Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs a
Also listed in Endpoint Detection & Response (EDR), Managed Detection and Response (MDR), Endpoint Management, Antivirus
ThreatDown is great because it just works. There is very little hassle to the setup and very rarely gives us issues. The customer service is top tier, by far one of the most pleasant vendors I work with. The primary selling point for us is that it plays nice with our existing AV and we haven't had any conflicts between the two. We've been using ThreatDown for a few years now and they just keep rolling out new features (without charging more). ThreatDown does exactly what you'd expect it to do and more. I can't recommend the product enough. Our incredible account manager has regular meetings scheduled and is always available. The few times we've had to open tickets they've been resolved promptly and efficiently. Review collected by and hosted on G2.com.
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from e
Also listed in Extended Detection and Response (XDR) Platforms, Malware Analysis Tools, Patch Management, Antivirus, Endpoint Detection & Response (EDR)
Its centralized management console. It allows easy deployment, configuration, and real-time monitoring of all endpoints from a single dashboard. The interface is intuitive, and the remote management features save a lot of time, especially in large or distributed environments. I also appreciate its lightweight performance, which doesn’t slow down systems, and the high detection rate with minimal false positives Review collected by and hosted on G2.com.
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation
Also listed in Cloud Email Security, Server Backup, SaaS Backup, Patch Management, Endpoint Detection & Response (EDR)
Acronis Cyber Protect Cloud offers a seamless all-in-one solution that combines backup, cybersecurity, and endpoint protection in one dashboard. It's easy to manage, even for teams without deep technical skills. The integration between backup and anti-malware functions saves time and reduces complexity. I also appreciate the centralized monitoring and the flexibility it provides for both on-prem and cloud environments. Review collected by and hosted on G2.com.
Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the m
Also listed in Antivirus, Endpoint Detection & Response (EDR), Extended Detection and Response (XDR) Platforms
We’ve had the opportunity to work with Sophos solutions, and the experience has been outstanding. Sophos continues to prove itself as a leader in cybersecurity by offering a well-rounded suite of products that are both powerful and user-friendly.
What sets Sophos apart is the seamless integration of its technologies — from firewalls and endpoint protection to email security and cloud-based threat management. The Sophos Central platform is intuitive, centralized, and efficient, allowing administrators to manage security across all devices and users from a single pane of glass.
Their Intercept X endpoint protection, in particular, delivers exceptional results in threat prevention, thanks to its advanced AI and anti-ransomware capabilities. Combined with their synchronized security approach, it creates a layered defense that actually works together, not in silos.
Beyond the technology, Sophos’ support and services are truly valuable. Their technical team is responsive, knowledgeable, and committed to helping clients stay secure and confident. Whether it’s deployment, training, or troubleshooting, the service has always been prompt and professional.
Overall, Sophos offers a valuable investment for any organization that takes cybersecurity seriously. Their innovation, ease of use, and dedication to customer success make them a trusted partner in today’s complex threat landscape. Review collected by and hosted on G2.com.
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how
Also listed in Zero Trust Networking, Managed Detection and Response (MDR), Endpoint Detection & Response (EDR), Threat Intelligence, Zero Trust Platforms
ThreatLocker is a powerful security solution that gives administrators full control over what users can install, run, or script. Its default-deny approach ensures that only explicitly approved actions are allowed, making it easy to sleep at night knowing that even if users click on dangerous files, they won’t execute in secure mode. Review collected by and hosted on G2.com.
Microsoft Defender for Endpoint is a unified platform for preventative protection, post-breach detection, automated investigation, and response.
Also listed in Antivirus, Endpoint Protection Platforms
We use Microsoft Defender for Endpoint on a very large deployment and most of the endpoints were previously running Cortex XDR. Defender provides high level of protections against cyber treats. Our GSOC team investigates incidents and deploys security policies via the Microsoft Defender portal. We were able to detect and stop cyber attacks in the very early stages and this helps us keep the environment clean. So far we haven't had any major incidents. Review collected by and hosted on G2.com.
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene,
Also listed in Identity Threat Detection and Response (ITDR), AWS Marketplace, Extended Detection and Response (XDR) Platforms, User and Entity Behavior Analytics (UEBA), Managed Detection and Response (MDR)
Crowdstrike gives many reason to like with many features .
Single unified Console and lightweight agent for all services.
deployed in minutes and NO reboot required.
And you can manage the all your services on singel console .
Api integration with many vendors are availble.24/7 support services also avilable in crowdstrike.
you can use this daily without any headache. Review collected by and hosted on G2.com.
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
Also listed in Insider Threat Management (ITM), Malware Analysis Tools, Cloud Security Monitoring and Analytics, Cloud File Security, Cloud Compliance
It sits in front of the office 365 and uses the AI to identify and flag potential spam and phishing. it puts the white list and black list for office 365 on a single dashboard allowing the administrator to easily change the list. (anyone that is using office 365 knows the admin console is very clunky to get around in)
There have been a couple improvements in the dashboard and they are moving towards a very intuitive platform that will be extrememly easy to use Review collected by and hosted on G2.com.
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X
Also listed in Endpoint Management, Antivirus
My experience is overall good. it provide strong security against a wide range of threats. Harmony endpoint integrates advanced threat prevention and detection features to safeguard endpoint from evolving cyber threats. providing an in-depth analysis of its effectiveness in securing modern IT environments. Support and Implementation is also very easy and effective. Review collected by and hosted on G2.com.
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vu
Also listed in Endpoint Management, Antivirus, Zero Trust Networking, Zero Trust Platforms
The flexibility above all. FortiClient can provide endpoint protection, remote access, zero trust, MFA and a host of other solutions all in one package. Review collected by and hosted on G2.com.
Bitdefender Antivirus Plus 2018 delivers multiple layers of protection against ransomware. It uses behavioral threat detection to prevent infections, and protects your most im
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, ra
Also listed in Identity Threat Detection and Response (ITDR), Extended Detection and Response (XDR) Platforms, Deception Technology, Endpoint Protection Platforms, Vulnerability Scanner
Best thing in sentinelone have autonomous threat detection and response.
single unified console for Endpoint ,identity and cloud security .
User friendly console you can easily manage all the assets easy to deploy policy.Single policy for window ,mac and linux .and auto response also available one click kill & quarantine , remediate and best feature is one click rollback .Rollback feature helps you to revert back impact of ransomware in attack condition.
and much more features like device control and patient feature storyline star custom rule.Ease to implementation for all types of OS ,legacy os also supported.
Frequently usable and ease to integrate with other vendors. Review collected by and hosted on G2.com.
Antivirus uses real-time virus signatures and anomaly-based protections from ThreatCloud, extensive threat intelligence to proactively stop threats and manage security service
Check Point offers robust threat detection capabilities. During testing and user acceptance phases of deployment, the solution consistently identified ransomware attempts and suspicious file behavior that other tools failed to catch. The Anti-Bot and Anti-Ransomware modules are particularly strong, providing proactive protection. Ease of use and implementation. Support is also good. Review collected by and hosted on G2.com.
MetaDefender is a software that analises suspicious files.
Also listed in Data Loss Prevention (DLP), Threat Intelligence, Cloud File Security, Vulnerability Scanner
The software is great as it helps one to scan the whole computer hence eliminating threats. The platform helps users to know and get all the solutions to the problems that they may experience when they are operating the computer. The software has also a splendid supportive team that is always on the foremost path in helping their customers and this leads to great customer satisfaction. Review collected by and hosted on G2.com.
Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Mode
Also listed in Antivirus
It has given us confidence in securing critical systems by preventing unauthorized apps from running reducing out attack surface. The best part is it is easy to use and implement with good integration capabilities. Carbon Black Support is awesome and the long-term benefits of using the product every day helped us enhance security and compliance. Review collected by and hosted on G2.com.
Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. AMP can uncover even
Also listed in Endpoint Detection & Response (EDR), Antivirus, Endpoint Management
Ease of use and deployment to our endpoints. Policy customization and reporting is excellent. Reasearching and finding root cause of an issue with tools provided helps tremendously as well. Review collected by and hosted on G2.com.
Absolute accelerates its customers’ shift to work-from-anywhere through the industry’s first self-healing Zero Trust platform, helping to ensure maximum security and uncomprom
Also listed in Unified Endpoint Management (UEM), Endpoint Protection Platforms
Ability to track our endpoints throughout the life of the machine, monitor compliance, freeze devices for compliance or theft, peace of mind that the agent is tamper resistant, ability to physically locate the devices, enforce security policies remotely. Customer support is great, and we are able to get quick responses when we open a ticket with clear resolutions. Our team appreciates the updates to the console as it is straight forward to use and the agent activation was easy to integrate into our imaging process. We use it daily to manage and track devices and look forward to integrating into our SNOW CMDB in the near future. Review collected by and hosted on G2.com.
Kaspersky AntiVirus is the smarter way to protect everything on your PC… to help keep you safe from viruses, spyware & Trojans – and help stop ransomware locking up all your f
Its holistic behavior in detecting network threats blocked and reports on what was done. Review collected by and hosted on G2.com.
the best about avast is this is your one to go software , you dont need anything else just install it and you are done . it has simple interface and ui for seemless experience and its protection is amazing , it help to block every unwanted things in my system , i just love it and countinue using it for years. and customer support is amzing as soon as you complain it get ressolved. Review collected by and hosted on G2.com.
Agency for Business provides personalized managed cybersecurity for your organization's most vulnerable threat surface, the digital lives of your employees. Businesses use Age
Also listed in Digital Risk Protection (DRP) Platforms, Employee Identity Theft Protection
Vicky, Tyler, and the whole Agency team are fantastic and have made the process for maintaining our security posture simple and straightforward. To give you an idea about how good they are, I really haven't thought about our cybersecurity or device management at all in the almost year that we've been using Agency. Implementing it took maybe 30 minutes total, with our whole team getting on a Zoom and it was done. Review collected by and hosted on G2.com.