Introducing G2.ai, the future of software buying.Try now

Top Free Endpoint Protection Platforms

Check out our list of free Endpoint Protection Platforms. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Endpoint Protection Platforms to ensure you get the right product.

View Free Endpoint Protection Platforms

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
22 Endpoint Protection Platforms Products Available
(1,069)4.6 out of 5
Optimized for quick response
3rd Easiest To Use in Endpoint Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – to protect people, devices, and dat

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatDown features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Compliance
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 9.0
    8.9
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HH
    Very simple and user friendly, does exactly what it says it does. quick to roll out to staff. quick support as well. Read review
    Verified User in Computer & Network Security
    CC
    Ease of use, sophistication of service for price, central portal for management. I use this on client servers/pc's along side Windows Defender... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Santa Clara, CA
    Twitter
    @Malwarebytes
    85,806 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    626 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – to protect people, devices, and dat

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Small-Business
  • 41% Mid-Market
ThreatDown features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
9.1
Compliance
Average: 8.9
9.0
Endpoint Intelligence
Average: 9.0
8.9
Behavioral Analysis
Average: 8.7
HH
Very simple and user friendly, does exactly what it says it does. quick to roll out to staff. quick support as well. Read review
Verified User in Computer & Network Security
CC
Ease of use, sophistication of service for price, central portal for management. I use this on client servers/pc's along side Windows Defender... Read review
Seller Details
Company Website
Year Founded
2008
HQ Location
Santa Clara, CA
Twitter
@Malwarebytes
85,806 Twitter followers
LinkedIn® Page
www.linkedin.com
626 employees on LinkedIn®
(817)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Endpoint Protection Platforms software
View top Consulting Services for Sophos Endpoint
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sophos Endpoint is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Sophos Endpoint has been proven to prevent even the most advanced ransomwar

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Mid-Market
    • 18% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sophos Endpoint features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Compliance
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 9.0
    9.2
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer & Network Security
    CC
    The centralized cloud management console significantly eases the administration and correlation of events among the different Sophos solutions.... Read review
    PD
    I love how Sophos Endpoint offers easy deployment through Group Policy Object (GPO), which streamlines the installation process across multiple... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Company Website
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,769 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,477 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sophos Endpoint is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Sophos Endpoint has been proven to prevent even the most advanced ransomwar

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Mid-Market
  • 18% Enterprise
Sophos Endpoint features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 8.9
9.3
Compliance
Average: 8.9
9.4
Endpoint Intelligence
Average: 9.0
9.2
Behavioral Analysis
Average: 8.7
Verified User in Computer & Network Security
CC
The centralized cloud management console significantly eases the administration and correlation of events among the different Sophos solutions.... Read review
PD
I love how Sophos Endpoint offers easy deployment through Group Policy Object (GPO), which streamlines the installation process across multiple... Read review
Seller Details
Seller
Sophos
Company Website
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,769 Twitter followers
LinkedIn® Page
www.linkedin.com
5,477 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(919)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Endpoint Protection Platforms software
View top Consulting Services for ESET PROTECT
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 46% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Compliance
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 9.0
    8.8
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • TL
    This software is easy to use because it has a user-friendly interface. Users have control over the features, which are easy to handle for device... Read review
    PP
    I appreciate the real-time threat detection, as it delivers strong protection without noticeably affecting performance. I also value its advanced... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    277,257 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,944 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 46% Mid-Market
ESET PROTECT features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
9.2
Compliance
Average: 8.9
9.2
Endpoint Intelligence
Average: 9.0
8.8
Behavioral Analysis
Average: 8.7
TL
This software is easy to use because it has a user-friendly interface. Users have control over the features, which are easy to handle for device... Read review
PP
I appreciate the real-time threat detection, as it delivers strong protection without noticeably affecting performance. I also value its advanced... Read review
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
277,257 Twitter followers
LinkedIn® Page
www.linkedin.com
1,944 employees on LinkedIn®
(526)4.6 out of 5
14th Easiest To Use in Endpoint Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    It’s the digital armor protecting you and your business from devastating, multi-layered cyberattacks. The truth is, antivirus just isn't enough anymore. Today’s cybercriminals layer their attack met

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 54% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Webroot Business Endpoint Protection features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    8.8
    Compliance
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 9.0
    8.8
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Joshua M.
    JM
    Lightweight software that doesn't slow down our daily users. Doesn't interfere with any programs we use in our company. The cost vs dependability... Read review
    AA
    By choosing a managed Webroot Business Endpoint Protection solution, companies no longer have to worry about malware protection. The managed... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Webroot
    Year Founded
    1997
    HQ Location
    Broomfield, CO
    Twitter
    @Webroot
    60,560 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    256 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

It’s the digital armor protecting you and your business from devastating, multi-layered cyberattacks. The truth is, antivirus just isn't enough anymore. Today’s cybercriminals layer their attack met

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 54% Small-Business
  • 41% Mid-Market
Webroot Business Endpoint Protection features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
8.8
Compliance
Average: 8.9
9.0
Endpoint Intelligence
Average: 9.0
8.8
Behavioral Analysis
Average: 8.7
Joshua M.
JM
Lightweight software that doesn't slow down our daily users. Doesn't interfere with any programs we use in our company. The cost vs dependability... Read review
AA
By choosing a managed Webroot Business Endpoint Protection solution, companies no longer have to worry about malware protection. The managed... Read review
Seller Details
Seller
Webroot
Year Founded
1997
HQ Location
Broomfield, CO
Twitter
@Webroot
60,560 Twitter followers
LinkedIn® Page
www.linkedin.com
256 employees on LinkedIn®
(294)4.8 out of 5
7th Easiest To Use in Endpoint Protection Platforms software
View top Consulting Services for ThreatLocker Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatLocker is a comprehensive cybersecurity solution designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This s

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 62% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Compliance
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 9.0
    8.5
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • DF
    ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
    Verified User in Transportation/Trucking/Railroad
    AT
    We are highly impressed with ThreatLocker’s ability to quickly deploy their solution in critical situations, such as during the CDK breach. Their... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,654 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    650 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatLocker is a comprehensive cybersecurity solution designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This s

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 62% Small-Business
  • 32% Mid-Market
ThreatLocker Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 8.9
9.2
Compliance
Average: 8.9
9.0
Endpoint Intelligence
Average: 9.0
8.5
Behavioral Analysis
Average: 8.7
DF
ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
Verified User in Transportation/Trucking/Railroad
AT
We are highly impressed with ThreatLocker’s ability to quickly deploy their solution in critical situations, such as during the CDK breach. Their... Read review
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,654 Twitter followers
LinkedIn® Page
www.linkedin.com
650 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Delivered from the cloud or on-premises, Kaspersky Endpoint Security for Business provides flexible security for mixed environments, incorporating a full stack of ‘building blocks’ to deliver automate

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaspersky Endpoint Security for Business features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.9
    Compliance
    Average: 8.9
    8.9
    Endpoint Intelligence
    Average: 9.0
    8.7
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VIDYASAGARREDDY K.
    VK
    Security and Cost-efficient easy to use, blocking USB ports installation process is very simple. Read review
    Verified User in Transportation/Trucking/Railroad
    AT
    price, security and support are top notch Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaspersky
    Year Founded
    1997
    HQ Location
    Moscow
    Twitter
    @kasperskylabind
    1,299 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,439 employees on LinkedIn®
    Phone
    1-866-328-5700
Product Description
How are these determined?Information
This description is provided by the seller.

Delivered from the cloud or on-premises, Kaspersky Endpoint Security for Business provides flexible security for mixed environments, incorporating a full stack of ‘building blocks’ to deliver automate

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Mid-Market
  • 33% Small-Business
Kaspersky Endpoint Security for Business features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 8.9
8.9
Compliance
Average: 8.9
8.9
Endpoint Intelligence
Average: 9.0
8.7
Behavioral Analysis
Average: 8.7
VIDYASAGARREDDY K.
VK
Security and Cost-efficient easy to use, blocking USB ports installation process is very simple. Read review
Verified User in Transportation/Trucking/Railroad
AT
price, security and support are top notch Read review
Seller Details
Seller
Kaspersky
Year Founded
1997
HQ Location
Moscow
Twitter
@kasperskylabind
1,299 Twitter followers
LinkedIn® Page
www.linkedin.com
4,439 employees on LinkedIn®
Phone
1-866-328-5700
(217)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Endpoint Protection Platforms software
Save to My Lists
Entry Level Price:Starting at $9.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 58% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro is a cybersecurity product that provides protection for small businesses, with features such as flagging potential spam and phishing, and offering a dashboard for easy administration.
    • Reviewers appreciate the product's high success rate in capturing threats, its intuitive platform, and the responsive and helpful support team that makes the onboarding process easy.
    • Users experienced issues with the product being particular about the version of Outlook for the Coro add-in, the inability to interact directly with the Bitdefender agent on local machines, and unclear instructions on how to resolve errors.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Compliance
    Average: 8.9
    9.7
    Endpoint Intelligence
    Average: 9.0
    9.7
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,913 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    324 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 58% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro is a cybersecurity product that provides protection for small businesses, with features such as flagging potential spam and phishing, and offering a dashboard for easy administration.
  • Reviewers appreciate the product's high success rate in capturing threats, its intuitive platform, and the responsive and helpful support team that makes the onboarding process easy.
  • Users experienced issues with the product being particular about the version of Outlook for the Coro add-in, the inability to interact directly with the Bitdefender agent on local machines, and unclear instructions on how to resolve errors.
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 8.9
9.6
Compliance
Average: 8.9
9.7
Endpoint Intelligence
Average: 9.0
9.7
Behavioral Analysis
Average: 8.7
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,913 Twitter followers
LinkedIn® Page
www.linkedin.com
324 employees on LinkedIn®
(366)4.6 out of 5
Optimized for quick response
6th Easiest To Use in Endpoint Protection Platforms software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Compliance
    Average: 8.9
    9.3
    Endpoint Intelligence
    Average: 9.0
    9.2
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Chinthaka J.
    CJ
    Crowdstrike falcon is a multi feature edr platform that replaces traditional antivirus platforms using a single light weight agent. Its menu... Read review
    BC
    I appreciate its cloud-native architecture and the single lightweight agent that provides powerful EDR capabilities without impacting system... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    108,887 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,831 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Enterprise
  • 40% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.1
Compliance
Average: 8.9
9.3
Endpoint Intelligence
Average: 9.0
9.2
Behavioral Analysis
Average: 8.7
Chinthaka J.
CJ
Crowdstrike falcon is a multi feature edr platform that replaces traditional antivirus platforms using a single light weight agent. Its menu... Read review
BC
I appreciate its cloud-native architecture and the single lightweight agent that provides powerful EDR capabilities without impacting system... Read review
Seller Details
Company Website
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
108,887 Twitter followers
LinkedIn® Page
www.linkedin.com
10,831 employees on LinkedIn®
(200)4.2 out of 5
Optimized for quick response
View top Consulting Services for IBM MaaS360
Save to My Lists
Entry Level Price:$4.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its

    Users
    • IT Manager
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM MaaS360 features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Compliance
    Average: 8.9
    7.5
    Endpoint Intelligence
    Average: 9.0
    6.7
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Yash K.
    YK
    I like it becasue it has features like easy device enrollment that makes it ease of use, one can manage application and also deploy policies... Read review
    Verified User in Information Technology and Services
    UI
    - easy device management -UI is great and easy to use - security is also good - also I liked that we can integrate with other apps well Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    708,887 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its

Users
  • IT Manager
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Mid-Market
  • 35% Enterprise
IBM MaaS360 features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 8.9
9.6
Compliance
Average: 8.9
7.5
Endpoint Intelligence
Average: 9.0
6.7
Behavioral Analysis
Average: 8.7
Yash K.
YK
I like it becasue it has features like easy device enrollment that makes it ease of use, one can manage application and also deploy policies... Read review
Verified User in Information Technology and Services
UI
- easy device management -UI is great and easy to use - security is also good - also I liked that we can integrate with other apps well Read review
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
708,887 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
(247)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Endpoint Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

    Users
    • SOC Analyst
    • Technical Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 58% Mid-Market
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Compliance
    Average: 8.9
    9.5
    Endpoint Intelligence
    Average: 9.0
    9.4
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AT
    The platform is user friendly and easy to use, there are several protection engines to ensure the security of devices where antivirus is installed.... Read review
    GI
    Cynet is a Leader in Cynersecurity and with this platform i find all that i need, deploy agent with centralized console, fully cloud system so i... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynet
    Company Website
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @Cynet360
    1,121 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

Users
  • SOC Analyst
  • Technical Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 58% Mid-Market
  • 30% Small-Business
Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 8.9
9.3
Compliance
Average: 8.9
9.5
Endpoint Intelligence
Average: 9.0
9.4
Behavioral Analysis
Average: 8.7
AT
The platform is user friendly and easy to use, there are several protection engines to ensure the security of devices where antivirus is installed.... Read review
GI
Cynet is a Leader in Cynersecurity and with this platform i find all that i need, deploy agent with centralized console, fully cloud system so i... Read review
Seller Details
Seller
Cynet
Company Website
Year Founded
2014
HQ Location
Boston, MA
Twitter
@Cynet360
1,121 Twitter followers
LinkedIn® Page
www.linkedin.com
317 employees on LinkedIn®
(121)4.4 out of 5
Optimized for quick response
View top Consulting Services for WatchGuard Endpoint Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WatchGuard Endpoint Security solutions help you safeguard devices against cyber threats. WatchGuard EPDR and Advanced EPDR, our AI-powered flagship endpoint solutions, enhance your security posture by

    Users
    • Software Developer
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 55% Small-Business
    • 34% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WatchGuard Endpoint Security features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 8.9
    8.9
    Compliance
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 9.0
    8.6
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Dustin  S.
    DS
    Panda Security is a software that is perfectly consistent with laptops, smartphones running Desktop, Android or Mac operating systems. In terms of... Read review
    Steven D.
    SD
    It is a quality antivirus, with its EP and EDR solutions, it quickly detects with a thorough analysis any threat that may be lurking in my work... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1996
    HQ Location
    Seatle, WA
    Twitter
    @watchguard
    19,516 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,201 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

WatchGuard Endpoint Security solutions help you safeguard devices against cyber threats. WatchGuard EPDR and Advanced EPDR, our AI-powered flagship endpoint solutions, enhance your security posture by

Users
  • Software Developer
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 55% Small-Business
  • 34% Mid-Market
WatchGuard Endpoint Security features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 8.9
8.9
Compliance
Average: 8.9
9.2
Endpoint Intelligence
Average: 9.0
8.6
Behavioral Analysis
Average: 8.7
Dustin  S.
DS
Panda Security is a software that is perfectly consistent with laptops, smartphones running Desktop, Android or Mac operating systems. In terms of... Read review
Steven D.
SD
It is a quality antivirus, with its EP and EDR solutions, it quickly detects with a thorough analysis any threat that may be lurking in my work... Read review
Seller Details
Company Website
Year Founded
1996
HQ Location
Seatle, WA
Twitter
@watchguard
19,516 Twitter followers
LinkedIn® Page
www.linkedin.com
1,201 employees on LinkedIn®
(196)4.7 out of 5
Optimized for quick response
View top Consulting Services for SentinelOne Singularity Endpoint
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 37% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Endpoint features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.8
    Compliance
    Average: 8.9
    9.5
    Endpoint Intelligence
    Average: 9.0
    9.6
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AB
    Proactive Hunting: The platform provides tools for security teams to proactively hunt for threats hidden within their network. This proactive... Read review
    Verified User in Computer & Network Security
    AC
    Easy to roll out and install Not resource intensive on machines Console is easy to use and configure/troubelshoot issues. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    56,930 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,132 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 37% Enterprise
SentinelOne Singularity Endpoint features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
8.8
Compliance
Average: 8.9
9.5
Endpoint Intelligence
Average: 9.0
9.6
Behavioral Analysis
Average: 8.7
AB
Proactive Hunting: The platform provides tools for security teams to proactively hunt for threats hidden within their network. This proactive... Read review
Verified User in Computer & Network Security
AC
Easy to roll out and install Not resource intensive on machines Console is easy to use and configure/troubelshoot issues. Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
56,930 Twitter followers
LinkedIn® Page
www.linkedin.com
3,132 employees on LinkedIn®
(91)4.6 out of 5
13th Easiest To Use in Endpoint Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    • Owner
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 73% Small-Business
    • 8% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    5.0
    Compliance
    Average: 8.9
    0.0
    No information available
    10.0
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    One software agent to easily turn on and off needed features. Logical web manage portal, good frequent updates and roadmap. Support team quick to... Read review
    Dakarai B.
    DB
    The best part of Todyl is that it is a single agent to deploy for all features. That simplies deployment and minimizes complexity. The ease of... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
  • Owner
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 73% Small-Business
  • 8% Mid-Market
Todyl Security Platform features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
5.0
Compliance
Average: 8.9
0.0
No information available
10.0
Behavioral Analysis
Average: 8.7
Verified User in Information Technology and Services
AI
One software agent to easily turn on and off needed features. Logical web manage portal, good frequent updates and roadmap. Support team quick to... Read review
Dakarai B.
DB
The best part of Todyl is that it is a single agent to deploy for all features. That simplies deployment and minimizes complexity. The ease of... Read review
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 43% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    10.0
    Endpoint Intelligence
    Average: 9.0
    10.0
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Malcolm T.
    MT
    It's seamless, manageable and barely impacts resources. The management console is clear and support is good when it's (rarely) needed. Read review
    Timothy D.
    TD
    Centrally managed control panel and easy to deploy Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,323 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    227 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 43% Mid-Market
VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
10.0
Endpoint Intelligence
Average: 9.0
10.0
Behavioral Analysis
Average: 8.7
Malcolm T.
MT
It's seamless, manageable and barely impacts resources. The management console is clear and support is good when it's (rarely) needed. Read review
Timothy D.
TD
Centrally managed control panel and easy to deploy Read review
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,323 Twitter followers
LinkedIn® Page
www.linkedin.com
227 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GravityZone is a business security solution built from ground-up for virtualization and cloud to deliver security services to physical endpoints, mobile devices, virtual machines in public cloud and E

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 55% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitdefender GravityZone features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.7
    Compliance
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 9.0
    8.5
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Jon H.
    JH
    Modular control of everything from device controls to scan frequencies. Reports are easily setup to email directly to clients for their peace of... Read review
    NC
    When I was in school, we had to do a project about which antivirus was the best one based on a logical set of criteria. I made mine the most... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2001
    HQ Location
    Bucuresti, Romania
    Twitter
    @Bitdefender
    113,346 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,320 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GravityZone is a business security solution built from ground-up for virtualization and cloud to deliver security services to physical endpoints, mobile devices, virtual machines in public cloud and E

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 55% Small-Business
  • 37% Mid-Market
Bitdefender GravityZone features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 8.9
8.7
Compliance
Average: 8.9
8.3
Endpoint Intelligence
Average: 9.0
8.5
Behavioral Analysis
Average: 8.7
Jon H.
JH
Modular control of everything from device controls to scan frequencies. Reports are easily setup to email directly to clients for their peace of... Read review
NC
When I was in school, we had to do a project about which antivirus was the best one based on a logical set of criteria. I made mine the most... Read review
Seller Details
Year Founded
2001
HQ Location
Bucuresti, Romania
Twitter
@Bitdefender
113,346 Twitter followers
LinkedIn® Page
www.linkedin.com
2,320 employees on LinkedIn®