Introducing G2.ai, the future of software buying.Try now

Top Free Endpoint Detection & Response (EDR) Software

Check out our list of free Endpoint Detection & Response (EDR) Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Endpoint Detection & Response (EDR) Software to ensure you get the right product.

View Free Endpoint Detection & Response (EDR) Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
32 Endpoint Detection & Response (EDR) Products Available
(749)4.9 out of 5
Optimized for quick response
2nd Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Huntress is a comprehensive cybersecurity solution designed specifically for the Fortune 5,000,000 and the managed service providers (MSPs) that support them. This platform combines advanced technolog

    Users
    • Owner
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 81% Small-Business
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntress Managed EDR features and usability ratings that predict user satisfaction
    9.6
    Ease of Admin
    Average: 8.8
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.7
    Quality of Support
    Average: 8.7
    9.5
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • MB
    EDR was an easy sell to my clients as more often then not, all we had to do was deploy a trial and almost immediately EDR detected threats that the... Read review
    David M.
    DM
    Huntress has taken the stress out of managing a client antivirus solution. Through real world protections we have full trust in the EDR platform.... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Ellicott City, US
    Twitter
    @HuntressLabs
    35,762 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    603 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Huntress is a comprehensive cybersecurity solution designed specifically for the Fortune 5,000,000 and the managed service providers (MSPs) that support them. This platform combines advanced technolog

Users
  • Owner
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 81% Small-Business
  • 17% Mid-Market
Huntress Managed EDR features and usability ratings that predict user satisfaction
9.6
Ease of Admin
Average: 8.8
9.7
Has the product been a good partner in doing business?
Average: 9.1
9.7
Quality of Support
Average: 8.7
9.5
Ease of Use
Average: 8.7
MB
EDR was an easy sell to my clients as more often then not, all we had to do was deploy a trial and almost immediately EDR detected threats that the... Read review
David M.
DM
Huntress has taken the stress out of managing a client antivirus solution. Through real world protections we have full trust in the EDR platform.... Read review
Seller Details
Company Website
Year Founded
2015
HQ Location
Ellicott City, US
Twitter
@HuntressLabs
35,762 Twitter followers
LinkedIn® Page
www.linkedin.com
603 employees on LinkedIn®
(1,039)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – with one agent and one console -- t

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatDown features and usability ratings that predict user satisfaction
    9.1
    Ease of Admin
    Average: 8.8
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Quality of Support
    Average: 8.7
    9.3
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Roberto B.
    RB
    The product do not effect much the performance of the PC, and it worked fine blocking alle the tread whit very litle false positive. Support is... Read review
    Peter Z.
    PZ
    Awesome security software. used free one for 20 years. Recently got it for our organization, and couldn't be more happier. It has great protection,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Santa Clara, CA
    Twitter
    @Malwarebytes
    81,803 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    678 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – with one agent and one console -- t

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Small-Business
  • 41% Mid-Market
ThreatDown features and usability ratings that predict user satisfaction
9.1
Ease of Admin
Average: 8.8
9.1
Has the product been a good partner in doing business?
Average: 9.1
8.8
Quality of Support
Average: 8.7
9.3
Ease of Use
Average: 8.7
Roberto B.
RB
The product do not effect much the performance of the PC, and it worked fine blocking alle the tread whit very litle false positive. Support is... Read review
Peter Z.
PZ
Awesome security software. used free one for 20 years. Recently got it for our organization, and couldn't be more happier. It has great protection,... Read review
Seller Details
Company Website
Year Founded
2008
HQ Location
Santa Clara, CA
Twitter
@Malwarebytes
81,803 Twitter followers
LinkedIn® Page
www.linkedin.com
678 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(461)4.6 out of 5
Optimized for quick response
1st Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Sophos Endpoint
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware

    Users
    • IT Manager
    • IT Director
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Mid-Market
    • 21% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sophos Endpoint features and usability ratings that predict user satisfaction
    9.3
    Ease of Admin
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    8.7
    Quality of Support
    Average: 8.7
    9.2
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • FS
    We are very satisfied with the product. The overall package compared to the price is coherent. The administration, especially in our environment,... Read review
    ZS
    What I love most about Sophos Intercept X is its next-generation approach to endpoint security. With advanced threat detection powered by deep... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Company Website
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,926 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware

Users
  • IT Manager
  • IT Director
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Mid-Market
  • 21% Enterprise
Sophos Endpoint features and usability ratings that predict user satisfaction
9.3
Ease of Admin
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 9.1
8.7
Quality of Support
Average: 8.7
9.2
Ease of Use
Average: 8.7
FS
We are very satisfied with the product. The overall package compared to the price is coherent. The administration, especially in our environment,... Read review
ZS
What I love most about Sophos Intercept X is its next-generation approach to endpoint security. With advanced threat detection powered by deep... Read review
Seller Details
Seller
Sophos
Company Website
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,757 Twitter followers
LinkedIn® Page
www.linkedin.com
4,926 employees on LinkedIn®
(866)4.6 out of 5
Optimized for quick response
7th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for ESET PROTECT
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 44% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.5
    Ease of Admin
    Average: 8.8
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Quality of Support
    Average: 8.7
    8.9
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • GI
    Esect protect offers a cloud console to manage all of protection of endpoint, offers different license to protect device like EDR or only AV solution Read review
    IA
    ESET Protect is the simplest and most secure security system I've ever used. It's features like. - ESET Password Manager, securely storing... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    286,399 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,870 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 44% Mid-Market
ESET PROTECT features and usability ratings that predict user satisfaction
8.5
Ease of Admin
Average: 8.8
8.9
Has the product been a good partner in doing business?
Average: 9.1
8.9
Quality of Support
Average: 8.7
8.9
Ease of Use
Average: 8.7
GI
Esect protect offers a cloud console to manage all of protection of endpoint, offers different license to protect device like EDR or only AV solution Read review
IA
ESET Protect is the simplest and most secure security system I've ever used. It's features like. - ESET Password Manager, securely storing... Read review
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
286,399 Twitter followers
LinkedIn® Page
www.linkedin.com
1,870 employees on LinkedIn®
(297)4.7 out of 5
9th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.0
    Ease of Admin
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Quality of Support
    Average: 8.7
    9.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • RB
    The best i like is it has lightweight agent than other vendor. Easy to use, no difficulties in console. Easy to implementation agent and make... Read review
    Rajat Kumar B.
    RB
    Easy to use console part. easy to implementation policies. customer support get all time. Frequency to use all day. Number of features like... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.0
Ease of Admin
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 9.1
8.9
Quality of Support
Average: 8.7
9.0
Ease of Use
Average: 8.7
RB
The best i like is it has lightweight agent than other vendor. Easy to use, no difficulties in console. Easy to implementation agent and make... Read review
Rajat Kumar B.
RB
Easy to use console part. easy to implementation policies. customer support get all time. Frequency to use all day. Number of features like... Read review
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(515)4.4 out of 5
Optimized for quick response
16th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Built with security in mind, N-central provides the visibility a

    Users
    • Owner
    • Director
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 62% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • N-able N-central features and usability ratings that predict user satisfaction
    7.9
    Ease of Admin
    Average: 8.8
    8.6
    Has the product been a good partner in doing business?
    Average: 9.1
    7.9
    Quality of Support
    Average: 8.7
    7.8
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • DA
    The deep customizability of the platform. The ability to create and run custom scripts, the automation engine, and the deep customizability of the... Read review
    ND
    Easy to work with, is great for managing mobile devices. Its nice that it has a on-premises option. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-able
    Company Website
    HQ Location
    Morrisville, North Carolina
    Twitter
    @Nable
    16,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,892 employees on LinkedIn®
    Ownership
    NYSE: NABL
Product Description
How are these determined?Information
This description is provided by the seller.

Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Built with security in mind, N-central provides the visibility a

Users
  • Owner
  • Director
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 62% Small-Business
  • 33% Mid-Market
N-able N-central features and usability ratings that predict user satisfaction
7.9
Ease of Admin
Average: 8.8
8.6
Has the product been a good partner in doing business?
Average: 9.1
7.9
Quality of Support
Average: 8.7
7.8
Ease of Use
Average: 8.7
DA
The deep customizability of the platform. The ability to create and run custom scripts, the automation engine, and the deep customizability of the... Read review
ND
Easy to work with, is great for managing mobile devices. Its nice that it has a on-premises option. Read review
Seller Details
Seller
N-able
Company Website
HQ Location
Morrisville, North Carolina
Twitter
@Nable
16,217 Twitter followers
LinkedIn® Page
www.linkedin.com
1,892 employees on LinkedIn®
Ownership
NYSE: NABL
(187)4.7 out of 5
Optimized for quick response
12th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for SentinelOne Singularity
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 37% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity features and usability ratings that predict user satisfaction
    9.0
    Ease of Admin
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Quality of Support
    Average: 8.7
    9.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • EC
    Sentinel One provides best endpoint protection and also Sentinel allows the user to revert their machine to the previous version of a certain... Read review
    Henri H.
    HH
    Between the quality of the analyses and the price, it is a good alternative to protect your computer. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 37% Enterprise
SentinelOne Singularity features and usability ratings that predict user satisfaction
9.0
Ease of Admin
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 9.1
8.9
Quality of Support
Average: 8.7
9.0
Ease of Use
Average: 8.7
EC
Sentinel One provides best endpoint protection and also Sentinel allows the user to revert their machine to the previous version of a certain... Read review
Henri H.
HH
Between the quality of the analyses and the price, it is a good alternative to protect your computer. Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
(216)4.7 out of 5
Optimized for quick response
11th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

    Users
    • SOC Analyst
    • Technical Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 59% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
    9.1
    Ease of Admin
    Average: 8.8
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Quality of Support
    Average: 8.7
    9.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer & Network Security
    AC
    This cybersecurity product/platform stands out for its ease of implementation and operation, delivering outcomes as promised by the vendor and... Read review
    SL
    We use this solution in our SOC because tt is easy to implement and integrate with existing security infrastructures, providing real-time... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynet
    Company Website
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @Cynet360
    1,106 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    287 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

Users
  • SOC Analyst
  • Technical Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 59% Mid-Market
  • 33% Small-Business
Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
9.1
Ease of Admin
Average: 8.8
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.2
Quality of Support
Average: 8.7
9.0
Ease of Use
Average: 8.7
Verified User in Computer & Network Security
AC
This cybersecurity product/platform stands out for its ease of implementation and operation, delivering outcomes as promised by the vendor and... Read review
SL
We use this solution in our SOC because tt is easy to implement and integrate with existing security infrastructures, providing real-time... Read review
Seller Details
Seller
Cynet
Company Website
Year Founded
2014
HQ Location
Boston, MA
Twitter
@Cynet360
1,106 Twitter followers
LinkedIn® Page
www.linkedin.com
287 employees on LinkedIn®
(332)4.3 out of 5
Optimized for quick response
10th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    N-able N-sight™ RMM combines remote monitoring and management, remote access, ticketing, and billing capabilities, into one powerful yet easy to use platform that streamlines day-to-operations, combat

    Users
    • Owner
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 78% Small-Business
    • 20% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • N-able N-Sight RMM features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.8
    8.4
    Has the product been a good partner in doing business?
    Average: 9.1
    8.2
    Quality of Support
    Average: 8.7
    8.4
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Joe C.
    JC
    Just taken the initial training for N-Sight EDR and it looks fantastic. Gives everything in one place and allows us to manage multiple customers in... Read review
    RH
    With N-able were able to manage all of our clients from a single dash board, more RMM's offer and many offer additional features at a premium price... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-able
    Company Website
    HQ Location
    Morrisville, North Carolina
    Twitter
    @Nable
    16,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,892 employees on LinkedIn®
    Ownership
    NYSE: NABL
Product Description
How are these determined?Information
This description is provided by the seller.

N-able N-sight™ RMM combines remote monitoring and management, remote access, ticketing, and billing capabilities, into one powerful yet easy to use platform that streamlines day-to-operations, combat

Users
  • Owner
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 78% Small-Business
  • 20% Mid-Market
N-able N-Sight RMM features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.8
8.4
Has the product been a good partner in doing business?
Average: 9.1
8.2
Quality of Support
Average: 8.7
8.4
Ease of Use
Average: 8.7
Joe C.
JC
Just taken the initial training for N-Sight EDR and it looks fantastic. Gives everything in one place and allows us to manage multiple customers in... Read review
RH
With N-able were able to manage all of our clients from a single dash board, more RMM's offer and many offer additional features at a premium price... Read review
Seller Details
Seller
N-able
Company Website
HQ Location
Morrisville, North Carolina
Twitter
@Nable
16,217 Twitter followers
LinkedIn® Page
www.linkedin.com
1,892 employees on LinkedIn®
Ownership
NYSE: NABL
(205)4.7 out of 5
14th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Vision One is a cloud-native security operations platform, serving cloud, hybrid, and on-premises environments. It combines ASM and XDR in a single console to effectively manage cyber risk acros

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Vision One features and usability ratings that predict user satisfaction
    8.7
    Ease of Admin
    Average: 8.8
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.7
    Quality of Support
    Average: 8.7
    8.6
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NK
    So far trend micro vision One's implementation was the smooth and hassle free. Trend micro's customer's support was communicative and responsive... Read review
    MA
    The platform is intuitive to navigate, even for first timers there is the "Platform directory" page that acts as a tree root for all functions. In... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Vision One is a cloud-native security operations platform, serving cloud, hybrid, and on-premises environments. It combines ASM and XDR in a single console to effectively manage cyber risk acros

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
Trend Vision One features and usability ratings that predict user satisfaction
8.7
Ease of Admin
Average: 8.8
9.1
Has the product been a good partner in doing business?
Average: 9.1
8.7
Quality of Support
Average: 8.7
8.6
Ease of Use
Average: 8.7
NK
So far trend micro vision One's implementation was the smooth and hassle free. Trend micro's customer's support was communicative and responsive... Read review
MA
The platform is intuitive to navigate, even for first timers there is the "Platform directory" page that acts as a tree root for all functions. In... Read review
Seller Details
Company Website
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
(284)4.8 out of 5
8th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for ThreatLocker
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 61% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker features and usability ratings that predict user satisfaction
    8.6
    Ease of Admin
    Average: 8.8
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.8
    Quality of Support
    Average: 8.7
    8.4
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    We've used ThreatLocker now for over 2 years. We primarily work with micro and small businesses who just expect us to take care of their cyber... Read review
    DF
    ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    580 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 61% Small-Business
  • 32% Mid-Market
ThreatLocker features and usability ratings that predict user satisfaction
8.6
Ease of Admin
Average: 8.8
9.7
Has the product been a good partner in doing business?
Average: 9.1
9.8
Quality of Support
Average: 8.7
8.4
Ease of Use
Average: 8.7
Verified User in Information Technology and Services
AI
We've used ThreatLocker now for over 2 years. We primarily work with micro and small businesses who just expect us to take care of their cyber... Read review
DF
ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,217 Twitter followers
LinkedIn® Page
www.linkedin.com
580 employees on LinkedIn®
(218)4.7 out of 5
Optimized for quick response
3rd Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
Entry Level Price:Starting at $6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform. Coro’s platform e

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 57% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro Cybersecurity is a security platform that uses AI to identify and flag potential spam and phishing, and provides a single dashboard for managing white and black lists for Office 365.
    • Users frequently mention the ease of use, comprehensive protection, affordability, and excellent customer support as key benefits of using Coro Cybersecurity.
    • Reviewers noted some issues with the product, such as occasional false positives, minimal support for certain features, and the need for more robust console and additional features.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.5
    Ease of Admin
    Average: 8.8
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Quality of Support
    Average: 8.7
    9.5
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,928 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    386 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform. Coro’s platform e

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 57% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro Cybersecurity is a security platform that uses AI to identify and flag potential spam and phishing, and provides a single dashboard for managing white and black lists for Office 365.
  • Users frequently mention the ease of use, comprehensive protection, affordability, and excellent customer support as key benefits of using Coro Cybersecurity.
  • Reviewers noted some issues with the product, such as occasional false positives, minimal support for certain features, and the need for more robust console and additional features.
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.5
Ease of Admin
Average: 8.8
9.7
Has the product been a good partner in doing business?
Average: 9.1
9.6
Quality of Support
Average: 8.7
9.5
Ease of Use
Average: 8.7
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,928 Twitter followers
LinkedIn® Page
www.linkedin.com
386 employees on LinkedIn®
(704)4.3 out of 5
32nd Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Acronis Cyber Protect
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acronis Cyber Protect delivers robust protection against cyberthreats, unparalleled backup and recovery capabilities and simplified management and visibility through a single pane of glass, for the en

    Users
    • Support Analyst
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 46% Small-Business
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acronis Cyber Protect features and usability ratings that predict user satisfaction
    8.5
    Ease of Admin
    Average: 8.8
    8.5
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Quality of Support
    Average: 8.7
    8.6
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AY
    We have been using Acronis backup Solutions since last 4 months, using Acronis Backup Solutions we are planning and keeping our data over Cloud. We... Read review
    Guy K.
    GK
    This product combines antivirus, computer patching, computer managment, remote control, immutable backups, EDR, XDR, mail protection, and it will... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Acronis
    Year Founded
    2003
    HQ Location
    Schaffhausen
    Twitter
    @acronis
    95,731 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,833 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acronis Cyber Protect delivers robust protection against cyberthreats, unparalleled backup and recovery capabilities and simplified management and visibility through a single pane of glass, for the en

Users
  • Support Analyst
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 46% Small-Business
  • 39% Mid-Market
Acronis Cyber Protect features and usability ratings that predict user satisfaction
8.5
Ease of Admin
Average: 8.8
8.5
Has the product been a good partner in doing business?
Average: 9.1
8.3
Quality of Support
Average: 8.7
8.6
Ease of Use
Average: 8.7
AY
We have been using Acronis backup Solutions since last 4 months, using Acronis Backup Solutions we are planning and keeping our data over Cloud. We... Read review
Guy K.
GK
This product combines antivirus, computer patching, computer managment, remote control, immutable backups, EDR, XDR, mail protection, and it will... Read review
Seller Details
Seller
Acronis
Year Founded
2003
HQ Location
Schaffhausen
Twitter
@acronis
95,731 Twitter followers
LinkedIn® Page
www.linkedin.com
1,833 employees on LinkedIn®
(181)4.2 out of 5
Optimized for quick response
33rd Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for IBM MaaS360
Save to My Lists
Entry Level Price:$4.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM MaaS360 features and usability ratings that predict user satisfaction
    8.0
    Ease of Admin
    Average: 8.8
    8.0
    Has the product been a good partner in doing business?
    Average: 9.1
    8.0
    Quality of Support
    Average: 8.7
    8.2
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Saurav J.
    SJ
    Provide and cover almost every platform be it windows apple od or any! With a CRM it becomes very easy to manage all the Devices in your company.... Read review
    Yash K.
    YK
    I like it becasue it has features like easy device enrollment that makes it ease of use, one can manage application and also deploy policies... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Mid-Market
  • 38% Enterprise
IBM MaaS360 features and usability ratings that predict user satisfaction
8.0
Ease of Admin
Average: 8.8
8.0
Has the product been a good partner in doing business?
Average: 9.1
8.0
Quality of Support
Average: 8.7
8.2
Ease of Use
Average: 8.7
Saurav J.
SJ
Provide and cover almost every platform be it windows apple od or any! With a CRM it becomes very easy to manage all the Devices in your company.... Read review
Yash K.
YK
I like it becasue it has features like easy device enrollment that makes it ease of use, one can manage application and also deploy policies... Read review
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
(71)4.0 out of 5
30th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GravityZone is a business security solution built from ground-up for virtualization and cloud to deliver security services to physical endpoints, mobile devices, virtual machines in public cloud and E

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 54% Small-Business
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitdefender GravityZone features and usability ratings that predict user satisfaction
    7.8
    Ease of Admin
    Average: 8.8
    8.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.1
    Quality of Support
    Average: 8.7
    8.1
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Diego M.
    DM
    Effective and thorough endpoint protection. Read review
    Jon H.
    JH
    Modular control of everything from device controls to scan frequencies. Reports are easily setup to email directly to clients for their peace of... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2001
    HQ Location
    Bucuresti, Romania
    Twitter
    @Bitdefender
    113,319 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,287 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GravityZone is a business security solution built from ground-up for virtualization and cloud to deliver security services to physical endpoints, mobile devices, virtual machines in public cloud and E

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 54% Small-Business
  • 39% Mid-Market
Bitdefender GravityZone features and usability ratings that predict user satisfaction
7.8
Ease of Admin
Average: 8.8
8.1
Has the product been a good partner in doing business?
Average: 9.1
8.1
Quality of Support
Average: 8.7
8.1
Ease of Use
Average: 8.7
Diego M.
DM
Effective and thorough endpoint protection. Read review
Jon H.
JH
Modular control of everything from device controls to scan frequencies. Reports are easily setup to email directly to clients for their peace of... Read review
Seller Details
Year Founded
2001
HQ Location
Bucuresti, Romania
Twitter
@Bitdefender
113,319 Twitter followers
LinkedIn® Page
www.linkedin.com
2,287 employees on LinkedIn®
(192)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.8
    Ease of Admin
    Average: 8.8
    8.6
    Has the product been a good partner in doing business?
    Average: 9.1
    8.6
    Quality of Support
    Average: 8.7
    9.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kunal H.
    KH
    It was helpful for forensics investigation. Read review
    MK
    I like how intuitive the user interface is and how clean everything looks, it's very user friendly Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,270 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer features and usability ratings that predict user satisfaction
8.8
Ease of Admin
Average: 8.8
8.6
Has the product been a good partner in doing business?
Average: 9.1
8.6
Quality of Support
Average: 8.7
9.0
Ease of Use
Average: 8.7
Kunal H.
KH
It was helpful for forensics investigation. Read review
MK
I like how intuitive the user interface is and how clean everything looks, it's very user friendly Read review
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,270 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
(120)4.4 out of 5
Optimized for quick response
19th Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for WatchGuard Endpoint Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WatchGuard Endpoint Security solutions help you safeguard devices against cyber threats. WatchGuard EPDR and Advanced EPDR, our AI-powered flagship endpoint solutions, enhance your security posture by

    Users
    • Software Developer
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 55% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WatchGuard Endpoint Security features and usability ratings that predict user satisfaction
    8.7
    Ease of Admin
    Average: 8.8
    8.6
    Has the product been a good partner in doing business?
    Average: 9.1
    8.4
    Quality of Support
    Average: 8.7
    8.9
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Dustin  S.
    DS
    Panda Security is a software that is perfectly consistent with laptops, smartphones running Desktop, Android or Mac operating systems. In terms of... Read review
    Steven D.
    SD
    It is a quality antivirus, with its EP and EDR solutions, it quickly detects with a thorough analysis any threat that may be lurking in my work... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1996
    HQ Location
    Seatle, WA
    Twitter
    @watchguard
    19,681 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,191 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

WatchGuard Endpoint Security solutions help you safeguard devices against cyber threats. WatchGuard EPDR and Advanced EPDR, our AI-powered flagship endpoint solutions, enhance your security posture by

Users
  • Software Developer
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 55% Small-Business
  • 33% Mid-Market
WatchGuard Endpoint Security features and usability ratings that predict user satisfaction
8.7
Ease of Admin
Average: 8.8
8.6
Has the product been a good partner in doing business?
Average: 9.1
8.4
Quality of Support
Average: 8.7
8.9
Ease of Use
Average: 8.7
Dustin  S.
DS
Panda Security is a software that is perfectly consistent with laptops, smartphones running Desktop, Android or Mac operating systems. In terms of... Read review
Steven D.
SD
It is a quality antivirus, with its EP and EDR solutions, it quickly detects with a thorough analysis any threat that may be lurking in my work... Read review
Seller Details
Company Website
Year Founded
1996
HQ Location
Seatle, WA
Twitter
@watchguard
19,681 Twitter followers
LinkedIn® Page
www.linkedin.com
1,191 employees on LinkedIn®
(87)4.7 out of 5
28th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 69% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdSec features and usability ratings that predict user satisfaction
    8.8
    Ease of Admin
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Quality of Support
    Average: 8.7
    8.8
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HH
    It is easy to use and there are already many extensions for the most popular software products. Crowdsec is at home on all the latest operating... Read review
    AJ T.
    AT
    Relatively easy to set up on individual servers and provides excellent front-line protection for web applications, including WordPress. It also... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CrowdSec
    Year Founded
    2020
    HQ Location
    Paris, FR
    Twitter
    @Crowd_Security
    19,694 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdSec is an open-source security stack that detects aggressive behaviors and prevents them from accessing your systems. Its user-friendly design and ease of integration into your current security i

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 69% Small-Business
  • 21% Mid-Market
CrowdSec features and usability ratings that predict user satisfaction
8.8
Ease of Admin
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 9.1
8.8
Quality of Support
Average: 8.7
8.8
Ease of Use
Average: 8.7
HH
It is easy to use and there are already many extensions for the most popular software products. Crowdsec is at home on all the latest operating... Read review
AJ T.
AT
Relatively easy to set up on individual servers and provides excellent front-line protection for web applications, including WordPress. It also... Read review
Seller Details
Seller
CrowdSec
Year Founded
2020
HQ Location
Paris, FR
Twitter
@Crowd_Security
19,694 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
(74)4.5 out of 5
Optimized for quick response
18th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 39% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saner CVEM features and usability ratings that predict user satisfaction
    9.0
    Ease of Admin
    Average: 8.8
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Quality of Support
    Average: 8.7
    8.7
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JS
    It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
    SV
    I like this tool because it is easy to use and awesome. I like to access it from anywhere and make quick evaluations without having to adjust... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SanerNow
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    139 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 39% Small-Business
Saner CVEM features and usability ratings that predict user satisfaction
9.0
Ease of Admin
Average: 8.8
9.1
Has the product been a good partner in doing business?
Average: 9.1
9.2
Quality of Support
Average: 8.7
8.7
Ease of Use
Average: 8.7
JS
It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
SV
I like this tool because it is easy to use and awesome. I like to access it from anywhere and make quick evaluations without having to adjust... Read review
Seller Details
Seller
SanerNow
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
557 Twitter followers
LinkedIn® Page
www.linkedin.com
139 employees on LinkedIn®
(43)4.7 out of 5
20th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 88% Small-Business
    • 12% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    8.8
    Ease of Admin
    Average: 8.8
    9.5
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Quality of Support
    Average: 8.7
    8.5
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Consulting
    CC
    The price of Todyl makes it very cost-effective. Read review
    DS
    Utilizing Todyl modules for our Managed Clients has been effortless. We utilize the NGAV, SASE, MXDR and SIEM modules to meet or exceed... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    136 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 88% Small-Business
  • 12% Mid-Market
Todyl Security Platform features and usability ratings that predict user satisfaction
8.8
Ease of Admin
Average: 8.8
9.5
Has the product been a good partner in doing business?
Average: 9.1
9.6
Quality of Support
Average: 8.7
8.5
Ease of Use
Average: 8.7
Verified User in Consulting
CC
The price of Todyl makes it very cost-effective. Read review
DS
Utilizing Todyl modules for our Managed Clients has been effortless. We utilize the NGAV, SASE, MXDR and SIEM modules to meet or exceed... Read review
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
136 employees on LinkedIn®
(39)4.3 out of 5
22nd Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimda

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 62% Mid-Market
    • 31% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Heimdal® features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.8
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Quality of Support
    Average: 8.7
    8.4
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Glass, Ceramics & Concrete
    AG
    The interface is simple compared to other AV software and software patch management. Read review
    KK
    I like that many application is bundled in one application, making it easy to administrate and very effective. Effective means saving time and money. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Heimdal®
    Year Founded
    2014
    HQ Location
    Copenhagen, Denmark
    Twitter
    @HeimdalSecurity
    5,124 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    261 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimda

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 62% Mid-Market
  • 31% Small-Business
Heimdal® features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.8
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.6
Quality of Support
Average: 8.7
8.4
Ease of Use
Average: 8.7
Verified User in Glass, Ceramics & Concrete
AG
The interface is simple compared to other AV software and software patch management. Read review
KK
I like that many application is bundled in one application, making it easy to administrate and very effective. Effective means saving time and money. Read review
Seller Details
Seller
Heimdal®
Year Founded
2014
HQ Location
Copenhagen, Denmark
Twitter
@HeimdalSecurity
5,124 Twitter followers
LinkedIn® Page
www.linkedin.com
261 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gain full visibility to advanced threats with our endpoint detection and response. With our unique Broad Context Detection, you can minimize alert noise and zero in on incidents, and with automated re

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Mid-Market
    • 24% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WithSecure Elements Endpoint Detection and Response features and usability ratings that predict user satisfaction
    8.5
    Ease of Admin
    Average: 8.8
    9.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Quality of Support
    Average: 8.7
    8.5
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Consulting
    AC
    WithSecure EDR solution is easy to setup and integrate in the infra without much efforts, It is supporting most of the kind of endpoint sources and... Read review
    Anuja Lakshmi A.
    AA
    The Graphic User Interface is very easy to use and with secure elements end point detection we can easily control user devices. It is very easy to... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    68,923 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,718 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

Gain full visibility to advanced threats with our endpoint detection and response. With our unique Broad Context Detection, you can minimize alert noise and zero in on incidents, and with automated re

Users
No information available
Industries
No information available
Market Segment
  • 53% Mid-Market
  • 24% Enterprise
WithSecure Elements Endpoint Detection and Response features and usability ratings that predict user satisfaction
8.5
Ease of Admin
Average: 8.8
9.1
Has the product been a good partner in doing business?
Average: 9.1
8.9
Quality of Support
Average: 8.7
8.5
Ease of Use
Average: 8.7
Verified User in Consulting
AC
WithSecure EDR solution is easy to setup and integrate in the infra without much efforts, It is supporting most of the kind of endpoint sources and... Read review
Anuja Lakshmi A.
AA
The Graphic User Interface is very easy to use and with secure elements end point detection we can easily control user devices. It is very easy to... Read review
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
68,923 Twitter followers
LinkedIn® Page
www.linkedin.com
1,718 employees on LinkedIn®
Ownership
FSOYF
(30)4.3 out of 5
31st Easiest To Use in Endpoint Detection & Response (EDR) software
View top Consulting Services for Datto Endpoint Detection and Response (EDR)
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Datto EDR is a layered, integrated endpoint security solution that provides continuous monitoring and automated responses to threats that target Windows, Mac and Linux-based endpoints. Going beyond tr

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Small-Business
    • 7% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Datto Endpoint Detection and Response (EDR) features and usability ratings that predict user satisfaction
    8.1
    Ease of Admin
    Average: 8.8
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    8.0
    Quality of Support
    Average: 8.7
    8.3
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    It's an entry level EDR tool (and priced that way), and is being rapidly developed now that is has been brought to market by Kaseya. However, it's... Read review
    Verified User in Information Technology and Services
    AI
    Easy to deploy through Kaseya and easy to manage and quick responses from Support Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,018 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Datto EDR is a layered, integrated endpoint security solution that provides continuous monitoring and automated responses to threats that target Windows, Mac and Linux-based endpoints. Going beyond tr

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Small-Business
  • 7% Mid-Market
Datto Endpoint Detection and Response (EDR) features and usability ratings that predict user satisfaction
8.1
Ease of Admin
Average: 8.8
8.9
Has the product been a good partner in doing business?
Average: 9.1
8.0
Quality of Support
Average: 8.7
8.3
Ease of Use
Average: 8.7
Verified User in Information Technology and Services
AI
It's an entry level EDR tool (and priced that way), and is being rapidly developed now that is has been brought to market by Kaseya. However, it's... Read review
Verified User in Information Technology and Services
AI
Easy to deploy through Kaseya and easy to manage and quick responses from Support Read review
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,550 Twitter followers
LinkedIn® Page
www.linkedin.com
5,018 employees on LinkedIn®
(22)4.7 out of 5
Optimized for quick response
17th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Field Effect MDR MDR, XDR, SIEM, SOC… it’s all under the hood. From threat detection to analysis and response, Field Effect MDR has you covered. Built from the ground-up to detect and respond

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Field Effect MDR features and usability ratings that predict user satisfaction
    9.2
    Ease of Admin
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Quality of Support
    Average: 8.7
    9.1
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • CL
    Having an automated set of digital "eyes" on our servers, computers, and networks is a game changer. In this day and age it's become a necessity.... Read review
    Joe U.
    JU
    Super simple to read the alerts in realtime. We love Covalence! At Infinite IT Solutions, we prioritize the security of our clients and our own... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2016
    HQ Location
    Ottawa
    Twitter
    @fieldeffectsoft
    1,323 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    158 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Field Effect MDR MDR, XDR, SIEM, SOC… it’s all under the hood. From threat detection to analysis and response, Field Effect MDR has you covered. Built from the ground-up to detect and respond

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Small-Business
  • 27% Mid-Market
Field Effect MDR features and usability ratings that predict user satisfaction
9.2
Ease of Admin
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 9.1
9.0
Quality of Support
Average: 8.7
9.1
Ease of Use
Average: 8.7
CL
Having an automated set of digital "eyes" on our servers, computers, and networks is a game changer. In this day and age it's become a necessity.... Read review
Joe U.
JU
Super simple to read the alerts in realtime. We love Covalence! At Infinite IT Solutions, we prioritize the security of our clients and our own... Read review
Seller Details
Company Website
Year Founded
2016
HQ Location
Ottawa
Twitter
@fieldeffectsoft
1,323 Twitter followers
LinkedIn® Page
www.linkedin.com
158 employees on LinkedIn®
(13)4.4 out of 5
26th Easiest To Use in Endpoint Detection & Response (EDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 54% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Uptycs features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.8
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Quality of Support
    Average: 8.7
    7.9
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    UF
    - Great for managing osquery on all kinds of assets - Can forward telemetry to an s3 bucket for SIEM consumption - Provides some active... Read review
    Verified User in Computer & Network Security
    UC
    Very good tool for monitoring security, compliant with CIS or PCI DSS standards. I like the ability to create your own SQL queries in network... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Uptycs
    Year Founded
    2016
    HQ Location
    Waltham, US
    Twitter
    @uptycs
    1,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

Users
No information available
Industries
  • Financial Services
Market Segment
  • 54% Mid-Market
  • 38% Enterprise
Uptycs features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.8
10.0
Has the product been a good partner in doing business?
Average: 9.1
9.0
Quality of Support
Average: 8.7
7.9
Ease of Use
Average: 8.7
Verified User in Financial Services
UF
- Great for managing osquery on all kinds of assets - Can forward telemetry to an s3 bucket for SIEM consumption - Provides some active... Read review
Verified User in Computer & Network Security
UC
Very good tool for monitoring security, compliant with CIS or PCI DSS standards. I like the ability to create your own SQL queries in network... Read review
Seller Details
Seller
Uptycs
Year Founded
2016
HQ Location
Waltham, US
Twitter
@uptycs
1,508 Twitter followers
LinkedIn® Page
www.linkedin.com
178 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 20% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LMNTRIX features and usability ratings that predict user satisfaction
    10.0
    Ease of Admin
    Average: 8.8
    9.6
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Quality of Support
    Average: 8.7
    9.6
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Utilities
    EU
    24/7 Incident Validation and Response to reduce the noise, and 24/7 SOC services without the hefty price tag of running your own. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LMNTRIX
    Year Founded
    2015
    HQ Location
    Orange, California
    Twitter
    @lmntrixlabs
    76 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 20% Enterprise
LMNTRIX features and usability ratings that predict user satisfaction
10.0
Ease of Admin
Average: 8.8
9.6
Has the product been a good partner in doing business?
Average: 9.1
9.6
Quality of Support
Average: 8.7
9.6
Ease of Use
Average: 8.7
Verified User in Utilities
EU
24/7 Incident Validation and Response to reduce the noise, and 24/7 SOC services without the hefty price tag of running your own. Read review
Seller Details
Seller
LMNTRIX
Year Founded
2015
HQ Location
Orange, California
Twitter
@lmntrixlabs
76 Twitter followers
LinkedIn® Page
www.linkedin.com
56 employees on LinkedIn®
Entry Level Price:$3,000.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 27% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BlackFog is a security software that fills security gaps missed by typical security software and local firewall, designed to stop the data exfiltration component of modern day ransomware events.
    • Reviewers frequently mention the software's proactive monitoring, great communication, easy installation, and ability to provide up-to-the-minute reporting and tools for making security decisions.
    • Reviewers noted that the warnings can be difficult to understand for people without a lot of cybersecurity background, and they wish BlackFog would offer anti-virus and patch software to provide an all-inclusive web interface to monitor security from one console.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackFog features and usability ratings that predict user satisfaction
    9.1
    Ease of Admin
    Average: 8.8
    9.8
    Has the product been a good partner in doing business?
    Average: 9.1
    9.5
    Quality of Support
    Average: 8.7
    9.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlackFog
    Company Website
    Year Founded
    2015
    HQ Location
    BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
    Twitter
    @blackfogprivacy
    1,480 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 27% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BlackFog is a security software that fills security gaps missed by typical security software and local firewall, designed to stop the data exfiltration component of modern day ransomware events.
  • Reviewers frequently mention the software's proactive monitoring, great communication, easy installation, and ability to provide up-to-the-minute reporting and tools for making security decisions.
  • Reviewers noted that the warnings can be difficult to understand for people without a lot of cybersecurity background, and they wish BlackFog would offer anti-virus and patch software to provide an all-inclusive web interface to monitor security from one console.
BlackFog features and usability ratings that predict user satisfaction
9.1
Ease of Admin
Average: 8.8
9.8
Has the product been a good partner in doing business?
Average: 9.1
9.5
Quality of Support
Average: 8.7
9.3
Ease of Use
Average: 8.7
Seller Details
Seller
BlackFog
Company Website
Year Founded
2015
HQ Location
BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
Twitter
@blackfogprivacy
1,480 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CySight’s revolutionary Actionable Intelligence, trusted by Fortune 500 globally, enables organizations with the most cost-effective and secure way to tackle the increasing density, complexity, and ex

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CySight features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    6.7
    Quality of Support
    Average: 8.7
    10.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AE
    I can at last track down all my network data without having the matter of where i am going to store all these data. Such an extensive base enables... Read review
    SA
    CySight's Dropless Assortment is useful. Catching all organization information, paying little heed to estimate or type, gives unrivaled... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    Raanana, IL
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CySight’s revolutionary Actionable Intelligence, trusted by Fortune 500 globally, enables organizations with the most cost-effective and secure way to tackle the increasing density, complexity, and ex

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
CySight features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
6.7
Quality of Support
Average: 8.7
10.0
Ease of Use
Average: 8.7
AE
I can at last track down all my network data without having the matter of where i am going to store all these data. Such an extensive base enables... Read review
SA
CySight's Dropless Assortment is useful. Catching all organization information, paying little heed to estimate or type, gives unrivaled... Read review
Seller Details
Year Founded
2023
HQ Location
Raanana, IL
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ​Gradient Cyber’s Managed Extended Detection and Response (MXDR) service offers mid-market organizations comprehensive, 24/7/365 protection across their entire IT environment, including networks, endp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gradient Cyber features and usability ratings that predict user satisfaction
    10.0
    Ease of Admin
    Average: 8.8
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    10.0
    Quality of Support
    Average: 8.7
    9.2
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Gabe E.
    GE
    Their helpfulness and professionalism. They are one of the best players in the market Read review
    Verified User in Computer Software
    CC
    We have been using Gradient's CISO Advisory services in my previous company for a few months, and their services have been very valuable. Having... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Southlake, Texas
    Twitter
    @GradientCyber
    122 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

​Gradient Cyber’s Managed Extended Detection and Response (MXDR) service offers mid-market organizations comprehensive, 24/7/365 protection across their entire IT environment, including networks, endp

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Enterprise
Gradient Cyber features and usability ratings that predict user satisfaction
10.0
Ease of Admin
Average: 8.8
10.0
Has the product been a good partner in doing business?
Average: 9.1
10.0
Quality of Support
Average: 8.7
9.2
Ease of Use
Average: 8.7
Gabe E.
GE
Their helpfulness and professionalism. They are one of the best players in the market Read review
Verified User in Computer Software
CC
We have been using Gradient's CISO Advisory services in my previous company for a few months, and their services have been very valuable. Having... Read review
Seller Details
Year Founded
2017
HQ Location
Southlake, Texas
Twitter
@GradientCyber
122 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2013, ThinScale works with brands across the CX, healthcare, education, financial services, legal, and government sectors. Our team is 100% remote across the EU, the UK, and North America.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThinScale features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThinScale
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2013, ThinScale works with brands across the CX, healthcare, education, financial services, legal, and government sectors. Our team is 100% remote across the EU, the UK, and North America.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ThinScale features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
ThinScale
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatKey is a highly automated security operations SaaS solution. It gathers enough context about your environments to fix security issues at the click of a button. With the information gathered from

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatKey features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.8
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    7.5
    Quality of Support
    Average: 8.7
    8.3
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • DJ
    It's user-friendly and integrates seamlessly with our existing systems. It helps us quickly identify and address security threats, which has... Read review
    SS
    I have found ThreatKey by Vijilan useful for my small business. I agree with Vijilan’s terms of deployment, monitoring, and incident handling... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatKey
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatKey is a highly automated security operations SaaS solution. It gathers enough context about your environments to fix security issues at the click of a button. With the information gathered from

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
ThreatKey features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.8
8.3
Has the product been a good partner in doing business?
Average: 9.1
7.5
Quality of Support
Average: 8.7
8.3
Ease of Use
Average: 8.7
DJ
It's user-friendly and integrates seamlessly with our existing systems. It helps us quickly identify and address security threats, which has... Read review
SS
I have found ThreatKey by Vijilan useful for my small business. I agree with Vijilan’s terms of deployment, monitoring, and incident handling... Read review
Seller Details
Seller
ThreatKey
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Detection & Response (EDR) provides powerful endpoint threat detection with intuitive and actionable incident management and threat visualization in the console. Built on top of our

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Detection & Response features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,570 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    207 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Detection & Response (EDR) provides powerful endpoint threat detection with intuitive and actionable incident management and threat visualization in the console. Built on top of our

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
VIPRE Endpoint Detection & Response features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,570 Twitter followers
LinkedIn® Page
www.linkedin.com
207 employees on LinkedIn®