Introducing G2.ai, the future of software buying.Try now

Anti-Malware Software

Typically, Anti-Malware is a capability of a variety of other G2 Software categories. See more below to select the

best Anti-Malware Software.

Anti-malware software is used to prevent malware attacks on corporate and individual information technology (IT) systems. Since there is a rise in cyber attacks, cybersecurity is a must for all devices. A device falls prey to a malware attack in various ways such as by plugging in an infected USB drive, opening an infected file or a link sent over phishing emails, downloading suspicious apps, and more. All systems, be it Windows, iOS, or Android are susceptible to these malware attacks. It is not to be mistaken with antivirus software, which does not have sufficient capabilities to detect ransomware and other forms of malicious threats. Users can also consider endpoint protection suites for an all-in-one security solution.
ThreatDown

ThreatDown

(1,040)4.6 out of 5

ThreatDown

(1,040)4.6 out of 5

Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs a

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Endpoint Detection & Response (EDR), Managed Detection and Response (MDR), Endpoint Management, Antivirus


KM
“Extremely effective, great support, highly compatible”
What do you like best about ThreatDown?

ThreatDown is great because it just works. There is very little hassle to the setup and very rarely gives us issues. The customer service is top tier, by far one of the most pleasant vendors I work with. The primary selling point for us is that it plays nice with our existing AV and we haven't had any conflicts between the two. We've been using ThreatDown for a few years now and they just keep rolling out new features (without charging more). ThreatDown does exactly what you'd expect it to do and more. I can't recommend the product enough. Our incredible account manager has regular meetings scheduled and is always available. The few times we've had to open tickets they've been resolved promptly and efficiently. Review collected by and hosted on G2.com.

What do you dislike about ThreatDown?

I honestly have a hard time thinking of anything I dislike. The only thing I've run into is that TOR isnt an application that can be blocked by the application block, but that's so incredibly minor I don't think it's even worth mentioning. Review collected by and hosted on G2.com.

What problems is ThreatDown solving and how is that benefiting you?

ThreatDown is keeping us protected. I run reports monthly of the detections and it's constantly working. The new addition of the patch management scans has been a huge benefit to us by giving us a second set of eyes on our vulnerability management plan. Review collected by and hosted on G2.com.

Show More
Show Less
ESET PROTECT

ESET PROTECT

(866)4.6 out of 5

ESET PROTECT

(866)4.6 out of 5

ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from e

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Extended Detection and Response (XDR) Platforms, Malware Analysis Tools, Patch Management, Antivirus, Endpoint Detection & Response (EDR)


Madhukar P.
MP
“It provided reliable security with excellent customization options for both individual and corporate”
What do you like best about ESET PROTECT?

Its centralized management console. It allows easy deployment, configuration, and real-time monitoring of all endpoints from a single dashboard. The interface is intuitive, and the remote management features save a lot of time, especially in large or distributed environments. I also appreciate its lightweight performance, which doesn’t slow down systems, and the high detection rate with minimal false positives Review collected by and hosted on G2.com.

What do you dislike about ESET PROTECT?

the initial setup and configuration especially for larger networks can be a bit complex for new users. Review collected by and hosted on G2.com.

What problems is ESET PROTECT solving and how is that benefiting you?

ESET PROTECT addresses key cybersecurity challenges such as malware infections, phishing attacks, ransomware threats, and unmonitored endpoints. By providing real-time protection and centralized management, it helps ensure that all devices across the network are consistently updated, monitored, and secured. This significantly reduces the risk of security breaches, simplifies IT administration, and improves overall system performance. The ability to manage multiple devices remotely has also saved time and resources, especially in hybrid or remote work environments. Review collected by and hosted on G2.com.

Show More
Show Less

Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation

Top Anti-Malware Software Result from Cloud Data Security

Also listed in Cloud Email Security, Server Backup, SaaS Backup, Patch Management, Endpoint Detection & Response (EDR)


MS
“All-in-one and simple management.”
What do you like best about Acronis Cyber Protect Cloud?

Acronis Cyber Protect Cloud offers a seamless all-in-one solution that combines backup, cybersecurity, and endpoint protection in one dashboard. It's easy to manage, even for teams without deep technical skills. The integration between backup and anti-malware functions saves time and reduces complexity. I also appreciate the centralized monitoring and the flexibility it provides for both on-prem and cloud environments. Review collected by and hosted on G2.com.

What do you dislike about Acronis Cyber Protect Cloud?

While the platform is powerful, the initial setup process can be a bit overwhelming due to the large number of configuration options. Additionally, some updates can cause unexpected changes in the interface, which might confuse less experienced users. The pricing can also be a bit high for small businesses or startups compared to simpler alternatives. Review collected by and hosted on G2.com.

What problems is Acronis Cyber Protect Cloud solving and how is that benefiting you?

We use Acronis Cyber Protect Cloud primarily to streamline backup and cybersecurity into one manageable platform. It helps us ensure business continuity by automating backups, protecting endpoints against malware and ransomware, and enabling fast recovery from any incidents. This has reduced our downtime significantly and improved our IT team’s efficiency. Review collected by and hosted on G2.com.

Show More
Show Less

Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the m

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Antivirus, Endpoint Detection & Response (EDR), Extended Detection and Response (XDR) Platforms


Samer F.
SF
“A friendly handheld threats and cybersecurity products”
What do you like best about Sophos Endpoint?

We’ve had the opportunity to work with Sophos solutions, and the experience has been outstanding. Sophos continues to prove itself as a leader in cybersecurity by offering a well-rounded suite of products that are both powerful and user-friendly.

What sets Sophos apart is the seamless integration of its technologies — from firewalls and endpoint protection to email security and cloud-based threat management. The Sophos Central platform is intuitive, centralized, and efficient, allowing administrators to manage security across all devices and users from a single pane of glass.

Their Intercept X endpoint protection, in particular, delivers exceptional results in threat prevention, thanks to its advanced AI and anti-ransomware capabilities. Combined with their synchronized security approach, it creates a layered defense that actually works together, not in silos.

Beyond the technology, Sophos’ support and services are truly valuable. Their technical team is responsive, knowledgeable, and committed to helping clients stay secure and confident. Whether it’s deployment, training, or troubleshooting, the service has always been prompt and professional.

Overall, Sophos offers a valuable investment for any organization that takes cybersecurity seriously. Their innovation, ease of use, and dedication to customer success make them a trusted partner in today’s complex threat landscape. Review collected by and hosted on G2.com.

What do you dislike about Sophos Endpoint?

Some slowdown on older hardware - boot time needed to increased Review collected by and hosted on G2.com.

What problems is Sophos Endpoint solving and how is that benefiting you?

The mist important thing for is web filtering as i used it for my children web access - maleware detection as clicked on spam links so i was noticed withe that Review collected by and hosted on G2.com.

Show More
Show Less
ThreatLocker

ThreatLocker

(284)4.8 out of 5

ThreatLocker

(284)4.8 out of 5

Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Zero Trust Networking, Managed Detection and Response (MDR), Endpoint Detection & Response (EDR), Threat Intelligence, Zero Trust Platforms


Graham T.
GT
“ThreatLocker is a powerful security solution that gives administrators full control”
What do you like best about ThreatLocker?

ThreatLocker is a powerful security solution that gives administrators full control over what users can install, run, or script. Its default-deny approach ensures that only explicitly approved actions are allowed, making it easy to sleep at night knowing that even if users click on dangerous files, they won’t execute in secure mode. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker?

ThreatLocker has a steep learning curve, generates frequent alerts that can overwhelm teams, and offers limited support for mobile platforms. While it provides strong security controls, it may be challenging for smaller organizations or those without dedicated IT staff to manage effectively Review collected by and hosted on G2.com.

What problems is ThreatLocker solving and how is that benefiting you?

ThreatLocker helps us manage the risk of users clicking without thinking by blocking unauthorized applications and controlling software usage. It gives us visibility and control over what runs in our environment, reducing the chances of accidental or malicious software execution. Review collected by and hosted on G2.com.

Show More
Show Less

Microsoft Defender for Endpoint is a unified platform for preventative protection, post-breach detection, automated investigation, and response.

Top Anti-Malware Software Result from Endpoint Detection & Response (EDR)

Also listed in Antivirus, Endpoint Protection Platforms


Verified User in Manufacturing
AM
Original Information
“Endpoint security solution that includes EDR, ASR, Email Security and more”
What do you like best about Microsoft Defender for Endpoint?

We use Microsoft Defender for Endpoint on a very large deployment and most of the endpoints were previously running Cortex XDR. Defender provides high level of protections against cyber treats. Our GSOC team investigates incidents and deploys security policies via the Microsoft Defender portal. We were able to detect and stop cyber attacks in the very early stages and this helps us keep the environment clean. So far we haven't had any major incidents. Review collected by and hosted on G2.com.

What do you dislike about Microsoft Defender for Endpoint?

It takes a lot of training and constant learning, managing the security policies for all protection modules is a complex process. There is no Linux support at this time. Review collected by and hosted on G2.com.

What problems is Microsoft Defender for Endpoint solving and how is that benefiting you?

Helps us quickly and efficiently detect and stop cyber attacks. Integration through third party CTI platforms allows us to import EDL block lists and to assign risk scores to IOCs, which helps when investigating incidents in the Microsoft Defender portal. Review collected by and hosted on G2.com.

Show More
Show Less

CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene,

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Identity Threat Detection and Response (ITDR), AWS Marketplace, Extended Detection and Response (XDR) Platforms, User and Entity Behavior Analytics (UEBA), Managed Detection and Response (MDR)


Sahil K.
SK
Original Information
“Crowdstrike :Advanced and powerful Al Native Endpoint protection platform.”
What do you like best about CrowdStrike Falcon Endpoint Protection Platform?

Crowdstrike gives many reason to like with many features .

Single unified Console and lightweight agent for all services.

deployed in minutes and NO reboot required.

And you can manage the all your services on singel console .

Api integration with many vendors are availble.24/7 support services also avilable in crowdstrike.

you can use this daily without any headache. Review collected by and hosted on G2.com.

What do you dislike about CrowdStrike Falcon Endpoint Protection Platform?

in some cases customer face issue with mulitple tabs to understand but this is not a big issue.When you handy with console you can easily manage this. Review collected by and hosted on G2.com.

What problems is CrowdStrike Falcon Endpoint Protection Platform solving and how is that benefiting you?

the big problem sloved by crowdstrike falcon is you do not need to manage multiple console of your different services .crowdstrike gives you singel console with singel agent.And provide you deep route casuse analysis of threats with mitre framework .And automate remedation and qurantine services for malicious threats .And with in built SOAR capability that helps you to make you work easie and in automate way. Review collected by and hosted on G2.com.

Show More
Show Less

Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.

Top Anti-Malware Software Result from Cloud Data Security

Also listed in Insider Threat Management (ITM), Malware Analysis Tools, Cloud Security Monitoring and Analytics, Cloud File Security, Cloud Compliance


LJ
Original Information
“Coro Cyber Security”
What do you like best about Coro Cybersecurity?

It sits in front of the office 365 and uses the AI to identify and flag potential spam and phishing. it puts the white list and black list for office 365 on a single dashboard allowing the administrator to easily change the list. (anyone that is using office 365 knows the admin console is very clunky to get around in)

There have been a couple improvements in the dashboard and they are moving towards a very intuitive platform that will be extrememly easy to use Review collected by and hosted on G2.com.

What do you dislike about Coro Cybersecurity?

It appears to be a little particular about the version of outlook for the coro add-in so the end users can let the admin know what they think of the flagged e-mails. This is still an issue. Review collected by and hosted on G2.com.

What problems is Coro Cybersecurity solving and how is that benefiting you?

It makes it tremendously easier to white list or blacklist e-mails individual addresses or whole domains.

it also is constantly looking for other threats such as credit card numbers inside e-mail bodies to try and mitigate risks.

we are also using the endpoint protection in conjunction with our WEBROOT.

it really seems to strengthen or cybersecurity no issues so far Review collected by and hosted on G2.com.

Show More
Show Less

Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Endpoint Management, Antivirus


AR
“Check Point Harmony Endpoint: An Effective EDR Solution with Behavioral Analysis Capabilities”
What do you like best about Check Point Harmony Endpoint?

My experience is overall good. it provide strong security against a wide range of threats. Harmony endpoint integrates advanced threat prevention and detection features to safeguard endpoint from evolving cyber threats. providing an in-depth analysis of its effectiveness in securing modern IT environments. Support and Implementation is also very easy and effective. Review collected by and hosted on G2.com.

What do you dislike about Check Point Harmony Endpoint?

There is nothing to dislike for this checkpoint EDR solution. But Support part can be approved. Review collected by and hosted on G2.com.

What problems is Check Point Harmony Endpoint solving and how is that benefiting you?

I like the most about EDR solution is behavioral analysis to detect and respond to anomalous activities that may indicate a security threat. including monitoring for unusual patterns in file activity, process behavior and network connections etc. Comprehensive, multi-layered protection. Ease of use. Threat Intelligence with Advanced Threat Protection can be summarized as some good to have features in the solution. Lastly, the integration with Checkpoint Threat Cloud for up-to-date threat intelligence is a competitive killer and a standout feature. Review collected by and hosted on G2.com.

Show More
Show Less
FortiClient

FortiClient

(205)4.4 out of 5

FortiClient

(205)4.4 out of 5

FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vu

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Endpoint Management, Antivirus, Zero Trust Networking, Zero Trust Platforms


Alex F.
AF
Original Information
“A Flexible Endpoint Management Tool”
What do you like best about FortiClient?

The flexibility above all. FortiClient can provide endpoint protection, remote access, zero trust, MFA and a host of other solutions all in one package. Review collected by and hosted on G2.com.

What do you dislike about FortiClient?

Documentation is lacking but bugs sure aren't/ Review collected by and hosted on G2.com.

What problems is FortiClient solving and how is that benefiting you?

Primarily remote access, some web content filtering and vulnerability scanning. Review collected by and hosted on G2.com.

Show More
Show Less

Bitdefender Antivirus Plus 2018 delivers multiple layers of protection against ransomware. It uses behavioral threat detection to prevent infections, and protects your most im

Top Anti-Malware Software Result from Antivirus


janus a.
JA
“bitdefender antivirus plus 2020 user review”
What do you like best about Bitdefender Antivirus Plus 2020?

It is very secure and vigilant against all links, websites, and files you are opening. Review collected by and hosted on G2.com.

What do you dislike about Bitdefender Antivirus Plus 2020?

As I have said, it is very secure and vigilant. It sometimes block even the app or websites you frequently use. Review collected by and hosted on G2.com.

What problems is Bitdefender Antivirus Plus 2020 solving and how is that benefiting you?

It helps keeps your computer/phone/gadgets safe. It automatically blocks everything it detects that are not safe. Review collected by and hosted on G2.com.

Show More
Show Less

Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, ra

Top Anti-Malware Software Result from Endpoint Detection & Response (EDR)

Also listed in Identity Threat Detection and Response (ITDR), Extended Detection and Response (XDR) Platforms, Deception Technology, Endpoint Protection Platforms, Vulnerability Scanner


Sahil K.
SK
“Singularity Unleashed : One platform for all threats & Autonomous security”
What do you like best about SentinelOne Singularity?

Best thing in sentinelone have autonomous threat detection and response.

single unified console for Endpoint ,identity and cloud security .

User friendly console you can easily manage all the assets easy to deploy policy.Single policy for window ,mac and linux .and auto response also available one click kill & quarantine , remediate and best feature is one click rollback .Rollback feature helps you to revert back impact of ransomware in attack condition.

and much more features like device control and patient feature storyline star custom rule.Ease to implementation for all types of OS ,legacy os also supported.

Frequently usable and ease to integrate with other vendors. Review collected by and hosted on G2.com.

What do you dislike about SentinelOne Singularity?

device control policy is bit confusing some time for cutomers. Review collected by and hosted on G2.com.

What problems is SentinelOne Singularity solving and how is that benefiting you?

traditional AV alert volume is very high and not capable of detect sphociated attacks.So sentinelone have the power of AI which helps you to detect every types of threats in real time. Review collected by and hosted on G2.com.

Show More
Show Less

Antivirus uses real-time virus signatures and anomaly-based protections from ThreatCloud, extensive threat intelligence to proactively stop threats and manage security service

Top Anti-Malware Software Result from Antivirus


AY
“Check Point Antivirus Detection capabilities”
What do you like best about Check Point Antivirus?

Check Point offers robust threat detection capabilities. During testing and user acceptance phases of deployment, the solution consistently identified ransomware attempts and suspicious file behavior that other tools failed to catch. The Anti-Bot and Anti-Ransomware modules are particularly strong, providing proactive protection. Ease of use and implementation. Support is also good. Review collected by and hosted on G2.com.

What do you dislike about Check Point Antivirus?

The solution can be resource-intensive—especially during full system scans or when sandboxing suspicious files. This can noticeably slow down older or lower-spec machines. Moreover, the initial setup and policy configuration process isn't very intuitive and could benefit from simplification. Review collected by and hosted on G2.com.

What problems is Check Point Antivirus solving and how is that benefiting you?

Traditional antivirus solutions often react to threats too late. Check Point’s Threat Emulation and Anti-Ransomware capabilities allow for proactive defense by detecting and blocking zero-day exploits before they can propagate. This has helped us prevent multiple incidents, particularly for remote users, where timely protection is critical. Review collected by and hosted on G2.com.

Show More
Show Less
MetaDefender

MetaDefender

(14)4.5 out of 5

MetaDefender

(14)4.5 out of 5

MetaDefender is a software that analises suspicious files.

Top Anti-Malware Software Result from Antivirus

Also listed in Data Loss Prevention (DLP), Threat Intelligence, Cloud File Security, Vulnerability Scanner


AS
“Seamless software for file security and protection against malware and data breaches”
What do you like best about MetaDefender?

The software is great as it helps one to scan the whole computer hence eliminating threats. The platform helps users to know and get all the solutions to the problems that they may experience when they are operating the computer. The software has also a splendid supportive team that is always on the foremost path in helping their customers and this leads to great customer satisfaction. Review collected by and hosted on G2.com.

What do you dislike about MetaDefender?

The platform is a game-changer in every sense!! it has exceeded my expectations as it has a low price that is budget-friendly and a great user interface that is simple to use and I could recommend it to all individuals. Review collected by and hosted on G2.com.

What problems is MetaDefender solving and how is that benefiting you?

The platform is great as it enables its users to have a clean computer that is free from malicious files. The platform is an indispensable tool to most users as it allows them to upload all kinds of documents as it scans online before saving them on the system. The platform enables most of the companies to secure their data and sensitive files that could be in a computer and it erase the dangerous files that could corrupt the computer. Review collected by and hosted on G2.com.

Show More
Show Less

Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Mode

Top Anti-Malware Software Result from Endpoint Management

Also listed in Antivirus


PV
“Powerful Application Control enabling Enhanced Security”
What do you like best about Carbon Black App Control?

It has given us confidence in securing critical systems by preventing unauthorized apps from running reducing out attack surface. The best part is it is easy to use and implement with good integration capabilities. Carbon Black Support is awesome and the long-term benefits of using the product every day helped us enhance security and compliance. Review collected by and hosted on G2.com.

What do you dislike about Carbon Black App Control?

While rare, we have encountered a few false positives like any other tool. But we took care of this with manual whitelisting. Carbon Black provides excellend value for organizations with strict security needs and hence, smaller organizations may find the pricing on the higher side. Review collected by and hosted on G2.com.

What problems is Carbon Black App Control solving and how is that benefiting you?

It has reduced Unauthorized Apps from running on our Endpoints significantly thus reducing the risk of malware infections. It also helps us meet compliance requirements where we allow only authorized applications to run. Another benefit is we can have strict lockdown on critical servers where security is crucial. Review collected by and hosted on G2.com.

Show More
Show Less

Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. AMP can uncover even

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Endpoint Detection & Response (EDR), Antivirus, Endpoint Management


Jay K.
JK
“Superior in Endpoint Security”
What do you like best about Cisco Secure Endpoints?

Ease of use and deployment to our endpoints. Policy customization and reporting is excellent. Reasearching and finding root cause of an issue with tools provided helps tremendously as well. Review collected by and hosted on G2.com.

What do you dislike about Cisco Secure Endpoints?

Only issue we have come accross is the usability of the product with deprecated operating systems. We understand the risk in that area, but some systems take time to upgrade and many moving parts on said systems might not support newer operating systems. Review collected by and hosted on G2.com.

What problems is Cisco Secure Endpoints solving and how is that benefiting you?

It helps us solve issues with software vulnerabilties, provides solid antivirus and the ability to isolate a machine off the network if a problem is found. Plus so much more. Review collected by and hosted on G2.com.

Show More
Show Less

Absolute accelerates its customers’ shift to work-from-anywhere through the industry’s first self-healing Zero Trust platform, helping to ensure maximum security and uncomprom

Top Anti-Malware Software Result from Endpoint Management

Also listed in Unified Endpoint Management (UEM), Endpoint Protection Platforms


Jeremy B.
JB
“Absolutely essential security! Do you know where your endpoints are? What they are being used for?”
What do you like best about Absolute Secure Endpoint?

Ability to track our endpoints throughout the life of the machine, monitor compliance, freeze devices for compliance or theft, peace of mind that the agent is tamper resistant, ability to physically locate the devices, enforce security policies remotely. Customer support is great, and we are able to get quick responses when we open a ticket with clear resolutions. Our team appreciates the updates to the console as it is straight forward to use and the agent activation was easy to integrate into our imaging process. We use it daily to manage and track devices and look forward to integrating into our SNOW CMDB in the near future. Review collected by and hosted on G2.com.

What do you dislike about Absolute Secure Endpoint?

Honestly, not many downsides - biggest issue we have at the moment is the licensing model. We have put in a request to "downgrade" machines that are in a "frozen/Wipe/unenroll" state as they still take up a regular license while in a "limbo" or transitional state. Sometimes we are not able to account for the device and although we would like to unenroll the machine, we still want the ability to wipe any data from it prior to unenroll - were it ever to come back online. These types of machines still require a full license even though they may never come back online and are not being actively managed. Review collected by and hosted on G2.com.

What problems is Absolute Secure Endpoint solving and how is that benefiting you?

We are able to keep track of our laptop fleet. This includes work from home, remote work, traveling, and on-site because we have several campus locations. The ability to freeze assets due to theft, employee turnover, or compliance is key. We also value the compliance reporting abilities for various other tools we have installed on the machines and the ability to heal not only the absolute agent, but other tools as deemed necessary. Another feature we use is storing data in custom fields for devices so that we are able to access that info at a glance from the console. Review collected by and hosted on G2.com.

Show More
Show Less

Kaspersky AntiVirus is the smarter way to protect everything on your PC… to help keep you safe from viruses, spyware & Trojans – and help stop ransomware locking up all your f

Top Anti-Malware Software Result from Antivirus


Wally algenis G.
WG
“I am the administrator of the solution and the recommendation I give you is 10/10”
What do you like best about Kaspersky AntiVirus?

Its holistic behavior in detecting network threats blocked and reports on what was done. Review collected by and hosted on G2.com.

What do you dislike about Kaspersky AntiVirus?

I like the versatility that has advantages, easy to handle at least in the business part, which is the environment where I use it. Review collected by and hosted on G2.com.

What problems is Kaspersky AntiVirus solving and how is that benefiting you?

Most malware accesses Link pages Review collected by and hosted on G2.com.

Show More
Show Less

Top Anti-Malware Software Result from Antivirus

Also listed in Email Anti-spam


SK
“a good security companion”
What do you like best about Avast Small Office Protection?

the best about avast is this is your one to go software , you dont need anything else just install it and you are done . it has simple interface and ui for seemless experience and its protection is amazing , it help to block every unwanted things in my system , i just love it and countinue using it for years. and customer support is amzing as soon as you complain it get ressolved. Review collected by and hosted on G2.com.

What do you dislike about Avast Small Office Protection?

least helpful is some feature like some lag issue , or system boot time increasment and some more background activity , and not so noticeable , but yeah a decent good enough. Review collected by and hosted on G2.com.

What problems is Avast Small Office Protection solving and how is that benefiting you?

it solve my all problems , it solve my protection against the virus and trojens , it help me to go seemless over the internet and provide clutterfree experience. Review collected by and hosted on G2.com.

Show More
Show Less
Agency

Agency

(41)4.8 out of 5

Agency

(41)4.8 out of 5

Agency for Business provides personalized managed cybersecurity for your organization's most vulnerable threat surface, the digital lives of your employees. Businesses use Age

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Digital Risk Protection (DRP) Platforms, Employee Identity Theft Protection


Herman P.
HP
Original Information
“Fantastic cybersecurity, and a great team”
What do you like best about Agency?

Vicky, Tyler, and the whole Agency team are fantastic and have made the process for maintaining our security posture simple and straightforward. To give you an idea about how good they are, I really haven't thought about our cybersecurity or device management at all in the almost year that we've been using Agency. Implementing it took maybe 30 minutes total, with our whole team getting on a Zoom and it was done. Review collected by and hosted on G2.com.

What do you dislike about Agency?

I think Agency is most useful for companies with high risk devices. The UI / UX on their platform could use some work. Review collected by and hosted on G2.com.

What problems is Agency solving and how is that benefiting you?

Agency helped us get set up with multi-device management on high risk employee devices, along with installing VPNs and other monitoring services. This helps us with security compliance and simply maintaining our security posture. Their threat detection is great, and so is their penetration testing which revealed some vulnerabilities which we were quickly able to remediate. Review collected by and hosted on G2.com.

Show More
Show Less