Introducing G2.ai, the future of software buying.Try now

Best Endpoint Protection Platforms - Page 3

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Endpoint protection platforms combine a number of endpoint security and management capabilities to deliver an all-in-one solution for securing endpoint devices. These tools facilitate endpoint management through remote control, monitoring, and inventory management. Endpoint protection platforms also provide some level of endpoint detection and remediation to identify and remove causes of web-based threats. Lastly, they offer antivirus capabilities to prevent malicious software from infecting endpoint devices. Companies often choose these tools because of their all-encompassing nature and to centralize control and maintain consistency of security operations related to endpoint devices.

While these tools possess the capabilities of other endpoint security solutions, they also accomplish much more. By combining at least three key components of endpoint security, these tools are excellent choices for companies hoping to consolidate security solutions.

To qualify for inclusion in the Endpoint Protection Platforms category, a product must:

Facilitate control over disparate endpoints
Provide endpoint malware and antivirus protection
Facilitate the detection and remediation of web-based threats
Show More
Show Less

Best Endpoint Protection Platforms At A Glance

Highest Performer:
Easiest to Use:
Best Free Software:
Show LessShow More
Easiest to Use:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
60 Listings in Endpoint Protection Platforms Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WithSecure Elements Extended Detection and Response (XDR) is a unified solution, designed to protect modern IT estates. It minimizes the impact of attacks by using automated and advanced preventative

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Mid-Market
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • WithSecure Elements Extended Detection and Response (XDR) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    Ease of Use
    1
    Efficiency
    1
    Investigation
    1
    Platform Compatibility
    1
    Cons
    False Positives
    1
    Not User-Friendly
    1
    Poor Navigation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WithSecure Elements Extended Detection and Response (XDR) features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    9.0
    Compliance
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 9.0
    9.1
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    66,858 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,745 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

WithSecure Elements Extended Detection and Response (XDR) is a unified solution, designed to protect modern IT estates. It minimizes the impact of attacks by using automated and advanced preventative

Users
No information available
Industries
No information available
Market Segment
  • 45% Mid-Market
  • 40% Small-Business
WithSecure Elements Extended Detection and Response (XDR) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
Ease of Use
1
Efficiency
1
Investigation
1
Platform Compatibility
1
Cons
False Positives
1
Not User-Friendly
1
Poor Navigation
1
WithSecure Elements Extended Detection and Response (XDR) features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
9.0
Compliance
Average: 8.9
8.3
Endpoint Intelligence
Average: 9.0
9.1
Behavioral Analysis
Average: 8.7
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
66,858 Twitter followers
LinkedIn® Page
www.linkedin.com
1,745 employees on LinkedIn®
Ownership
FSOYF
(22)5.0 out of 5
11th Easiest To Use in Endpoint Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bastion is a new breed of cybersecurity platform for small and mid-sized businesses (SMBs) and the Managed Service Providers (MSPs) that support them. A single platform that secures your entire compan

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bastion Technologies features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.8
    Compliance
    Average: 8.9
    8.3
    Endpoint Intelligence
    Average: 9.0
    8.1
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Paris, FR
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bastion is a new breed of cybersecurity platform for small and mid-sized businesses (SMBs) and the Managed Service Providers (MSPs) that support them. A single platform that secures your entire compan

Users
No information available
Industries
No information available
Market Segment
  • 64% Small-Business
  • 32% Mid-Market
Bastion Technologies features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
9.8
Compliance
Average: 8.9
8.3
Endpoint Intelligence
Average: 9.0
8.1
Behavioral Analysis
Average: 8.7
Seller Details
Year Founded
2022
HQ Location
Paris, FR
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threa

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Protection Suite Enterprise Edition features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 8.9
    8.1
    Compliance
    Average: 8.9
    8.6
    Endpoint Intelligence
    Average: 9.0
    8.3
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    62,171 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56,584 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threa

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 36% Small-Business
Symantec Protection Suite Enterprise Edition features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 8.9
8.1
Compliance
Average: 8.9
8.6
Endpoint Intelligence
Average: 9.0
8.3
Behavioral Analysis
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
62,171 Twitter followers
LinkedIn® Page
www.linkedin.com
56,584 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Carbon Black Cloud security platform helps you strengthen and unify security tools to see more and stop more. Carbon Black unifies visibility across your endpoints, networks, and containers to ena

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 56% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Carbon Black Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Antivirus Protection
    1
    Artificial Intelligence
    1
    Easy Management
    1
    Efficiency
    1
    Cons
    Compatibility Issues
    1
    Complex Implementation
    1
    Configuration Issues
    1
    Excessive Blocking
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Carbon Black Cloud features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.0
    Compliance
    Average: 8.9
    8.9
    Endpoint Intelligence
    Average: 9.0
    8.3
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    62,171 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56,584 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

The Carbon Black Cloud security platform helps you strengthen and unify security tools to see more and stop more. Carbon Black unifies visibility across your endpoints, networks, and containers to ena

Users
No information available
Industries
  • Financial Services
Market Segment
  • 56% Mid-Market
  • 33% Enterprise
Carbon Black Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Antivirus Protection
1
Artificial Intelligence
1
Easy Management
1
Efficiency
1
Cons
Compatibility Issues
1
Complex Implementation
1
Configuration Issues
1
Excessive Blocking
1
False Positives
1
Carbon Black Cloud features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
8.0
Compliance
Average: 8.9
8.9
Endpoint Intelligence
Average: 9.0
8.3
Behavioral Analysis
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
62,171 Twitter followers
LinkedIn® Page
www.linkedin.com
56,584 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VIPRE Endpoint Security Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alert Notifications
    1
    Antivirus Software
    1
    Ease of Use
    1
    Easy Installation
    1
    Easy Setup
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    10.0
    Endpoint Intelligence
    Average: 9.0
    10.0
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,318 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    227 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 43% Mid-Market
VIPRE Endpoint Security Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alert Notifications
1
Antivirus Software
1
Ease of Use
1
Easy Installation
1
Easy Setup
1
Cons
This product has not yet received any negative sentiments.
VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
10.0
Endpoint Intelligence
Average: 9.0
10.0
Behavioral Analysis
Average: 8.7
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,318 Twitter followers
LinkedIn® Page
www.linkedin.com
227 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Endpoint security management is all about adequately securing such endpoints and thereby securing a network by blocking access attempts and such risky activities at endpoints.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Xcitium Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Affordable
    1
    Affordable Pricing
    1
    Customer Support
    1
    Easy Implementation
    1
    Features
    1
    Cons
    Billing Issues
    1
    Communication Issues
    1
    Complexity
    1
    Expensive
    1
    Insufficient Training
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Xcitium features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Xcitium
    Year Founded
    2018
    HQ Location
    Clifton, NJ
    LinkedIn® Page
    www.linkedin.com
    676 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Endpoint security management is all about adequately securing such endpoints and thereby securing a network by blocking access attempts and such risky activities at endpoints.

Users
No information available
Industries
No information available
Market Segment
  • 41% Mid-Market
  • 33% Small-Business
Xcitium Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Affordable
1
Affordable Pricing
1
Customer Support
1
Easy Implementation
1
Features
1
Cons
Billing Issues
1
Communication Issues
1
Complexity
1
Expensive
1
Insufficient Training
1
Xcitium features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Xcitium
Year Founded
2018
HQ Location
Clifton, NJ
LinkedIn® Page
www.linkedin.com
676 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Morphisec fortifies your organization by diminishing the blast radius of attacks, to preemptively reduce the organization’s exposure to cyber risk, pro-actively prevent advanced threats, and ensure op

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Morphisec Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    1
    Threat Detection
    1
    Threat Protection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Morphisec features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Compliance
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 9.0
    5.6
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Morphisec
    Year Founded
    2014
    HQ Location
    Waltham, US
    Twitter
    @morphisec
    2,249 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    98 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Morphisec fortifies your organization by diminishing the blast radius of attacks, to preemptively reduce the organization’s exposure to cyber risk, pro-actively prevent advanced threats, and ensure op

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Mid-Market
  • 17% Enterprise
Morphisec Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
1
Threat Detection
1
Threat Protection
1
Cons
This product has not yet received any negative sentiments.
Morphisec features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
8.3
Compliance
Average: 8.9
10.0
Endpoint Intelligence
Average: 9.0
5.6
Behavioral Analysis
Average: 8.7
Seller Details
Seller
Morphisec
Year Founded
2014
HQ Location
Waltham, US
Twitter
@morphisec
2,249 Twitter followers
LinkedIn® Page
www.linkedin.com
98 employees on LinkedIn®
(18)4.4 out of 5
View top Consulting Services for Cybereason Defense Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Mos

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 61% Enterprise
    • 22% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cybereason Defense Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    2
    Ease of Use
    2
    Security
    2
    AI
    1
    AI Technology
    1
    Cons
    Feature Limitations
    1
    Lack of Clarity
    1
    Limited Customization
    1
    Limited Features
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cybereason Defense Platform features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Compliance
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 9.0
    10.0
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    La Jolla, San Diego, US
    Twitter
    @cybereason
    15,721 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    574 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Mos

Users
No information available
Industries
No information available
Market Segment
  • 61% Enterprise
  • 22% Small-Business
Cybereason Defense Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
2
Ease of Use
2
Security
2
AI
1
AI Technology
1
Cons
Feature Limitations
1
Lack of Clarity
1
Limited Customization
1
Limited Features
1
Poor Customer Support
1
Cybereason Defense Platform features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
9.2
Compliance
Average: 8.9
9.2
Endpoint Intelligence
Average: 9.0
10.0
Behavioral Analysis
Average: 8.7
Seller Details
Year Founded
2012
HQ Location
La Jolla, San Diego, US
Twitter
@cybereason
15,721 Twitter followers
LinkedIn® Page
www.linkedin.com
574 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DeepArmor leverages the power of big data and patented machine learning algorithms to predict and prevent the most advanced attacks in a simple, lightweight solution. Security operations teams can use

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DeepArmor features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Compliance
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 9.0
    8.3
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Avathon
    Year Founded
    2013
    HQ Location
    Austin, Texas
    LinkedIn® Page
    www.linkedin.com
    271 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DeepArmor leverages the power of big data and patented machine learning algorithms to predict and prevent the most advanced attacks in a simple, lightweight solution. Security operations teams can use

Users
No information available
Industries
No information available
Market Segment
  • 75% Small-Business
  • 25% Mid-Market
DeepArmor features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Compliance
Average: 8.9
10.0
Endpoint Intelligence
Average: 9.0
8.3
Behavioral Analysis
Average: 8.7
Seller Details
Seller
Avathon
Year Founded
2013
HQ Location
Austin, Texas
LinkedIn® Page
www.linkedin.com
271 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec Integrated Cyber Defense (ICD is a comprehensive cybersecurity platform designed to unify and streamline security across an organization's entire digital infrastructure. By integrating advanc

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Integrated Cyber Defense Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Integrations
    3
    Monitoring
    3
    Security
    3
    Centralized Management
    2
    Cons
    Complexity
    2
    Difficult Learning
    2
    Expensive
    2
    Complex Configuration
    1
    Complex Implementation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Integrated Cyber Defense features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Compliance
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 9.0
    8.3
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    62,171 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56,584 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec Integrated Cyber Defense (ICD is a comprehensive cybersecurity platform designed to unify and streamline security across an organization's entire digital infrastructure. By integrating advanc

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Enterprise
  • 38% Mid-Market
Symantec Integrated Cyber Defense Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Integrations
3
Monitoring
3
Security
3
Centralized Management
2
Cons
Complexity
2
Difficult Learning
2
Expensive
2
Complex Configuration
1
Complex Implementation
1
Symantec Integrated Cyber Defense features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 8.9
9.2
Compliance
Average: 8.9
9.2
Endpoint Intelligence
Average: 9.0
8.3
Behavioral Analysis
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
62,171 Twitter followers
LinkedIn® Page
www.linkedin.com
56,584 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today’s rapidly evolving threat landscape, ransomware and advanced cyberattacks are becoming more stealthy and sophisticated, targeting vulnerabilities that traditional security tools often miss. D

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Active Ransomware Prevention Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Dashboard Usability
    1
    Ease of Use
    1
    Experience Satisfaction
    1
    Features
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Active Ransomware Prevention features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Holon, IL
    Twitter
    @DeceptiveBytes
    244 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In today’s rapidly evolving threat landscape, ransomware and advanced cyberattacks are becoming more stealthy and sophisticated, targeting vulnerabilities that traditional security tools often miss. D

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Enterprise
Active Ransomware Prevention Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Dashboard Usability
1
Ease of Use
1
Experience Satisfaction
1
Features
1
Cons
This product has not yet received any negative sentiments.
Active Ransomware Prevention features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2016
HQ Location
Holon, IL
Twitter
@DeceptiveBytes
244 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More powerful than ever, our latest edition works even harder and smarter for you and your business. It comes with - * Accelerated scanning engine * Link protection * Enhanced Firewall * Advanced en

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 61% Small-Business
    • 24% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AVG Internet Security Business Edition Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Antivirus Protection
    1
    Cybersecurity
    1
    Cybersecurity Protection
    1
    Phishing Protection
    1
    Protection
    1
    Cons
    Insufficient Features
    1
    Lack of Features
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AVG Internet Security Business Edition features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 8.9
    7.5
    Compliance
    Average: 8.9
    7.5
    Endpoint Intelligence
    Average: 9.0
    8.3
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Tempe, Arizona
    Twitter
    @GenDigitalInc
    4,281 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,382 employees on LinkedIn®
    Ownership
    NASDAQ: GEN
Product Description
How are these determined?Information
This description is provided by the seller.

More powerful than ever, our latest edition works even harder and smarter for you and your business. It comes with - * Accelerated scanning engine * Link protection * Enhanced Firewall * Advanced en

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 61% Small-Business
  • 24% Enterprise
AVG Internet Security Business Edition Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Antivirus Protection
1
Cybersecurity
1
Cybersecurity Protection
1
Phishing Protection
1
Protection
1
Cons
Insufficient Features
1
Lack of Features
1
Limited Customization
1
AVG Internet Security Business Edition features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 8.9
7.5
Compliance
Average: 8.9
7.5
Endpoint Intelligence
Average: 9.0
8.3
Behavioral Analysis
Average: 8.7
Seller Details
Year Founded
2022
HQ Location
Tempe, Arizona
Twitter
@GenDigitalInc
4,281 Twitter followers
LinkedIn® Page
www.linkedin.com
3,382 employees on LinkedIn®
Ownership
NASDAQ: GEN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deep Instinct is the only preemptive data security solution that PREVENTS >99% of UNKNOWN and ZERO-DAY threats, including ransomware and AI generated malware before they breach your environment, wh

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deep Instinct Data Security X features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    10.0
    Endpoint Intelligence
    Average: 9.0
    10.0
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    New York, New York, United States
    Twitter
    @DeepInstinctSec
    8,824 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    210 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Deep Instinct is the only preemptive data security solution that PREVENTS >99% of UNKNOWN and ZERO-DAY threats, including ransomware and AI generated malware before they breach your environment, wh

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Deep Instinct Data Security X features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
10.0
Endpoint Intelligence
Average: 9.0
10.0
Behavioral Analysis
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
New York, New York, United States
Twitter
@DeepInstinctSec
8,824 Twitter followers
LinkedIn® Page
www.linkedin.com
210 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Guardio covers your security blind spots. When you work in a business, one click can take the whole team down, along with your customer base. That one click can quickly lead to company data and custom

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Guardio Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    System Protection
    2
    Threat Detection
    2
    Antivirus Software
    1
    Blocking
    1
    Console Management
    1
    Cons
    Advertisement Issues
    1
    Alert Issues
    1
    Excessive Blocking
    1
    False Positives
    1
    Inaccurate Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Guardio features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Guard.io
    Year Founded
    2018
    HQ Location
    Tel Aviv , IL
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Guardio covers your security blind spots. When you work in a business, one click can take the whole team down, along with your customer base. That one click can quickly lead to company data and custom

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Guardio Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
System Protection
2
Threat Detection
2
Antivirus Software
1
Blocking
1
Console Management
1
Cons
Advertisement Issues
1
Alert Issues
1
Excessive Blocking
1
False Positives
1
Inaccurate Information
1
Guardio features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Guard.io
Year Founded
2018
HQ Location
Tel Aviv , IL
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protecting data from human error, malware and theft gets infinitely more complicated when protection is spread across wide geographic distances and complex network topologies. Designed to simplify the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText Core Endpoint Backup features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,621 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23,270 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

Protecting data from human error, malware and theft gets infinitely more complicated when protection is spread across wide geographic distances and complex network topologies. Designed to simplify the

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
OpenText Core Endpoint Backup features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,621 Twitter followers
LinkedIn® Page
www.linkedin.com
23,270 employees on LinkedIn®
Ownership
NASDAQ:OTEX