
Kaspersky
Year Founded
1997
HQ Location
Moscow
Twitter
@kasperskylabind
1,309 Twitter followers
LinkedIn® Page
www.linkedin.com
4,258 employees on LinkedIn®
Phone
1-866-328-5700
(21)4.5 out of 5
21st Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Cisco Secure Endpoints
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR)

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Secure Endpoints Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity Protection
    1
    Ease of Use
    1
    Easy Integrations
    1
    Efficiency
    1
    Features
    1
    Cons
    Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure Endpoints features and usability ratings that predict user satisfaction
    8.9
    Ease of Admin
    Average: 8.8
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    9.3
    Quality of Support
    Average: 8.7
    9.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR)

Users
No information available
Industries
No information available
Market Segment
  • 43% Enterprise
  • 38% Mid-Market
Cisco Secure Endpoints Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity Protection
1
Ease of Use
1
Easy Integrations
1
Efficiency
1
Features
1
Cons
Limitations
1
Cisco Secure Endpoints features and usability ratings that predict user satisfaction
8.9
Ease of Admin
Average: 8.8
8.9
Has the product been a good partner in doing business?
Average: 9.1
9.3
Quality of Support
Average: 8.7
9.2
Ease of Use
Average: 8.7
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(474)4.3 out of 5
27th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Palo Alto Cortex XSIAM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Cortex XSIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    49
    Threat Detection
    38
    Integrations
    29
    Cybersecurity
    26
    Easy Integrations
    25
    Cons
    Expensive
    27
    Difficult Learning
    17
    Integration Issues
    16
    Complexity
    13
    UX Improvement
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
    8.2
    Ease of Admin
    Average: 8.8
    8.6
    Has the product been a good partner in doing business?
    Average: 9.1
    8.2
    Quality of Support
    Average: 8.7
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 29% Mid-Market
Palo Alto Cortex XSIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
49
Threat Detection
38
Integrations
29
Cybersecurity
26
Easy Integrations
25
Cons
Expensive
27
Difficult Learning
17
Integration Issues
16
Complexity
13
UX Improvement
12
Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
8.2
Ease of Admin
Average: 8.8
8.6
Has the product been a good partner in doing business?
Average: 9.1
8.2
Quality of Support
Average: 8.7
8.3
Ease of Use
Average: 8.7
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
(45)4.6 out of 5
29th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex XDR is the industry’s first extended detection and response platform that stops modern attacks by integrating data from any source. With Cortex XDR, you can harness the power of AI, analytics a

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 42% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cortex XDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Threat Detection
    2
    Alert Notifications
    1
    Alerts
    1
    Antivirus Protection
    1
    Cons
    Compatibility Issues
    1
    Complexity
    1
    Expensive
    1
    Feature Limitations
    1
    Installation Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cortex XDR features and usability ratings that predict user satisfaction
    9.0
    Ease of Admin
    Average: 8.8
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Quality of Support
    Average: 8.7
    9.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex XDR is the industry’s first extended detection and response platform that stops modern attacks by integrating data from any source. With Cortex XDR, you can harness the power of AI, analytics a

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 42% Enterprise
  • 38% Mid-Market
Cortex XDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Threat Detection
2
Alert Notifications
1
Alerts
1
Antivirus Protection
1
Cons
Compatibility Issues
1
Complexity
1
Expensive
1
Feature Limitations
1
Installation Difficulties
1
Cortex XDR features and usability ratings that predict user satisfaction
9.0
Ease of Admin
Average: 8.8
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.0
Quality of Support
Average: 8.7
9.1
Ease of Use
Average: 8.7
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
(86)4.4 out of 5
24th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Carbon Black EDR is a market-leading incident response and threat hunting solution designed to provide responders with the most information possible, accompanied by expert threat analysis and armed wi

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 63% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Carbon Black EDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    6
    Incident Response
    3
    Automation
    2
    Implementation Ease
    2
    Threat Detection
    2
    Cons
    High Resource Usage
    2
    Poor Support Services
    2
    Alert Issues
    1
    Expensive
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Carbon Black EDR features and usability ratings that predict user satisfaction
    7.9
    Ease of Admin
    Average: 8.8
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    8.6
    Quality of Support
    Average: 8.7
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Carbon Black EDR is a market-leading incident response and threat hunting solution designed to provide responders with the most information possible, accompanied by expert threat analysis and armed wi

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 63% Mid-Market
  • 40% Enterprise
Carbon Black EDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
6
Incident Response
3
Automation
2
Implementation Ease
2
Threat Detection
2
Cons
High Resource Usage
2
Poor Support Services
2
Alert Issues
1
Expensive
1
False Positives
1
Carbon Black EDR features and usability ratings that predict user satisfaction
7.9
Ease of Admin
Average: 8.8
8.3
Has the product been a good partner in doing business?
Average: 9.1
8.6
Quality of Support
Average: 8.7
8.3
Ease of Use
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
(120)4.4 out of 5
Optimized for quick response
19th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for WatchGuard Endpoint Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WatchGuard Endpoint Security solutions help you safeguard devices against cyber threats. WatchGuard EPDR and Advanced EPDR, our AI-powered flagship endpoint solutions, enhance your security posture by

    Users
    • Software Developer
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 55% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • WatchGuard Endpoint Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    3
    Security
    3
    Threat Protection
    3
    Device Protection
    2
    Features
    2
    Cons
    Complex Interface
    1
    Complexity
    1
    Difficult Configuration
    1
    Setup Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WatchGuard Endpoint Security features and usability ratings that predict user satisfaction
    8.7
    Ease of Admin
    Average: 8.8
    8.6
    Has the product been a good partner in doing business?
    Average: 9.1
    8.4
    Quality of Support
    Average: 8.7
    8.9
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1996
    HQ Location
    Seatle, WA
    Twitter
    @watchguard
    19,681 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,191 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

WatchGuard Endpoint Security solutions help you safeguard devices against cyber threats. WatchGuard EPDR and Advanced EPDR, our AI-powered flagship endpoint solutions, enhance your security posture by

Users
  • Software Developer
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 55% Small-Business
  • 33% Mid-Market
WatchGuard Endpoint Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
3
Security
3
Threat Protection
3
Device Protection
2
Features
2
Cons
Complex Interface
1
Complexity
1
Difficult Configuration
1
Setup Complexity
1
WatchGuard Endpoint Security features and usability ratings that predict user satisfaction
8.7
Ease of Admin
Average: 8.8
8.6
Has the product been a good partner in doing business?
Average: 9.1
8.4
Quality of Support
Average: 8.7
8.9
Ease of Use
Average: 8.7
Seller Details
Company Website
Year Founded
1996
HQ Location
Seatle, WA
Twitter
@watchguard
19,681 Twitter followers
LinkedIn® Page
www.linkedin.com
1,191 employees on LinkedIn®
(71)4.0 out of 5
30th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GravityZone is a business security solution built from ground-up for virtualization and cloud to deliver security services to physical endpoints, mobile devices, virtual machines in public cloud and E

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 54% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bitdefender GravityZone Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Customer Support
    8
    Features
    8
    Cybersecurity Protection
    6
    Alert Notifications
    5
    Cons
    Difficult Navigation
    6
    Not User-Friendly
    5
    UX Improvement
    5
    Complexity
    4
    Learning Curve
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitdefender GravityZone features and usability ratings that predict user satisfaction
    7.8
    Ease of Admin
    Average: 8.8
    8.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.1
    Quality of Support
    Average: 8.7
    8.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2001
    HQ Location
    Bucuresti, Romania
    Twitter
    @Bitdefender
    113,319 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,287 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GravityZone is a business security solution built from ground-up for virtualization and cloud to deliver security services to physical endpoints, mobile devices, virtual machines in public cloud and E

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 54% Small-Business
  • 39% Mid-Market
Bitdefender GravityZone Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Customer Support
8
Features
8
Cybersecurity Protection
6
Alert Notifications
5
Cons
Difficult Navigation
6
Not User-Friendly
5
UX Improvement
5
Complexity
4
Learning Curve
4
Bitdefender GravityZone features and usability ratings that predict user satisfaction
7.8
Ease of Admin
Average: 8.8
8.1
Has the product been a good partner in doing business?
Average: 9.1
8.1
Quality of Support
Average: 8.7
8.1
Ease of Use
Average: 8.7
Seller Details
Year Founded
2001
HQ Location
Bucuresti, Romania
Twitter
@Bitdefender
113,319 Twitter followers
LinkedIn® Page
www.linkedin.com
2,287 employees on LinkedIn®
(43)4.7 out of 5
20th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 88% Small-Business
    • 12% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Todyl Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    26
    Customer Support
    24
    Features
    19
    Security
    16
    Cybersecurity
    13
    Cons
    Technical Issues
    7
    Integration Issues
    6
    Limited Features
    6
    Lacking Features
    5
    Pricing Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    8.8
    Ease of Admin
    Average: 8.8
    9.5
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Quality of Support
    Average: 8.7
    8.5
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    136 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 88% Small-Business
  • 12% Mid-Market
Todyl Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
26
Customer Support
24
Features
19
Security
16
Cybersecurity
13
Cons
Technical Issues
7
Integration Issues
6
Limited Features
6
Lacking Features
5
Pricing Issues
5
Todyl Security Platform features and usability ratings that predict user satisfaction
8.8
Ease of Admin
Average: 8.8
9.5
Has the product been a good partner in doing business?
Average: 9.1
9.6
Quality of Support
Average: 8.7
8.5
Ease of Use
Average: 8.7
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
136 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    N-able Endpoint Detection and Response (EDR), powered by SentinelOne®, helps MSPs and IT departments prevent, detect, and quickly respond to ever-changing cyberthreats with behavioral AI threat detect

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Small-Business
    • 47% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • N-able Endpoint Detection and Response (EDR) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Threat Detection
    6
    XDR Capabilities
    3
    AI
    2
    Device Management
    2
    Cons
    False Positives
    2
    Access Control
    1
    Integration Issues
    1
    Learning Curve
    1
    Not User-Friendly
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • N-able Endpoint Detection and Response (EDR) features and usability ratings that predict user satisfaction
    8.1
    Ease of Admin
    Average: 8.8
    8.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Quality of Support
    Average: 8.7
    8.9
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-able
    HQ Location
    Morrisville, North Carolina
    Twitter
    @Nable
    16,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,892 employees on LinkedIn®
    Ownership
    NYSE: NABL
Product Description
How are these determined?Information
This description is provided by the seller.

N-able Endpoint Detection and Response (EDR), powered by SentinelOne®, helps MSPs and IT departments prevent, detect, and quickly respond to ever-changing cyberthreats with behavioral AI threat detect

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Small-Business
  • 47% Mid-Market
N-able Endpoint Detection and Response (EDR) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Threat Detection
6
XDR Capabilities
3
AI
2
Device Management
2
Cons
False Positives
2
Access Control
1
Integration Issues
1
Learning Curve
1
Not User-Friendly
1
N-able Endpoint Detection and Response (EDR) features and usability ratings that predict user satisfaction
8.1
Ease of Admin
Average: 8.8
8.1
Has the product been a good partner in doing business?
Average: 9.1
8.9
Quality of Support
Average: 8.7
8.9
Ease of Use
Average: 8.7
Seller Details
Seller
N-able
HQ Location
Morrisville, North Carolina
Twitter
@Nable
16,217 Twitter followers
LinkedIn® Page
www.linkedin.com
1,892 employees on LinkedIn®
Ownership
NYSE: NABL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiEDR identifies and stops breaches in real time automatically and efficiently with a lightweight agent. Part of the Fortinet Security Operations platform, it proactively shrinks the attack surface

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiEDR features and usability ratings that predict user satisfaction
    8.6
    Ease of Admin
    Average: 8.8
    8.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Quality of Support
    Average: 8.7
    8.7
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiEDR identifies and stops breaches in real time automatically and efficiently with a lightweight agent. Part of the Fortinet Security Operations platform, it proactively shrinks the attack surface

Users
No information available
Industries
No information available
Market Segment
  • 46% Mid-Market
  • 31% Enterprise
FortiEDR features and usability ratings that predict user satisfaction
8.6
Ease of Admin
Average: 8.8
8.1
Has the product been a good partner in doing business?
Average: 9.1
8.3
Quality of Support
Average: 8.7
8.7
Ease of Use
Average: 8.7
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(18)4.4 out of 5
23rd Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Cybereason Defense Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Mos

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 61% Enterprise
    • 22% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cybereason Defense Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Cybersecurity
    2
    Easy Setup
    2
    Features
    2
    Integrations
    2
    Cons
    Poor Customer Support
    2
    Poor Interface Design
    2
    Poor Support Services
    2
    Poor Usability
    2
    UX Improvement
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cybereason Defense Platform features and usability ratings that predict user satisfaction
    9.3
    Ease of Admin
    Average: 8.8
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    7.9
    Quality of Support
    Average: 8.7
    8.6
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    La Jolla, San Diego, US
    Twitter
    @cybereason
    15,846 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    675 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Mos

Users
No information available
Industries
No information available
Market Segment
  • 61% Enterprise
  • 22% Small-Business
Cybereason Defense Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Cybersecurity
2
Easy Setup
2
Features
2
Integrations
2
Cons
Poor Customer Support
2
Poor Interface Design
2
Poor Support Services
2
Poor Usability
2
UX Improvement
2
Cybereason Defense Platform features and usability ratings that predict user satisfaction
9.3
Ease of Admin
Average: 8.8
8.3
Has the product been a good partner in doing business?
Average: 9.1
7.9
Quality of Support
Average: 8.7
8.6
Ease of Use
Average: 8.7
Seller Details
Year Founded
2012
HQ Location
La Jolla, San Diego, US
Twitter
@cybereason
15,846 Twitter followers
LinkedIn® Page
www.linkedin.com
675 employees on LinkedIn®
(704)4.3 out of 5
32nd Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Acronis Cyber Protect
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acronis Cyber Protect delivers robust protection against cyberthreats, unparalleled backup and recovery capabilities and simplified management and visibility through a single pane of glass, for the en

    Users
    • Support Analyst
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 46% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acronis Cyber Protect Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Backup Solutions
    21
    Ease of Use
    17
    Security
    17
    Features
    14
    Backup Frequency
    13
    Cons
    Expensive
    7
    Backup Issues
    5
    Limited Features
    5
    Missing Features
    5
    Poor Customer Support
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acronis Cyber Protect features and usability ratings that predict user satisfaction
    8.5
    Ease of Admin
    Average: 8.8
    8.5
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Quality of Support
    Average: 8.7
    8.6
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Acronis
    Year Founded
    2003
    HQ Location
    Schaffhausen
    Twitter
    @acronis
    95,731 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,833 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acronis Cyber Protect delivers robust protection against cyberthreats, unparalleled backup and recovery capabilities and simplified management and visibility through a single pane of glass, for the en

Users
  • Support Analyst
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 46% Small-Business
  • 39% Mid-Market
Acronis Cyber Protect Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Backup Solutions
21
Ease of Use
17
Security
17
Features
14
Backup Frequency
13
Cons
Expensive
7
Backup Issues
5
Limited Features
5
Missing Features
5
Poor Customer Support
5
Acronis Cyber Protect features and usability ratings that predict user satisfaction
8.5
Ease of Admin
Average: 8.8
8.5
Has the product been a good partner in doing business?
Average: 9.1
8.3
Quality of Support
Average: 8.7
8.6
Ease of Use
Average: 8.7
Seller Details
Seller
Acronis
Year Founded
2003
HQ Location
Schaffhausen
Twitter
@acronis
95,731 Twitter followers
LinkedIn® Page
www.linkedin.com
1,833 employees on LinkedIn®
(324)4.3 out of 5
35th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trellix Endpoint Security Suite gives your security team the context, visibility, and capabilities to identify, investigate, and remediate threats across your hybrid environment. And it provides the d

    Users
    • Software Developer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 41% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trellix Endpoint Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Protection
    9
    Threat Detection
    8
    Features
    6
    Security
    6
    Cons
    Expensive
    4
    Alert Issues
    3
    Time Consumption
    2
    Complex Implementation
    1
    Complex Interface
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Endpoint Security features and usability ratings that predict user satisfaction
    8.2
    Ease of Admin
    Average: 8.8
    8.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.5
    Quality of Support
    Average: 8.7
    8.6
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trellix Endpoint Security Suite gives your security team the context, visibility, and capabilities to identify, investigate, and remediate threats across your hybrid environment. And it provides the d

Users
  • Software Developer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 41% Mid-Market
  • 40% Enterprise
Trellix Endpoint Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Protection
9
Threat Detection
8
Features
6
Security
6
Cons
Expensive
4
Alert Issues
3
Time Consumption
2
Complex Implementation
1
Complex Interface
1
Trellix Endpoint Security features and usability ratings that predict user satisfaction
8.2
Ease of Admin
Average: 8.8
8.1
Has the product been a good partner in doing business?
Average: 9.1
8.5
Quality of Support
Average: 8.7
8.6
Ease of Use
Average: 8.7
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
(21)4.7 out of 5
25th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DefenseStorm is a comprehensive cybersecurity platform specifically designed for financial institutions, focusing on cyber risk assessment, governance, security, and fraud prevention. This integrated

    Users
    No information available
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 76% Mid-Market
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DefenseStorm Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    14
    Team Quality
    8
    Ease of Use
    7
    Staff Expertise
    6
    Easy Integrations
    4
    Cons
    Difficult Navigation
    3
    Training Required
    3
    Asset Management
    2
    Difficult Organization
    2
    Inadequate Reporting
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DefenseStorm features and usability ratings that predict user satisfaction
    8.6
    Ease of Admin
    Average: 8.8
    9.6
    Has the product been a good partner in doing business?
    Average: 9.1
    9.8
    Quality of Support
    Average: 8.7
    8.8
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2014
    HQ Location
    Alpharetta, Georgia
    LinkedIn® Page
    www.linkedin.com
    90 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DefenseStorm is a comprehensive cybersecurity platform specifically designed for financial institutions, focusing on cyber risk assessment, governance, security, and fraud prevention. This integrated

Users
No information available
Industries
  • Banking
  • Financial Services
Market Segment
  • 76% Mid-Market
  • 24% Small-Business
DefenseStorm Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
14
Team Quality
8
Ease of Use
7
Staff Expertise
6
Easy Integrations
4
Cons
Difficult Navigation
3
Training Required
3
Asset Management
2
Difficult Organization
2
Inadequate Reporting
2
DefenseStorm features and usability ratings that predict user satisfaction
8.6
Ease of Admin
Average: 8.8
9.6
Has the product been a good partner in doing business?
Average: 9.1
9.8
Quality of Support
Average: 8.7
8.8
Ease of Use
Average: 8.7
Seller Details
Company Website
Year Founded
2014
HQ Location
Alpharetta, Georgia
LinkedIn® Page
www.linkedin.com
90 employees on LinkedIn®
(74)4.5 out of 5
Optimized for quick response
18th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Saner CVEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    23
    Ease of Use
    22
    Features
    19
    Customer Support
    16
    Patch Management
    14
    Cons
    Integration Issues
    8
    Expensive
    7
    Missing Features
    6
    Slow Performance
    6
    Learning Curve
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saner CVEM features and usability ratings that predict user satisfaction
    9.0
    Ease of Admin
    Average: 8.8
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Quality of Support
    Average: 8.7
    8.7
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SanerNow
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    139 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Small-Business
  • 39% Mid-Market
Saner CVEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
23
Ease of Use
22
Features
19
Customer Support
16
Patch Management
14
Cons
Integration Issues
8
Expensive
7
Missing Features
6
Slow Performance
6
Learning Curve
5
Saner CVEM features and usability ratings that predict user satisfaction
9.0
Ease of Admin
Average: 8.8
9.1
Has the product been a good partner in doing business?
Average: 9.1
9.2
Quality of Support
Average: 8.7
8.7
Ease of Use
Average: 8.7
Seller Details
Seller
SanerNow
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
557 Twitter followers
LinkedIn® Page
www.linkedin.com
139 employees on LinkedIn®
(22)4.7 out of 5
Optimized for quick response
17th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Field Effect MDR MDR, XDR, SIEM, SOC… it’s all under the hood. From threat detection to analysis and response, Field Effect MDR has you covered. Built from the ground-up to detect and respond

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Small-Business
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Field Effect MDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    9
    Security
    8
    Ease of Use
    5
    Protection
    5
    Easy Implementation
    4
    Cons
    Alert Issues
    4
    Inefficient Alert System
    4
    Communication Issues
    3
    Improvements Needed
    2
    Insufficient Information
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Field Effect MDR features and usability ratings that predict user satisfaction
    9.2
    Ease of Admin
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Quality of Support
    Average: 8.7
    9.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2016
    HQ Location
    Ottawa
    Twitter
    @fieldeffectsoft
    1,323 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    158 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Field Effect MDR MDR, XDR, SIEM, SOC… it’s all under the hood. From threat detection to analysis and response, Field Effect MDR has you covered. Built from the ground-up to detect and respond

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Small-Business
  • 27% Mid-Market
Field Effect MDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
9
Security
8
Ease of Use
5
Protection
5
Easy Implementation
4
Cons
Alert Issues
4
Inefficient Alert System
4
Communication Issues
3
Improvements Needed
2
Insufficient Information
2
Field Effect MDR features and usability ratings that predict user satisfaction
9.2
Ease of Admin
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 9.1
9.0
Quality of Support
Average: 8.7
9.1
Ease of Use
Average: 8.7
Seller Details
Company Website
Year Founded
2016
HQ Location
Ottawa
Twitter
@fieldeffectsoft
1,323 Twitter followers
LinkedIn® Page
www.linkedin.com
158 employees on LinkedIn®
(30)4.3 out of 5
31st Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Datto Endpoint Detection and Response (EDR)
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Datto EDR is a layered, integrated endpoint security solution that provides continuous monitoring and automated responses to threats that target Windows, Mac and Linux-based endpoints. Going beyond tr

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Small-Business
    • 7% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Datto Endpoint Detection and Response (EDR) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Easy Deployment
    5
    Automation
    4
    Easy Management
    4
    Integrations
    4
    Cons
    False Positives
    4
    Complex Interface
    3
    Expensive
    2
    Integration Issues
    2
    Limited Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Datto Endpoint Detection and Response (EDR) features and usability ratings that predict user satisfaction
    8.1
    Ease of Admin
    Average: 8.8
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    8.0
    Quality of Support
    Average: 8.7
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,018 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Datto EDR is a layered, integrated endpoint security solution that provides continuous monitoring and automated responses to threats that target Windows, Mac and Linux-based endpoints. Going beyond tr

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Small-Business
  • 7% Mid-Market
Datto Endpoint Detection and Response (EDR) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Easy Deployment
5
Automation
4
Easy Management
4
Integrations
4
Cons
False Positives
4
Complex Interface
3
Expensive
2
Integration Issues
2
Limited Features
2
Datto Endpoint Detection and Response (EDR) features and usability ratings that predict user satisfaction
8.1
Ease of Admin
Average: 8.8
8.9
Has the product been a good partner in doing business?
Average: 9.1
8.0
Quality of Support
Average: 8.7
8.3
Ease of Use
Average: 8.7
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,550 Twitter followers
LinkedIn® Page
www.linkedin.com
5,018 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gain full visibility to advanced threats with our endpoint detection and response. With our unique Broad Context Detection, you can minimize alert noise and zero in on incidents, and with automated re

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Mid-Market
    • 24% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WithSecure Elements Endpoint Detection and Response features and usability ratings that predict user satisfaction
    8.5
    Ease of Admin
    Average: 8.8
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Quality of Support
    Average: 8.7
    8.5
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    68,923 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,718 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

Gain full visibility to advanced threats with our endpoint detection and response. With our unique Broad Context Detection, you can minimize alert noise and zero in on incidents, and with automated re

Users
No information available
Industries
No information available
Market Segment
  • 53% Mid-Market
  • 24% Small-Business
WithSecure Elements Endpoint Detection and Response features and usability ratings that predict user satisfaction
8.5
Ease of Admin
Average: 8.8
9.1
Has the product been a good partner in doing business?
Average: 9.1
8.9
Quality of Support
Average: 8.7
8.5
Ease of Use
Average: 8.7
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
68,923 Twitter followers
LinkedIn® Page
www.linkedin.com
1,718 employees on LinkedIn®
Ownership
FSOYF
(39)4.3 out of 5
22nd Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimda

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 62% Mid-Market
    • 31% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Heimdal® features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.8
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Quality of Support
    Average: 8.7
    8.4
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Heimdal®
    Year Founded
    2014
    HQ Location
    Copenhagen, Denmark
    Twitter
    @HeimdalSecurity
    5,124 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    261 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimda

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 62% Mid-Market
  • 31% Small-Business
Heimdal® features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.8
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.6
Quality of Support
Average: 8.7
8.4
Ease of Use
Average: 8.7
Seller Details
Seller
Heimdal®
Year Founded
2014
HQ Location
Copenhagen, Denmark
Twitter
@HeimdalSecurity
5,124 Twitter followers
LinkedIn® Page
www.linkedin.com
261 employees on LinkedIn®
(59)4.5 out of 5
34th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Wazuh - The Open Source Security Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wazuh is a free and open source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh,

    Users
    • SOC Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wazuh - The Open Source Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Threat Detection
    10
    Integrations
    9
    Deployment Ease
    6
    Features
    6
    Cons
    Learning Curve
    7
    Difficult Learning
    4
    Poor Support Services
    4
    Unclear Documentation
    4
    Complex Setup
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wazuh - The Open Source Security Platform features and usability ratings that predict user satisfaction
    8.5
    Ease of Admin
    Average: 8.8
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    8.2
    Quality of Support
    Average: 8.7
    8.6
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Campbell, US
    Twitter
    @wazuh
    7,262 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    214 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wazuh is a free and open source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh,

Users
  • SOC Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Small-Business
  • 39% Mid-Market
Wazuh - The Open Source Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Threat Detection
10
Integrations
9
Deployment Ease
6
Features
6
Cons
Learning Curve
7
Difficult Learning
4
Poor Support Services
4
Unclear Documentation
4
Complex Setup
3
Wazuh - The Open Source Security Platform features and usability ratings that predict user satisfaction
8.5
Ease of Admin
Average: 8.8
8.3
Has the product been a good partner in doing business?
Average: 9.1
8.2
Quality of Support
Average: 8.7
8.6
Ease of Use
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
Campbell, US
Twitter
@wazuh
7,262 Twitter followers
LinkedIn® Page
www.linkedin.com
214 employees on LinkedIn®
(192)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Easy Integrations
    3
    Features
    3
    Customer Support
    2
    Cybersecurity
    2
    Cons
    Complex Interface
    2
    Improvements Needed
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.8
    Ease of Admin
    Average: 8.8
    8.6
    Has the product been a good partner in doing business?
    Average: 9.1
    8.6
    Quality of Support
    Average: 8.7
    9.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,270 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Easy Integrations
3
Features
3
Customer Support
2
Cybersecurity
2
Cons
Complex Interface
2
Improvements Needed
2
Poor Interface Design
2
UX Improvement
2
Alert Issues
1
Intezer features and usability ratings that predict user satisfaction
8.8
Ease of Admin
Average: 8.8
8.6
Has the product been a good partner in doing business?
Average: 9.1
8.6
Quality of Support
Average: 8.7
9.0
Ease of Use
Average: 8.7
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,270 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threa

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Protection Suite Enterprise Edition features and usability ratings that predict user satisfaction
    9.0
    Ease of Admin
    Average: 8.8
    8.0
    Has the product been a good partner in doing business?
    Average: 9.1
    8.2
    Quality of Support
    Average: 8.7
    9.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threa

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 36% Small-Business
Symantec Protection Suite Enterprise Edition features and usability ratings that predict user satisfaction
9.0
Ease of Admin
Average: 8.8
8.0
Has the product been a good partner in doing business?
Average: 9.1
8.2
Quality of Support
Average: 8.7
9.1
Ease of Use
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Barracuda Managed XDR is the comprehensive next-generation cybersecurity solution that protects organizations of all sizes against today’s ever-evolving threat landscape. Barracuda Managed XDR is a fu

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 58% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Barracuda Managed XDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Continuous Monitoring
    1
    Deployment Ease
    1
    Detection Efficiency
    1
    Ease of Use
    1
    Easy Deployment
    1
    Cons
    Lack of Automation
    1
    Lack of Customization
    1
    Learning Curve
    1
    Learning Difficulty
    1
    Not User-Friendly
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda Managed XDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.8
    Has the product been a good partner in doing business?
    Average: 9.1
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Company Website
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,135 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Barracuda Managed XDR is the comprehensive next-generation cybersecurity solution that protects organizations of all sizes against today’s ever-evolving threat landscape. Barracuda Managed XDR is a fu

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 58% Small-Business
  • 32% Mid-Market
Barracuda Managed XDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Continuous Monitoring
1
Deployment Ease
1
Detection Efficiency
1
Ease of Use
1
Easy Deployment
1
Cons
Lack of Automation
1
Lack of Customization
1
Learning Curve
1
Learning Difficulty
1
Not User-Friendly
1
Barracuda Managed XDR features and usability ratings that predict user satisfaction
0.0
No information available
9.8
Has the product been a good partner in doing business?
Average: 9.1
0.0
No information available
0.0
No information available
Seller Details
Seller
Barracuda
Company Website
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,550 Twitter followers
LinkedIn® Page
www.linkedin.com
2,135 employees on LinkedIn®
(13)4.4 out of 5
26th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 54% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Uptycs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Computing
    1
    Cloud Security
    1
    Cloud Technology
    1
    Compliance
    1
    Compliance Management
    1
    Cons
    Expensive
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Uptycs features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.8
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Quality of Support
    Average: 8.7
    7.9
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Uptycs
    Year Founded
    2016
    HQ Location
    Waltham, US
    Twitter
    @uptycs
    1,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

Users
No information available
Industries
  • Financial Services
Market Segment
  • 54% Mid-Market
  • 38% Enterprise
Uptycs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Computing
1
Cloud Security
1
Cloud Technology
1
Compliance
1
Compliance Management
1
Cons
Expensive
1
Pricing Issues
1
Uptycs features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.8
10.0
Has the product been a good partner in doing business?
Average: 9.1
9.0
Quality of Support
Average: 8.7
7.9
Ease of Use
Average: 8.7
Seller Details
Seller
Uptycs
Year Founded
2016
HQ Location
Waltham, US
Twitter
@uptycs
1,508 Twitter followers
LinkedIn® Page
www.linkedin.com
178 employees on LinkedIn®
(87)4.7 out of 5
28th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    8.8
    Ease of Admin
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Quality of Support
    Average: 8.7
    8.8
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,694 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
8.8
Ease of Admin
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 9.1
8.8
Quality of Support
Average: 8.7
8.8
Ease of Use
Average: 8.7
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,694 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detect, isolate, and eliminate intrusions across all endpoints using AI, automated incident generation, and unparalleled threat intelligence.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 28% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Endpoint Detection and Response (EDR) features and usability ratings that predict user satisfaction
    7.8
    Ease of Admin
    Average: 8.8
    9.0
    Has the product been a good partner in doing business?
    Average: 9.1
    7.9
    Quality of Support
    Average: 8.7
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Detect, isolate, and eliminate intrusions across all endpoints using AI, automated incident generation, and unparalleled threat intelligence.

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 28% Small-Business
Symantec Endpoint Detection and Response (EDR) features and usability ratings that predict user satisfaction
7.8
Ease of Admin
Average: 8.8
9.0
Has the product been a good partner in doing business?
Average: 9.1
7.9
Quality of Support
Average: 8.7
8.3
Ease of Use
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
(27)4.2 out of 5
36th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Endpoint security management is all about adequately securing such endpoints and thereby securing a network by blocking access attempts and such risky activities at endpoints.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Xcitium Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Affordable
    1
    Affordable Pricing
    1
    Customer Support
    1
    Easy Implementation
    1
    Features
    1
    Cons
    Billing Issues
    1
    Communication Issues
    1
    Complexity
    1
    Expensive
    1
    Insufficient Training
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Xcitium features and usability ratings that predict user satisfaction
    9.0
    Ease of Admin
    Average: 8.8
    8.8
    Has the product been a good partner in doing business?
    Average: 9.1
    8.5
    Quality of Support
    Average: 8.7
    8.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Xcitium
    Year Founded
    2018
    HQ Location
    Clifton, NJ
    LinkedIn® Page
    www.linkedin.com
    682 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Endpoint security management is all about adequately securing such endpoints and thereby securing a network by blocking access attempts and such risky activities at endpoints.

Users
No information available
Industries
No information available
Market Segment
  • 41% Mid-Market
  • 33% Small-Business
Xcitium Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Affordable
1
Affordable Pricing
1
Customer Support
1
Easy Implementation
1
Features
1
Cons
Billing Issues
1
Communication Issues
1
Complexity
1
Expensive
1
Insufficient Training
1
Xcitium features and usability ratings that predict user satisfaction
9.0
Ease of Admin
Average: 8.8
8.8
Has the product been a good partner in doing business?
Average: 9.1
8.5
Quality of Support
Average: 8.7
8.2
Ease of Use
Average: 8.7
Seller Details
Seller
Xcitium
Year Founded
2018
HQ Location
Clifton, NJ
LinkedIn® Page
www.linkedin.com
682 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 20% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LMNTRIX features and usability ratings that predict user satisfaction
    10.0
    Ease of Admin
    Average: 8.8
    9.6
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Quality of Support
    Average: 8.7
    9.6
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LMNTRIX
    Year Founded
    2015
    HQ Location
    Orange, California
    Twitter
    @lmntrixlabs
    76 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 20% Enterprise
LMNTRIX features and usability ratings that predict user satisfaction
10.0
Ease of Admin
Average: 8.8
9.6
Has the product been a good partner in doing business?
Average: 9.1
9.6
Quality of Support
Average: 8.7
9.6
Ease of Use
Average: 8.7
Seller Details
Seller
LMNTRIX
Year Founded
2015
HQ Location
Orange, California
Twitter
@lmntrixlabs
76 Twitter followers
LinkedIn® Page
www.linkedin.com
56 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BluSapphire is a comprehensive cyber defense platform crafted meticulously from the ground up by BluSapphire Labs. Each aspect of our platform embodies innovation without reliance on third-party tools

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BluSapphire XDR Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    9
    Easy Integrations
    7
    Customer Support
    6
    Features
    6
    Ease of Use
    5
    Cons
    Difficult Learning
    3
    Learning Curve
    3
    Difficult Navigation
    2
    Pricing Issues
    2
    Communication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BluSapphire XDR Platform features and usability ratings that predict user satisfaction
    8.9
    Ease of Admin
    Average: 8.8
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Quality of Support
    Average: 8.7
    8.8
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Hyderabad, Telegana
    Twitter
    @BluSapphire_net
    124 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BluSapphire is a comprehensive cyber defense platform crafted meticulously from the ground up by BluSapphire Labs. Each aspect of our platform embodies innovation without reliance on third-party tools

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 33% Enterprise
BluSapphire XDR Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
9
Easy Integrations
7
Customer Support
6
Features
6
Ease of Use
5
Cons
Difficult Learning
3
Learning Curve
3
Difficult Navigation
2
Pricing Issues
2
Communication Issues
1
BluSapphire XDR Platform features and usability ratings that predict user satisfaction
8.9
Ease of Admin
Average: 8.8
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.0
Quality of Support
Average: 8.7
8.8
Ease of Use
Average: 8.7
Seller Details
Year Founded
2017
HQ Location
Hyderabad, Telegana
Twitter
@BluSapphire_net
124 Twitter followers
LinkedIn® Page
www.linkedin.com
94 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    EnCase Endpoint Security is the most complete threat detection and response solution—eliminating the time it takes to detect, validate, triage, investigate, and remediate known and unknown threats lur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenText EnCase Endpoint Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    2
    AI
    1
    Easy Management
    1
    Incident Response
    1
    Integrations
    1
    Cons
    Expensive
    2
    Improvements Needed
    2
    Compatibility Issues
    1
    Limited Features
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText EnCase Endpoint Security features and usability ratings that predict user satisfaction
    3.3
    Ease of Admin
    Average: 8.8
    6.7
    Has the product been a good partner in doing business?
    Average: 9.1
    7.6
    Quality of Support
    Average: 8.7
    7.9
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

EnCase Endpoint Security is the most complete threat detection and response solution—eliminating the time it takes to detect, validate, triage, investigate, and remediate known and unknown threats lur

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 38% Small-Business
OpenText EnCase Endpoint Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
2
AI
1
Easy Management
1
Incident Response
1
Integrations
1
Cons
Expensive
2
Improvements Needed
2
Compatibility Issues
1
Limited Features
1
Slow Performance
1
OpenText EnCase Endpoint Security features and usability ratings that predict user satisfaction
3.3
Ease of Admin
Average: 8.8
6.7
Has the product been a good partner in doing business?
Average: 9.1
7.6
Quality of Support
Average: 8.7
7.9
Ease of Use
Average: 8.7
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,716 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    8.0
    Ease of Admin
    Average: 8.8
    8.7
    Has the product been a good partner in doing business?
    Average: 9.1
    7.7
    Quality of Support
    Average: 8.7
    9.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,429 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,142 employees on LinkedIn®
Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
8.0
Ease of Admin
Average: 8.8
8.7
Has the product been a good partner in doing business?
Average: 9.1
7.7
Quality of Support
Average: 8.7
9.2
Ease of Use
Average: 8.7
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,429 Twitter followers
LinkedIn® Page
www.linkedin.com
1,142 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zip enables companies to manage all of their security tools in one easy-to-use platform. We’ve built automated workflows to simplify tasks while increasing security posture visibility. Our opinionated

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 60% Small-Business
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zip Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    8
    Features
    7
    Device Management
    5
    Ease of Use
    4
    Security
    4
    Cons
    Not User-Friendly
    2
    Poor Customer Support
    2
    Cloud Integration
    1
    Configuration Issues
    1
    Connection Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zip Security features and usability ratings that predict user satisfaction
    9.2
    Ease of Admin
    Average: 8.8
    9.6
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Quality of Support
    Average: 8.7
    9.4
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zip enables companies to manage all of their security tools in one easy-to-use platform. We’ve built automated workflows to simplify tasks while increasing security posture visibility. Our opinionated

Users
No information available
Industries
  • Computer Software
Market Segment
  • 60% Small-Business
  • 20% Mid-Market
Zip Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
8
Features
7
Device Management
5
Ease of Use
4
Security
4
Cons
Not User-Friendly
2
Poor Customer Support
2
Cloud Integration
1
Configuration Issues
1
Connection Issues
1
Zip Security features and usability ratings that predict user satisfaction
9.2
Ease of Admin
Average: 8.8
9.6
Has the product been a good partner in doing business?
Average: 9.1
9.6
Quality of Support
Average: 8.7
9.4
Ease of Use
Average: 8.7
Seller Details
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Today’s digital forensics teams face many challenges in a world filled with an overwhelming amount of data. From multiple office locations to massive employee pools and remote workers, AD Enterprise p

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 70% Enterprise
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FTK Enterprise features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    8.1
    Quality of Support
    Average: 8.7
    8.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exterro
    Year Founded
    2004
    HQ Location
    Portland, OR
    Twitter
    @Exterro
    3,548 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    622 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Today’s digital forensics teams face many challenges in a world filled with an overwhelming amount of data. From multiple office locations to massive employee pools and remote workers, AD Enterprise p

Users
No information available
Industries
No information available
Market Segment
  • 70% Enterprise
  • 30% Mid-Market
FTK Enterprise features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 9.1
8.1
Quality of Support
Average: 8.7
8.1
Ease of Use
Average: 8.7
Seller Details
Seller
Exterro
Year Founded
2004
HQ Location
Portland, OR
Twitter
@Exterro
3,548 Twitter followers
LinkedIn® Page
www.linkedin.com
622 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Morphisec fortifies your organization by diminishing the blast radius of attacks, to preemptively reduce the organization’s exposure to cyber risk, pro-actively prevent advanced threats, and ensure op

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Mid-Market
    • 17% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Morphisec features and usability ratings that predict user satisfaction
    9.7
    Ease of Admin
    Average: 8.8
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Quality of Support
    Average: 8.7
    9.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Morphisec
    Year Founded
    2014
    HQ Location
    Waltham, US
    Twitter
    @morphisec
    2,219 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    106 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Morphisec fortifies your organization by diminishing the blast radius of attacks, to preemptively reduce the organization’s exposure to cyber risk, pro-actively prevent advanced threats, and ensure op

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Mid-Market
  • 17% Enterprise
Morphisec features and usability ratings that predict user satisfaction
9.7
Ease of Admin
Average: 8.8
9.4
Has the product been a good partner in doing business?
Average: 9.1
8.9
Quality of Support
Average: 8.7
9.2
Ease of Use
Average: 8.7
Seller Details
Seller
Morphisec
Year Founded
2014
HQ Location
Waltham, US
Twitter
@morphisec
2,219 Twitter followers
LinkedIn® Page
www.linkedin.com
106 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Helps financial institutions detect and prevent malware infections and phishing attacks, maximizing protection for their customers.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Small-Business
    • 20% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Trusteer Rapport features and usability ratings that predict user satisfaction
    10.0
    Ease of Admin
    Average: 8.8
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Quality of Support
    Average: 8.7
    9.4
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

Helps financial institutions detect and prevent malware infections and phishing attacks, maximizing protection for their customers.

Users
No information available
Industries
No information available
Market Segment
  • 80% Small-Business
  • 20% Mid-Market
IBM Trusteer Rapport features and usability ratings that predict user satisfaction
10.0
Ease of Admin
Average: 8.8
10.0
Has the product been a good partner in doing business?
Average: 9.1
9.2
Quality of Support
Average: 8.7
9.4
Ease of Use
Average: 8.7
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
Entry Level Price:$3,000.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 27% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BlackFog is a security software that fills security gaps missed by typical security software and local firewall, designed to stop the data exfiltration component of modern day ransomware events.
    • Reviewers frequently mention the software's proactive monitoring, great communication, easy installation, and ability to provide up-to-the-minute reporting and tools for making security decisions.
    • Reviewers noted that the warnings can be difficult to understand for people without a lot of cybersecurity background, and they wish BlackFog would offer anti-virus and patch software to provide an all-inclusive web interface to monitor security from one console.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlackFog Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    8
    Security
    8
    Security Protection
    8
    Protection
    6
    Data Protection
    5
    Cons
    Billing Issues
    2
    Complexity
    2
    Learning Curve
    2
    Learning Difficulty
    2
    Limited Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackFog features and usability ratings that predict user satisfaction
    9.1
    Ease of Admin
    Average: 8.8
    9.8
    Has the product been a good partner in doing business?
    Average: 9.1
    9.5
    Quality of Support
    Average: 8.7
    9.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlackFog
    Company Website
    Year Founded
    2015
    HQ Location
    BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
    Twitter
    @blackfogprivacy
    1,480 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 27% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BlackFog is a security software that fills security gaps missed by typical security software and local firewall, designed to stop the data exfiltration component of modern day ransomware events.
  • Reviewers frequently mention the software's proactive monitoring, great communication, easy installation, and ability to provide up-to-the-minute reporting and tools for making security decisions.
  • Reviewers noted that the warnings can be difficult to understand for people without a lot of cybersecurity background, and they wish BlackFog would offer anti-virus and patch software to provide an all-inclusive web interface to monitor security from one console.
BlackFog Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
8
Security
8
Security Protection
8
Protection
6
Data Protection
5
Cons
Billing Issues
2
Complexity
2
Learning Curve
2
Learning Difficulty
2
Limited Features
2
BlackFog features and usability ratings that predict user satisfaction
9.1
Ease of Admin
Average: 8.8
9.8
Has the product been a good partner in doing business?
Average: 9.1
9.5
Quality of Support
Average: 8.7
9.3
Ease of Use
Average: 8.7
Seller Details
Seller
BlackFog
Company Website
Year Founded
2015
HQ Location
BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
Twitter
@blackfogprivacy
1,480 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Enterprise Archive is a cloud-based archiving solution that simplifies legal discovery, regulatory compliance, and end-user information access without the headaches of managing an archive i

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Enterprise
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Enterprise Archive features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.8
    8.1
    Has the product been a good partner in doing business?
    Average: 9.1
    7.3
    Quality of Support
    Average: 8.7
    8.5
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,886 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,756 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Enterprise Archive is a cloud-based archiving solution that simplifies legal discovery, regulatory compliance, and end-user information access without the headaches of managing an archive i

Users
No information available
Industries
No information available
Market Segment
  • 58% Enterprise
  • 42% Mid-Market
Proofpoint Enterprise Archive features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.8
8.1
Has the product been a good partner in doing business?
Average: 9.1
7.3
Quality of Support
Average: 8.7
8.5
Ease of Use
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,886 Twitter followers
LinkedIn® Page
www.linkedin.com
4,756 employees on LinkedIn®
Ownership
NASDAQ: PFPT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deceptive Bytes' patented malware prevention technology is provided as part of its Active Endpoint Deception platform that dynamically responds to attacks as they evolve and change their outcome, by c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Active Endpoint Deception Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Usability
    1
    Ease of Use
    1
    Features
    1
    Product Quality
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Active Endpoint Deception features and usability ratings that predict user satisfaction
    10.0
    Ease of Admin
    Average: 8.8
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    10.0
    Quality of Support
    Average: 8.7
    10.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    N/A
    Twitter
    @DeceptiveBytes
    245 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Deceptive Bytes' patented malware prevention technology is provided as part of its Active Endpoint Deception platform that dynamically responds to attacks as they evolve and change their outcome, by c

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
Active Endpoint Deception Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Usability
1
Ease of Use
1
Features
1
Product Quality
1
Cons
This product has not yet received any negative sentiments.
Active Endpoint Deception features and usability ratings that predict user satisfaction
10.0
Ease of Admin
Average: 8.8
10.0
Has the product been a good partner in doing business?
Average: 9.1
10.0
Quality of Support
Average: 8.7
10.0
Ease of Use
Average: 8.7
Seller Details
Year Founded
2016
HQ Location
N/A
Twitter
@DeceptiveBytes
245 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
(3)4.7 out of 5
Optimized for quick response
View top Consulting Services for Cisco XDR
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco XDR is a cloud-based extended detection and response solution designed for security operations. Integrating with the broad Cisco security portfolio and many third-party offerings, Cisco XDR is t

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco XDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Integrations
    2
    Alert Notifications
    1
    Speed
    1
    XDR Capabilities
    1
    Cons
    Complex Interface
    1
    Defender Dependence
    1
    Difficult Learning
    1
    Improvements Needed
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco XDR features and usability ratings that predict user satisfaction
    9.2
    Ease of Admin
    Average: 8.8
    7.5
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Quality of Support
    Average: 8.7
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco XDR is a cloud-based extended detection and response solution designed for security operations. Integrating with the broad Cisco security portfolio and many third-party offerings, Cisco XDR is t

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Cisco XDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Integrations
2
Alert Notifications
1
Speed
1
XDR Capabilities
1
Cons
Complex Interface
1
Defender Dependence
1
Difficult Learning
1
Improvements Needed
1
Learning Curve
1
Cisco XDR features and usability ratings that predict user satisfaction
9.2
Ease of Admin
Average: 8.8
7.5
Has the product been a good partner in doing business?
Average: 9.1
9.2
Quality of Support
Average: 8.7
8.3
Ease of Use
Average: 8.7
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TXHunter is one of the most advanced XDR/EDR solution for endpoint security protection and threat forensic investigation. It has built-in sandbox for behavior analysis, patent pending ransomware detec

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Small-Business
    • 20% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TXHunter features and usability ratings that predict user satisfaction
    10.0
    Ease of Admin
    Average: 8.8
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    10.0
    Quality of Support
    Average: 8.7
    10.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TriagingX
    Year Founded
    2016
    HQ Location
    San Jose, California
    Twitter
    @triagingx
    20 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TXHunter is one of the most advanced XDR/EDR solution for endpoint security protection and threat forensic investigation. It has built-in sandbox for behavior analysis, patent pending ransomware detec

Users
No information available
Industries
No information available
Market Segment
  • 40% Small-Business
  • 20% Mid-Market
TXHunter features and usability ratings that predict user satisfaction
10.0
Ease of Admin
Average: 8.8
10.0
Has the product been a good partner in doing business?
Average: 9.1
10.0
Quality of Support
Average: 8.7
10.0
Ease of Use
Average: 8.7
Seller Details
Seller
TriagingX
Year Founded
2016
HQ Location
San Jose, California
Twitter
@triagingx
20 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WithSecure Elements XDR is a unified solution, designed to protect modern IT estates. It minimizes the impact of attacks by using automated and advanced preventative controls that keep incident volume

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • WithSecure Elements XDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    Ease of Use
    1
    Efficiency
    1
    Investigation
    1
    Platform Compatibility
    1
    Cons
    False Positives
    1
    Not User-Friendly
    1
    Poor Navigation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WithSecure Elements XDR features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.8
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    9.4
    Quality of Support
    Average: 8.7
    9.4
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    68,923 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,718 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

WithSecure Elements XDR is a unified solution, designed to protect modern IT estates. It minimizes the impact of attacks by using automated and advanced preventative controls that keep incident volume

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
WithSecure Elements XDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
Ease of Use
1
Efficiency
1
Investigation
1
Platform Compatibility
1
Cons
False Positives
1
Not User-Friendly
1
Poor Navigation
1
WithSecure Elements XDR features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.8
10.0
Has the product been a good partner in doing business?
Average: 9.1
9.4
Quality of Support
Average: 8.7
9.4
Ease of Use
Average: 8.7
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
68,923 Twitter followers
LinkedIn® Page
www.linkedin.com
1,718 employees on LinkedIn®
Ownership
FSOYF
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CySight’s revolutionary Actionable Intelligence, trusted by Fortune 500 globally, enables organizations with the most cost-effective and secure way to tackle the increasing density, complexity, and ex

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CySight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Analysis
    1
    Comprehensive Monitoring
    1
    Detailed Analysis
    1
    Monitoring
    1
    Reliability
    1
    Cons
    Alerting Issues
    1
    Alert Issues
    1
    Configuration Issues
    1
    Connection Issues
    1
    Inadequate Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CySight features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    6.7
    Quality of Support
    Average: 8.7
    10.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    Raanana, IL
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CySight’s revolutionary Actionable Intelligence, trusted by Fortune 500 globally, enables organizations with the most cost-effective and secure way to tackle the increasing density, complexity, and ex

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
CySight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Analysis
1
Comprehensive Monitoring
1
Detailed Analysis
1
Monitoring
1
Reliability
1
Cons
Alerting Issues
1
Alert Issues
1
Configuration Issues
1
Connection Issues
1
Inadequate Reporting
1
CySight features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
6.7
Quality of Support
Average: 8.7
10.0
Ease of Use
Average: 8.7
Seller Details
Year Founded
2023
HQ Location
Raanana, IL
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Instinct is the only preemptive data security solution that PREVENTS >99% of UNKNOWN and ZERO-DAY threats, including ransomware and AI generated malware before they breach your environment, wh

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deep Instinct Data Security X features and usability ratings that predict user satisfaction
    10.0
    Ease of Admin
    Average: 8.8
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Quality of Support
    Average: 8.7
    9.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    New York, NY
    Twitter
    @DeepInstinctSec
    8,922 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    274 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Instinct is the only preemptive data security solution that PREVENTS >99% of UNKNOWN and ZERO-DAY threats, including ransomware and AI generated malware before they breach your environment, wh

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Deep Instinct Data Security X features and usability ratings that predict user satisfaction
10.0
Ease of Admin
Average: 8.8
10.0
Has the product been a good partner in doing business?
Average: 9.1
9.2
Quality of Support
Average: 8.7
9.2
Ease of Use
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
New York, NY
Twitter
@DeepInstinctSec
8,922 Twitter followers
LinkedIn® Page
www.linkedin.com
274 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Customer-inspired, future-ready technology goes into every PowerEdge server, offering exceptional performance for small-business offices to enterprise hyperscale environments.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dell Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Quality of Support
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1984
    HQ Location
    Round Rock, TX
    Twitter
    @Dell
    814,549 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    130,399 employees on LinkedIn®
    Ownership
    NYSE: DELL
Product Description
How are these determined?Information
This description is provided by the seller.

Customer-inspired, future-ready technology goes into every PowerEdge server, offering exceptional performance for small-business offices to enterprise hyperscale environments.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Dell Security features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Has the product been a good partner in doing business?
Average: 9.1
8.3
Quality of Support
Average: 8.7
0.0
No information available
Seller Details
Year Founded
1984
HQ Location
Round Rock, TX
Twitter
@Dell
814,549 Twitter followers
LinkedIn® Page
www.linkedin.com
130,399 employees on LinkedIn®
Ownership
NYSE: DELL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ​Gradient Cyber’s Managed Extended Detection and Response (MXDR) service offers mid-market organizations comprehensive, 24/7/365 protection across their entire IT environment, including networks, endp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Gradient Cyber Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Continuous Monitoring
    1
    Customer Support
    1
    Customization
    1
    Dashboard Customization
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gradient Cyber features and usability ratings that predict user satisfaction
    10.0
    Ease of Admin
    Average: 8.8
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    10.0
    Quality of Support
    Average: 8.7
    9.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Southlake, Texas
    Twitter
    @GradientCyber
    122 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

​Gradient Cyber’s Managed Extended Detection and Response (MXDR) service offers mid-market organizations comprehensive, 24/7/365 protection across their entire IT environment, including networks, endp

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Enterprise
Gradient Cyber Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Continuous Monitoring
1
Customer Support
1
Customization
1
Dashboard Customization
1
Cons
This product has not yet received any negative sentiments.
Gradient Cyber features and usability ratings that predict user satisfaction
10.0
Ease of Admin
Average: 8.8
10.0
Has the product been a good partner in doing business?
Average: 9.1
10.0
Quality of Support
Average: 8.7
9.2
Ease of Use
Average: 8.7
Seller Details
Year Founded
2017
HQ Location
Southlake, Texas
Twitter
@GradientCyber
122 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SNOW is an endpoint detection/response solution in the form of a lightweight cross platform sensor. Operating on a host based managed system, it proactively searches through networks 24/7 to provide t

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Arcadia SNOW Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Arcadia SNOW features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    5.0
    Quality of Support
    Average: 8.7
    5.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @ARC4DIA
    1,165 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SNOW is an endpoint detection/response solution in the form of a lightweight cross platform sensor. Operating on a host based managed system, it proactively searches through networks 24/7 to provide t

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Arcadia SNOW Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Learning Curve
1
Arcadia SNOW features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
5.0
Quality of Support
Average: 8.7
5.0
Ease of Use
Average: 8.7
Seller Details
Twitter
@ARC4DIA
1,165 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ConnectWise Endpoint Detection & Response (EDR) Detect and contain threats to critical business assets

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ConnectWise Cybersecurity Management - Endpoint features and usability ratings that predict user satisfaction
    10.0
    Ease of Admin
    Average: 8.8
    0.0
    No information available
    10.0
    Quality of Support
    Average: 8.7
    10.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1982
    HQ Location
    Tampa, FL
    Twitter
    @ConnectWise
    14,998 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,224 employees on LinkedIn®
    Phone
    800-671-6898
Product Description
How are these determined?Information
This description is provided by the seller.

ConnectWise Endpoint Detection & Response (EDR) Detect and contain threats to critical business assets

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Enterprise
ConnectWise Cybersecurity Management - Endpoint features and usability ratings that predict user satisfaction
10.0
Ease of Admin
Average: 8.8
0.0
No information available
10.0
Quality of Support
Average: 8.7
10.0
Ease of Use
Average: 8.7
Seller Details
Year Founded
1982
HQ Location
Tampa, FL
Twitter
@ConnectWise
14,998 Twitter followers
LinkedIn® Page
www.linkedin.com
3,224 employees on LinkedIn®
Phone
800-671-6898
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing pre

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ConnectWise Cybersecurity Management – Network features and usability ratings that predict user satisfaction
    10.0
    Ease of Admin
    Average: 8.8
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    6.7
    Quality of Support
    Average: 8.7
    6.7
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1982
    HQ Location
    Tampa, FL
    Twitter
    @ConnectWise
    14,998 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,224 employees on LinkedIn®
    Phone
    800-671-6898
Product Description
How are these determined?Information
This description is provided by the seller.

IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing pre

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ConnectWise Cybersecurity Management – Network features and usability ratings that predict user satisfaction
10.0
Ease of Admin
Average: 8.8
10.0
Has the product been a good partner in doing business?
Average: 9.1
6.7
Quality of Support
Average: 8.7
6.7
Ease of Use
Average: 8.7
Seller Details
Year Founded
1982
HQ Location
Tampa, FL
Twitter
@ConnectWise
14,998 Twitter followers
LinkedIn® Page
www.linkedin.com
3,224 employees on LinkedIn®
Phone
800-671-6898
(10)4.4 out of 5
View top Consulting Services for Elastic Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Process Any Data, From Any Source. Centralize data processing of all types. Normalize varying schema and formats. Quickly extend to custom log formats. Easily add plugins for custom data sources

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 90% Small-Business
    • 70% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Elastic Security features and usability ratings that predict user satisfaction
    7.9
    Ease of Admin
    Average: 8.8
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Quality of Support
    Average: 8.7
    8.8
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Elastic
    Year Founded
    2012
    HQ Location
    Mountain View, CA
    Twitter
    @elastic
    63,875 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,436 employees on LinkedIn®
    Ownership
    NYSE: ESTC
Product Description
How are these determined?Information
This description is provided by the seller.

Process Any Data, From Any Source. Centralize data processing of all types. Normalize varying schema and formats. Quickly extend to custom log formats. Easily add plugins for custom data sources

Users
No information available
Industries
No information available
Market Segment
  • 90% Small-Business
  • 70% Enterprise
Elastic Security features and usability ratings that predict user satisfaction
7.9
Ease of Admin
Average: 8.8
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.2
Quality of Support
Average: 8.7
8.8
Ease of Use
Average: 8.7
Seller Details
Seller
Elastic
Year Founded
2012
HQ Location
Mountain View, CA
Twitter
@elastic
63,875 Twitter followers
LinkedIn® Page
www.linkedin.com
4,436 employees on LinkedIn®
Ownership
NYSE: ESTC
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    G Data Endpoint Protection helps protect clients directly from threats and exploiting vulnerabilities, including proactive protection against malware, including an effective client firewall and effici

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • G Data Endpoint Protection features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1985
    HQ Location
    Bochum, DE
    Twitter
    @GDataSoftwareAG
    14 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    116 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

G Data Endpoint Protection helps protect clients directly from threats and exploiting vulnerabilities, including proactive protection against malware, including an effective client firewall and effici

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
G Data Endpoint Protection features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1985
HQ Location
Bochum, DE
Twitter
@GDataSoftwareAG
14 Twitter followers
LinkedIn® Page
www.linkedin.com
116 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GFI EndPointSecurity could save your business. It gives you control of all your portable devices from one central control panel. Data theft is prevented, and harmful new software and files are blocked

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GFI EndPointSecurity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    6.7
    Quality of Support
    Average: 8.7
    5.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1992
    HQ Location
    Austin, US
    Twitter
    @GFISoftware
    30,010 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GFI EndPointSecurity could save your business. It gives you control of all your portable devices from one central control panel. Data theft is prevented, and harmful new software and files are blocked

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
GFI EndPointSecurity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
6.7
Quality of Support
Average: 8.7
5.0
Ease of Use
Average: 8.7
Seller Details
Year Founded
1992
HQ Location
Austin, US
Twitter
@GFISoftware
30,010 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Virsec provides Zero Trust cybersecurity for legacy and modern workloads with the Virsec Security Platform (VSP). Using a default-deny, allow-on-trust security compensating control, VSP protects appli

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 50% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Virsec Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Setup
    1
    Protection
    1
    Response Time
    1
    Cons
    Learning Curve
    1
    Time-Consumption
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Virsec Security Platform features and usability ratings that predict user satisfaction
    7.5
    Ease of Admin
    Average: 8.8
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Quality of Support
    Average: 8.7
    6.7
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Virsec provides Zero Trust cybersecurity for legacy and modern workloads with the Virsec Security Platform (VSP). Using a default-deny, allow-on-trust security compensating control, VSP protects appli

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 50% Enterprise
Virsec Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Setup
1
Protection
1
Response Time
1
Cons
Learning Curve
1
Time-Consumption
1
Update Issues
1
Virsec Security Platform features and usability ratings that predict user satisfaction
7.5
Ease of Admin
Average: 8.8
8.3
Has the product been a good partner in doing business?
Average: 9.1
9.2
Quality of Support
Average: 8.7
6.7
Ease of Use
Average: 8.7
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AhnLab EDR delivers robust threat detection, investigation, response, and hunting at the endpoint level to help users stay on top of advanced cyber threats. Why AhnLab EDR • Detection and Analysis

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AhnLab EDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AhnLab
    Year Founded
    1995
    HQ Location
    Gyeonggi-do, South Korea
    Twitter
    @AhnLab_man
    14,871 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    295 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AhnLab EDR delivers robust threat detection, investigation, response, and hunting at the endpoint level to help users stay on top of advanced cyber threats. Why AhnLab EDR • Detection and Analysis

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AhnLab EDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AhnLab
Year Founded
1995
HQ Location
Gyeonggi-do, South Korea
Twitter
@AhnLab_man
14,871 Twitter followers
LinkedIn® Page
www.linkedin.com
295 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Today’s cyber attacks are automated and sophisticated. You need to fight them with more than just a cheap antivirus program. Alexio goes way beyond antivirus, monitoring, and security maintenance. Ale

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Alexio Defender features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Alexio
    HQ Location
    Markham, ON
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Today’s cyber attacks are automated and sophisticated. You need to fight them with more than just a cheap antivirus program. Alexio goes way beyond antivirus, monitoring, and security maintenance. Ale

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Alexio Defender features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Alexio
HQ Location
Markham, ON
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    "Managing cyber risk can be a daunting task for security professionals. It can be a total guessing game when it comes to whether your security environment meets insurance carrier requirements. Do you

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Antigen Security Titan Defense features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @antigensecurity
    47 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

"Managing cyber risk can be a daunting task for security professionals. It can be a total guessing game when it comes to whether your security environment meets insurance carrier requirements. Do you

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Antigen Security Titan Defense features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@antigensecurity
47 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Harness a combination of superior threat detection and force multiplier of 24/7 security experts for complete cyberattack protection. Binary Defense MDR is proprietary platform combined with 24/7 mo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Binary Defense features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    5.0
    Quality of Support
    Average: 8.7
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Stow, US
    Twitter
    @Binary_Defense
    13,194 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    201 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Harness a combination of superior threat detection and force multiplier of 24/7 security experts for complete cyberattack protection. Binary Defense MDR is proprietary platform combined with 24/7 mo

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Binary Defense features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
5.0
Quality of Support
Average: 8.7
8.3
Ease of Use
Average: 8.7
Seller Details
HQ Location
Stow, US
Twitter
@Binary_Defense
13,194 Twitter followers
LinkedIn® Page
www.linkedin.com
201 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BluVector Pulse delivers a fully turnkey sense and respond platform, automating the health and heartbeat monitoring and device management of the market-leading BluVector Cortex offering.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BluVector Pulse features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BluVector
    Year Founded
    1994
    HQ Location
    Littleton, Colorado, United States
    Twitter
    @BluVector
    694 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    614 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BluVector Pulse delivers a fully turnkey sense and respond platform, automating the health and heartbeat monitoring and device management of the market-leading BluVector Cortex offering.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BluVector Pulse features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
BluVector
Year Founded
1994
HQ Location
Littleton, Colorado, United States
Twitter
@BluVector
694 Twitter followers
LinkedIn® Page
www.linkedin.com
614 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CISS Forza Client protects Laptops, Desktops, Servers and Smart Phones of enterprise customers against cybersecurity threats and exploits.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CISS Forza features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    HERTFORDSHIRE, GB
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CISS Forza Client protects Laptops, Desktops, Servers and Smart Phones of enterprise customers against cybersecurity threats and exploits.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CISS Forza features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
HERTFORDSHIRE, GB
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cybervault features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    cyberx
    LinkedIn® Page
    www.linkedin.com
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
cybervault features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
cyberx
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    EDR + XDR Management platform + SaaS Service MailSecure

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyFox XDR Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyFox
    Year Founded
    2020
    HQ Location
    Tel-Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

EDR + XDR Management platform + SaaS Service MailSecure

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CyFox XDR Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CyFox
Year Founded
2020
HQ Location
Tel-Aviv, IL
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    EclecticIQ Platform re-imagines intelligence, hunting and response, by delivering intelligence-led solutions to Threat Intelligence, Endpoint Security and Security Operations challenges.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EclecticIQ Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    Twitter
    @EclecticIQ
    3,005 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

EclecticIQ Platform re-imagines intelligence, hunting and response, by delivering intelligence-led solutions to Threat Intelligence, Endpoint Security and Security Operations challenges.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
EclecticIQ Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
Twitter
@EclecticIQ
3,005 Twitter followers
LinkedIn® Page
www.linkedin.com
78 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hacker Combat (HC) Endpoint security software, a Free EDR tool that allows organizations to detect and respond to cyber threats quickly and effectively. Every cyber security expert and every size of o

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Endpoint Detection and Response features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    New Jersey , US
    Twitter
    @Hacker_Combat
    6,576 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    729 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hacker Combat (HC) Endpoint security software, a Free EDR tool that allows organizations to detect and respond to cyber threats quickly and effectively. Every cyber security expert and every size of o

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Endpoint Detection and Response features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
New Jersey , US
Twitter
@Hacker_Combat
6,576 Twitter followers
LinkedIn® Page
www.linkedin.com
729 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GFI EndPointSecurity could save your business. It gives you control of all your portable devices from one central control panel. Data theft is prevented, and harmful new software and files are blocked

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GFI EndPointSecurity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1992
    HQ Location
    Austin, US
    Twitter
    @GFISoftware
    30,010 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GFI EndPointSecurity could save your business. It gives you control of all your portable devices from one central control panel. Data theft is prevented, and harmful new software and files are blocked

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
GFI EndPointSecurity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1992
HQ Location
Austin, US
Twitter
@GFISoftware
30,010 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    While GoSecure Professional Security Services focuses on finding the problems, GoSecure Titan® Managed Security Services make sure to solve them – making GoSecure your ally to consolidate, evolve &

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GoSecure Titan Managed Security Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    3.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    San Diego, CA
    Twitter
    @GoSecure_Inc
    2,780 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    102 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

While GoSecure Professional Security Services focuses on finding the problems, GoSecure Titan® Managed Security Services make sure to solve them – making GoSecure your ally to consolidate, evolve &

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
GoSecure Titan Managed Security Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
3.3
Ease of Use
Average: 8.7
Seller Details
Company Website
Year Founded
2002
HQ Location
San Diego, CA
Twitter
@GoSecure_Inc
2,780 Twitter followers
LinkedIn® Page
www.linkedin.com
102 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HarfangLab is an EDR (Endpoint Detection and Response) software editor. It is a a technology that allows to anticipate and neutralize modern and unknown cyberattacks on computers and servers. Harfan

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HarfangLab EDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    LinkedIn® Page
    www.linkedin.com
    120 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HarfangLab is an EDR (Endpoint Detection and Response) software editor. It is a a technology that allows to anticipate and neutralize modern and unknown cyberattacks on computers and servers. Harfan

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
HarfangLab EDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
LinkedIn® Page
www.linkedin.com
120 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    i24R Protects from Ransomware. i24R shield protects confidential files from unauthorized users.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • i24R features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Seoul, KR
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

i24R Protects from Ransomware. i24R shield protects confidential files from unauthorized users.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
i24R features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2009
HQ Location
Seoul, KR
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security Trusteer Rapport features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
IBM Security Trusteer Rapport features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Endpoint Detection & Response solution based on artificial intelligence

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • i-Guard features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    i-Guard
    Year Founded
    2014
    HQ Location
    Paris, FR
    Twitter
    @iGuard_france
    74 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Endpoint Detection & Response solution based on artificial intelligence

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
i-Guard features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
i-Guard
Year Founded
2014
HQ Location
Paris, FR
Twitter
@iGuard_france
74 Twitter followers
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Impulse is a fully automated host & network intrusion detection platform. It detects malware from behavioural patterns rather than signatures and enables deeper visibility than legacy tools.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Impulse XDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Impulse is a fully automated host & network intrusion detection platform. It detects malware from behavioural patterns rather than signatures and enables deeper visibility than legacy tools.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Impulse XDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Infocyte's Managed Detection and Response services (available to partners and customers subscribed to our Command-level subscription) supplement and support your in-house security team with Infocyte-s

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Infocyte features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,018 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Infocyte's Managed Detection and Response services (available to partners and customers subscribed to our Command-level subscription) supplement and support your in-house security team with Infocyte-s

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Infocyte features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Kaseya
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,550 Twitter followers
LinkedIn® Page
www.linkedin.com
5,018 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    KF Web Server is a free HTTP Server that can host a number of web sites.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KeyFocus Web Server features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    KeyFocus
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

KF Web Server is a free HTTP Server that can host a number of web sites.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
KeyFocus Web Server features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
KeyFocus
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Matrix42, the leading provider of workspace management solutions, has entered into a strategic partnership with enSilo and now offers the innovative security company's products exclusively in Central

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Matrix42 Automated Endpoint Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Matrix42
    Year Founded
    1992
    HQ Location
    Frankfurt, Germany
    Twitter
    @Matrix42_global
    1,110 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    632 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Matrix42, the leading provider of workspace management solutions, has entered into a strategic partnership with enSilo and now offers the innovative security company's products exclusively in Central

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Matrix42 Automated Endpoint Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Matrix42
Year Founded
1992
HQ Location
Frankfurt, Germany
Twitter
@Matrix42_global
1,110 Twitter followers
LinkedIn® Page
www.linkedin.com
632 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Metapacket is a proxy platform that detects & prevents malwares from exfiltration, rendering malware useless.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MetaPacket features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Metapacket is a proxy platform that detects & prevents malwares from exfiltration, rendering malware useless.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
MetaPacket features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MicroWorld EDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    Mumbai, Maharashtra
    Twitter
    @eScanAV
    52 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    193 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
MicroWorld EDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1993
HQ Location
Mumbai, Maharashtra
Twitter
@eScanAV
52 Twitter followers
LinkedIn® Page
www.linkedin.com
193 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Whether in DETECT or PREVENT mode, managed by us or you, the Nyotron War Room provides you in-depth details about an attack as it happens: where the attack is happening, if it is spreading to other en

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nyotron War Room features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Nyotron
    HQ Location
    Santa Clara, CA
    Twitter
    @Nyotron
    513 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Whether in DETECT or PREVENT mode, managed by us or you, the Nyotron War Room provides you in-depth details about an attack as it happens: where the attack is happening, if it is spreading to other en

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Nyotron War Room features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Nyotron
HQ Location
Santa Clara, CA
Twitter
@Nyotron
513 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acting as your last line of defense, PARANOID protects against threats that bypass your perimeter and endpoint security layers.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PARANOID features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Nyotron
    HQ Location
    Santa Clara, CA
    Twitter
    @Nyotron
    513 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acting as your last line of defense, PARANOID protects against threats that bypass your perimeter and endpoint security layers.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
PARANOID features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Nyotron
HQ Location
Santa Clara, CA
Twitter
@Nyotron
513 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Promisec Integrity offers customers the same nimble agentless functionality as our on-premise solution, but through a browser interface to enable antivirus validation, unauthorized software discovery,

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Promisec Integrity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Promisec
    Year Founded
    2004
    HQ Location
    Tel Aviv, IL
    Twitter
    @Promisec_IT
    3,629 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Promisec Integrity offers customers the same nimble agentless functionality as our on-premise solution, but through a browser interface to enable antivirus validation, unauthorized software discovery,

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Promisec Integrity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Promisec
Year Founded
2004
HQ Location
Tel Aviv, IL
Twitter
@Promisec_IT
3,629 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Prospero.Live is a SaaS pair programming platform featuring a code editor, shared cloud filesystem, video calling, screen sharing, whiteboard, and code runners. It is designed for a super quick collab

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prospero.Live features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Prospero.Live is a SaaS pair programming platform featuring a code editor, shared cloud filesystem, video calling, screen sharing, whiteboard, and code runners. It is designed for a super quick collab

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Prospero.Live features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Resecurity Digital Risk Monitoring Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Resecurity Digital Risk Monitoring Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RevBits Endpoint Security blocks the most sophisticated attacks. RevBits Endpoint Security is the only solution available that conducts a three-phase analysis of threats. The feature-rich and comprehe

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Revbits Endpoint Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Mineola, US
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RevBits Endpoint Security blocks the most sophisticated attacks. RevBits Endpoint Security is the only solution available that conducts a three-phase analysis of threats. The feature-rich and comprehe

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Revbits Endpoint Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Mineola, US
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    R-Scope puts networks under a microscope so that customers can respond to both known and zero-day attacks before they become crises.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • R-Scope Advanced Threat Detection features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1990
    HQ Location
    New York, US
    Twitter
    @Reservoir_Labs
    243 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

R-Scope puts networks under a microscope so that customers can respond to both known and zero-day attacks before they become crises.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
R-Scope Advanced Threat Detection features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1990
HQ Location
New York, US
Twitter
@Reservoir_Labs
243 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sangfor Endpoint Secure provides a holistic response to malware infections and APT breaches across the entire organization's network, with ease of management, operation, and maintenance. The solution

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sangfor Endpoint Secure features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    Shenzhen, China
    Twitter
    @SANGFOR
    13,378 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sangfor Endpoint Secure provides a holistic response to malware infections and APT breaches across the entire organization's network, with ease of management, operation, and maintenance. The solution

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Sangfor Endpoint Secure features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
Shenzhen, China
Twitter
@SANGFOR
13,378 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecBI is a leading provider of Universal XDR (Extended Detection and Response) solutions that allow organizations to transform traditionally siloed security functions into a unified, automated, and hi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecBI XDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Implementation
    1
    Implementation Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecBI XDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Quality of Support
    Average: 8.7
    10.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SecBI
    Year Founded
    2001
    HQ Location
    Copenhagen, Capital Region of Denmark, Denmark
    LinkedIn® Page
    www.linkedin.com
    266 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecBI is a leading provider of Universal XDR (Extended Detection and Response) solutions that allow organizations to transform traditionally siloed security functions into a unified, automated, and hi

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
SecBI XDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Implementation
1
Implementation Ease
1
Cons
This product has not yet received any negative sentiments.
SecBI XDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Quality of Support
Average: 8.7
10.0
Ease of Use
Average: 8.7
Seller Details
Seller
SecBI
Year Founded
2001
HQ Location
Copenhagen, Capital Region of Denmark, Denmark
LinkedIn® Page
www.linkedin.com
266 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sequreteks EDPR helps organizations to Detect, Protect and Respond against zero-day threats, advanced persistent threats, ransomware attacks and other malware. EDPR is the first product in the industr

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sequretek EDPR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Woodbridge, US
    LinkedIn® Page
    www.linkedin.com
    396 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sequreteks EDPR helps organizations to Detect, Protect and Respond against zero-day threats, advanced persistent threats, ransomware attacks and other malware. EDPR is the first product in the industr

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Sequretek EDPR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Woodbridge, US
LinkedIn® Page
www.linkedin.com
396 employees on LinkedIn®

Learn More About Endpoint Detection & Response (EDR) Software

What is endpoint detection and response (EDR) software?

EDR software is used to help companies identify and remediate threats related to network-connected endpoints. EDR solutions inform security professionals of vulnerable or infected endpoints and guide them through the remediation process. After incidents have been resolved, EDR tools help teams investigate issues and the vulnerable components that allow an endpoint to become compromised.

Continuous monitoring is one of the core capabilities of endpoint detection technologies. These monitoring features provide complete and continuous visibility across a company’s network-connected endpoints. Individuals can monitor behaviors, vulnerabilities, and activity for abnormalities. When abnormalities are identified, the detection portion of EDR technology transitions to the response portion.

Endpoint response begins with alerting and containment. Security professionals are alerted of threats present to their systems and isolate potentially compromised endpoints from further network access; this helps prevent one infected endpoint from becoming hundreds. Once systems are properly organized to contain malware and threat actors, security teams can work to remove malware and prevent future access from actors to endpoint devices.

EDR platforms store threat data related to security incidents, improving a team's ability to defend against threats in the future by helping them identify root causes and threat actors. Additionally, zero-day exploits may be identified, and other vulnerabilities may be remediated as a result. This will help prevent third-party privilege escalation, malware injection, and unapproved endpoint control from occurring in the future. Some EDR products provide machine learning capabilities to analyze events, improve threat hunting, and reduce false positives by automating protection and remediation processes.

Key benefits of EDR software

  • Monitor endpoints and detect issues or security incidents
  • Remediate present threats to endpoints
  • Investigate incidents to identify causes
  • Contain threats and restrict access to other endpoints or networks

Why use endpoint detection and response solutions?

Endpoints are some of the most vulnerable components of a business' network structure. One vulnerable endpoint could cause a company’s entire network, databases, and sensitive information to become exposed or stolen. EDR systems will help secure individual endpoints, detect issues as they arise, and contain threats that make their way beyond traditional security structures.

Endpoint protection is even more relevant considering the growing popularity of bring-your-own-device (BYOD) policies. When employees are in complete control over downloads, applications, and updates, security must be a priority. Every day professionals are not the most security-savvy individuals and may unintentionally compromise their devices or put business information at risk.

Zero-day threats—While traditional prevention tools such as antivirus software or firewall technology are helpful as the first line of defense, zero-day threats are bound to occur. The nature of these threats means they have yet to be discovered and, therefore, cannot be defended against. EDR solutions will help identify new threats as they arise and remediate them before damage occurs.

Visibility and control—Continuous monitoring and endpoint visibility help defend against traditional malware and sophisticated threats. Monitoring can help identify known threats as they arise and detect minute details that indicate the presence of advanced threats. Hackers are always developing new ways to enter networks undetected through fileless malware or malicious code injection. Monitoring capabilities will improve a team’s ability to detect anomalies caused by outside actors and threats.

Analysis and deterrence — EDR software improves a security organization’s ability to review the data associated with security events, data breaches, and network attacks. The data collected from these events can be reviewed back to the initial onset and used to identify the vulnerability or exploit used. Once identified, security teams and software developers can work collectively to resolve flaws and prevent similar attacks from occurring in the future.

What are the common features of EDR products?

Detection—Detection capabilities result from monitoring practices. Monitoring collects information about properly functioning systems and can be applied to identify abnormal behavior or functionality. Once identified, IT and security professionals are alerted and directed through the review and resolution processes.

Containment — Once threats are present within an endpoint device, access must be restricted from the greater network and additional endpoints. Often referred to as quarantine features, these capabilities can help protect a network when a threat is detected.

Remediation—As threats are discovered, they must be dealt with. EDR software allows individuals and security teams to track incidents back to their onset and identify suspicious actors or malware.

Investigation—After incidents occur, EDR tools collect large amounts of data associated with the endpoint device and provide a historical record of activities. This information can be used to quickly identify the cause of an incident and prevent its reoccurrence in the future.

Additional EDR features

Behavioral analysis—Behavior analysis capabilities allow administrators to gain valuable insights into end-user behavior. This data can be used as a reference for monitoring features to compare against and detect anomalies.

Real-time monitoring — Real-time and continuous monitoring capabilities allow security professionals to constantly monitor systems and detect anomalies in real time.

Threat data documentation— Event data recording capabilities automate the collection and curation of incident data. This information can alert security teams of the performance and health of a company's endpoint-enabled devices.

Data exploration — Data exploration features allow security teams to review data associated with security incidents. These data points can be cross-referenced and analyzed to provide insights on better protecting endpoints in the future.

Potential issues with EDR solutions

Endpoint variety—Endpoints come in many shapes and sizes, from laptops and servers to tablets and smartphones. A business should ensure that all types of endpoints connected to its network are compatible with a chosen EDR solution. This is especially important for businesses with a large number of BYOD devices that run different operating systems and applications.

Scalability — Scale refers to the size and scope of your network of connected endpoints. It’s a major consideration because some EDR tools may only facilitate monitoring on a specific number of devices or limit the number of concurrent investigations or remediations. Companies with large pools of endpoints should be sure the solutions they consider can handle the number of endpoints and provide adequate monitoring for the scale of their business and projected growth.

Efficacy — Efficacy refers to the actual functional benefit of using a software solution. Companies may be wasting their time if security teams are inundated with false positives or conflicting results. This is a key identifier in user reviews and third-party evaluations that buyers should consider when evaluating a product.

Administration and Management — Companies adopting EDR for the first time should be sure they have sufficient staff equipped with skills relevant to using EDR software. Smaller, growing businesses may not be best suited for adopting complex security systems and may be better served using managed services until the need for security matches their ability to deliver.