Endpoint Protection Platforms Reviews and Ratings

What is an Endpoint Protection Platform?

Gartner defines an endpoint protection platform (EPP) as security software designed to protect managed endpoints — including desktop PCs, laptop PCs, mobile devices and, in some cases, server endpoints — against known and unknown malicious attacks. EPPs provide capabilities for security teams to investigate and remediate incidents that evade prevention controls. EPP products are delivered as software agents, deployed to endpoints, and connected to centralized security analytics and management consoles. EPPs provide a defensive security control to protect end-user endpoints against known and unknown malware infections using a combination of security techniques (such as static and behavioral analysis) and system controls (such as device control and host firewall management). EPP prevention and protection capabilities are deployed as a part of a defense-in-depth strategy to help reduce the attack surface and minimize the risk of endpoint compromise. EPP detection and response capabilities are used to uncover, investigate, and respond to endpoint threats that evade security prevention, often as a part of broader security operations platforms.

Products In Endpoint Protection Platforms Market

"SentinelOne Singularity Platform is a soldier"

SentinelOne products I like the most, SentinelOne has a meaning that is like a soldier it protects. It's a SaaS based console and a truly friendly console which I like the most and it's easy to understand the options in SentinelOne Product. A major and extraordinary feature is Snapshot, SentinelOne Singularity Platform takes snapshots of the endpoints and servers where we have installed the agent with the help of VSS it takes the snapshot on an incremental basis every four hours. If the attacker encrypts the system, with the help of the rollback feature we can restore the snapshot with the help of SentinelOne Agent. Easy to configure policies for Endpoints and Servers.

Read reviews

"Trellix: Delivering prompt solutions and unrivaled Customer Support"

The overall experience in using Trellix ENS and its solution is the customization it offers in terms of management and dashboards. Trellix provides in-built queries which are very useful for administrators and they even provide a feature called EEDK where we can write our own scripts and deploy them to the machines from EPO (Trellix Management Console) and view the results in a single pane. It's more user friendly.

Read reviews

"Integrating Sophos Intercept for Strong IT Endpoint Security"

Using the Sophos Intercept application as an antivirus solution is a great experience for our organization. This will allow us to secure our IT endpoints from external threats and malware attacks. the transition from existing solutions to Sophos is also seamless and complete within projected timelines with no impact on productivity. Our Data and compliance team is also satisfied with the reports shared by Sophos dashboard.

Read reviews

"Transform Your Firm's Cyber Security Ground with Microsoft Defender for Endpoint"

My experience while Microsoft Defender for Endpoint is unmatched. The first feature that I noted about this product is its powerful machine learning abilities that ensure that it detects and blocks sophisticated attacks before they can cause any harm. It also has an endpoint detection and response ability which allows the user to swiftly investigate and respond to any security incidences. Additionally, it provides very detailed insights into any attack timeline, which then allows the firm's security team to understand the impact as well as the scope of the security incidence. Another notable advantage of this product is its threat hunting capability which ensures that a business proactively searches for and identifies any potential threats located in its network. It also has threat analytics which issues reports from Microsoft security experts regarding recent high impact threats, which then keeps the firm aware of its environment. Its behavioral blocking and containment is another key feature that helps in the identification of threats based on process behaviors at endpoints, including when attacks are ongoing. You can never go wrong with this product as it really stands out in its ability to to offer comprehensive security while not compromising a user experience.

Read reviews

"good to manage and updated "

very good end point anti virus as well as manage easily from console easy to update version we are using since 15 years

Read reviews

"Revolutionizing Endpoint Security with Falcon's Real-Time Features"

Crowdstrike Falcon provides real-time visibility in identifying the threats, its rapid responding capabilities help to take efficient action against those threats, and its comprehensive threat intelligence helps to provide in-depth insights on the threats. The lightweight agent operates efficiently without impacting the performance of the system. It also continuously monitors the activities of endpoints and uses machine learning algorithms to detect and block those malicious behaviors. its cloud-native design processes the threat data in real-time, enabling immediate detection and response to it. It provides centralized management and visibility across all endpoints in larger organizations. It works efficiently with the integration of threat intelligence, involving seamless collection and analysis of data from various global sources from which falcon delivers actionable insights to the organizations to keep the environment ahead of emerging threats.

Read reviews

"Streamlining Enterprise Security: A Look at Trend Micro's Endpoint Security"

Trend micro-endpoint security delivers robust protection against diverse threats with efficient deployment, intuitive management, minimal performance impacts and comprehensive features like EDR and web filtering, making it ideal for enterprise security

Read reviews

"Education based review"

We have been using ESET for some time now and with great success, ESET provides us multi-site management through one single web application. Where we need to contact ESET Support, these requests have been handled well. On an occasion where we needed to manage a security issue, ESET were able to support us in advising us of the best action to take.

Read reviews

"Protection that your business CAN rely on!"

I've been with MWB (Threat Down) for several years now and the product just keeps getting better! New features are being added all the time, making it more and more the one-stop shop to protect your endpoints from the digital world! Having worked through a ransomware attack, I know the dangers of not protecting every endpoint and what that can mean for the business. Their simple but powerful approach to securing endpoints in multiple ways gives me total peace of mind that my business is protected 24 hours 365 days of the year.

Read reviews

"Cylance PROTECT "

Implementation was taken at a pace of walk, jog, run. We were able to pilot the installation for a group of computers, keeping our existing solution in place. We configured Cylance PROTECT to monitor initially and then moved forward with protection later. Deployment has given us the ability to manage computers all around the world, without systems being joined to network.

Read reviews

"Bitdefender Gravity Zone: A Levitated Antivirus Experience"

Bitdefender gravity zone has been a great antivirus solution. The interface has offered us a lot of unique functionality. We are able to setup policies. It has a great web filtering feature that allows us to white/blacklist websites. We've had a great overall experience setting this up and implementing different features.

Read reviews

"Harmony Endpoint: The Ultimate Defense Against Cyber Threats"

Harmony Endpoint by Check Point is a top-notch endpoint security solution that has greatly enhanced our organizational cybersecurity posture. With its comprehensive set of features and seamless integration with our existing infrastructure, it has become and indispensable toll on our defense against cyber threats.

Read reviews

"Thank you Sophos "

Sophos End point protect has helped our organization to improve our security posture. We are quite happy with the product and support from Sophos team. it is also helped our organization to align our goal in terms of protecting entire organization from cyber threat.

Read reviews

"Unveiling the power of Cortex XDR in Endpoint Protection."

Cortex XDR provides full visibility into our organization's security across our endpoints and networks.Cortex XDR continuously detects and stops sophisticated threat attacks and also adapts defense mechanisms to prevent future attacks.Cortex XDR is very useful as it streamlines our security operations.

Read reviews

"Why we're safer with Carbon Black"

Carbon Black gives us the ability to keep our systems in a known state. It provides controls that help achieve our audit/security investigation requirements, while also preventing undesired events within our environment. It's exceptional because it does all of these with very simple and low maintenance infrastructure. The ability to threat hunt based on TTPs not just known good or bad events is also invaluable.

Read reviews

"Safeguard your Devices with FortiClient's Functionality - You can always trust!"

FortiClient is a Robust Endpoint Protection that offers a comprehensive set of Advanced features to safeguard device.

Read reviews

"Great products. Great service. Real value."

responsive, timely communications at all points in the process

Read reviews

"Exceptional Support a Standout Feature of WatchGuard Endpoint Protection"

WatchGuard Endpoint Protection has been a solid addition to our security stack. It's reliable, easy to use, and the deployment was smooth. I really appreciate how it's simplified our endpoint management and improved our overall security.

Read reviews

"Security and protection"

Webroot endpoint security is an excellent security solution for both the operating systems - Windows as well as Mac OSX. They provide with regular updates and definitions for protection. It ads a layer on top of the regular anti-virus security which by itself is not enough. This added layer provides protection against attacks, worms, viruses on sites, and other protections.

Read reviews

"End Point Review"

Cloud based,have patch management and device control.Easy to use

Read reviews
Products 1 - 20