# Best Endpoint Protection Platforms - Page 2

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Endpoint protection platforms combine a number of endpoint security and management capabilities to deliver an all-in-one solution for securing endpoint devices. These tools facilitate endpoint management through remote control, monitoring, and inventory management. Endpoint protection platforms also provide some level of endpoint detection and remediation to identify and remove causes of web-based threats. Lastly, they offer antivirus capabilities to prevent malicious software from infecting endpoint devices. Companies often choose these tools because of their all-encompassing nature and to centralize control and maintain consistency of security operations related to endpoint devices.

While these tools possess the capabilities of other endpoint security solutions, they also accomplish much more. By combining at least three key components of endpoint security, these tools are excellent choices for companies hoping to consolidate security solutions.

To qualify for inclusion in the Endpoint Protection Platforms category, a product must:

- Facilitate control over disparate endpoints
- Provide endpoint malware and antivirus protection
- Facilitate the detection and remediation of web-based threats





## Category Overview

**Total Products under this Category:** 65


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 12,900+ Authentic Reviews
- 65+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Endpoint Protection Platforms At A Glance

- **Leader:** [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews)
- **Highest Performer:** [Coro Cybersecurity](https://www.g2.com/products/coro-cybersecurity/reviews)
- **Easiest to Use:** [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews)
- **Top Trending:** [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)
- **Best Free Software:** [ManageEngine Endpoint Central](https://www.g2.com/products/manageengine-endpoint-central/reviews)


---

**Sponsored**

### ManageEngine Endpoint Central

ManageEngine Endpoint Central is an all-in-one unified endpoint management and security (UEMS) solution that delivers end-to-end life cycle management and endpoint protection. From automated multi-OS patching and software deployment to asset intelligence and mobile device management, it unifies the core workflows IT teams rely on every day. On the security side, its next-generation antivirus (NGAV) uses behavioral detection, AI, and real-time analytics to detect and stop advanced threats, while built-in attack surface management, browser security, and data loss prevention keep sensitive data protected across office, remote, and frontline endpoints alike. Endpoint Central also prioritizes productivity through digital employee experience (DEX) monitoring, delivering real-time insights into device health, application performance, and endpoint telemetry so IT teams can resolve issues before they impact employees. Recognized as a leader by Gartner®, IDC, and Forrester, Endpoint Central is trusted by over 31, 000 enterprises worldwide and available in both on-premises and SaaS editions. This solution streamlines the complex landscape of endpoint management, empowering IT and security teams to manage more with less, delivering intelligent automation and AI-powered threat mitigation through one unified platform. Business benefits and ROI A commissioned Forrester Total Economic Impact™ study found that organizations deploying Endpoint Central achieved several significant business benefits, including: - 442% return on investment over three years, driven by tool consolidation, automation, and reduced operational overhead. - $4.5 million in total quantified economic benefits (present value), a net present value of $3.7 million, and a payback period of under six months. - 95% reduction in manual patching time, as well as cut licensing and insurance costs through improved security posture and compliance. - Significant reductions in compliance violations and security-related disruptions driven by Endpoint Central’s capability to convert endpoint stability and risk reduction into measurable business outcomes.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1467&amp;secure%5Bdisplayable_resource_id%5D=1467&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1467&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=10524&amp;secure%5Bresource_id%5D=1467&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fendpoint-protection-platforms&amp;secure%5Btoken%5D=eac66ba54cea0723748e12ed57387055cb6f0750d3abca8c1a7dcefca2887be3&amp;secure%5Burl%5D=https%3A%2F%2Fwww.manageengine.com%2Fproducts%2Fdesktop-central%2F%3Futm_source%3Dg2%26utm_medium%3Dcpc&amp;secure%5Burl_type%5D=custom_url&amp;secure%5Bvisitor_segment%5D=180)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [Symantec End-user Endpoint Security](https://www.g2.com/products/symantec-end-user-endpoint-security/reviews)
  Symantec Endpoint Protection (SEP) is designed to protect against malware attacks including targeted attacks, advanced persistent threats, and zero-day threats with a layered approach to security at the endpoint. Superior protection that fuses essential and next-gen technologies in a multi-layered fashion. High-performance, lightweight single client, single management console across both physical and virtual protection and orchestrated response delivered at scale


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 515

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.4/10 (Category avg: 8.9/10)
- **Compliance:** 9.2/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.0/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Who Uses This:** Marketeer, Engineer
  - **Top Industries:** Information Technology and Services, Events Services
  - **Company Size:** 48% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Threat Detection (4 reviews)
- Security (3 reviews)
- Configuration Ease (2 reviews)
- Ease of Use (2 reviews)
- Features (2 reviews)

**Cons:**

- Slow Performance (3 reviews)
- High CPU Usage (2 reviews)
- High Resource Usage (2 reviews)
- Limited Features (2 reviews)
- Complex Installation (1 reviews)

### 2. [Trellix Endpoint Security](https://www.g2.com/products/trellix-endpoint-security/reviews)
  Trellix Endpoint Security Suite gives your security team the context, visibility, and capabilities to identify, investigate, and remediate threats across your hybrid environment. And it provides the data essential for your extended detection and response.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 320

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.1/10 (Category avg: 8.9/10)
- **Compliance:** 9.0/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.8/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.6/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Trellix](https://www.g2.com/sellers/trellix)
- **Year Founded:** 2004
- **HQ Location:** Milpitas, CA
- **Twitter:** @Trellix (241,709 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/44195/ (811 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Senior Software Engineer, Software Developer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 42% Mid-Market, 41% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (6 reviews)
- Features (4 reviews)
- Threat Detection (4 reviews)
- Customer Support (3 reviews)
- Protection (3 reviews)

**Cons:**

- Difficult Configuration (2 reviews)
- Expensive (2 reviews)
- Agent Issues (1 reviews)
- Complex Installation (1 reviews)
- Complex Interface (1 reviews)

### 3. [Bitdefender GravityZone XDR](https://www.g2.com/products/bitdefender-gravityzone-xdr/reviews)
  GravityZone is a business security solution built from ground-up for virtualization and cloud to deliver security services to physical endpoints, mobile devices, virtual machines in public cloud and Exchange mail servers. GravityZone is one product with a unified management console available in the cloud, hosted by Bitdefender, or as one virtual appliance to be installed on company&#39;s premises, and it provides a single point for deploying, enforcing and managing security policies for any number of endpoints and of any type, in any location. GravityZone delivers multiple layers of security for endpoints and for Microsoft Exchange mail servers: antimalware with behavioral monitoring, zero day threat protection, application control and sandboxing, firewall, device control, content control, anti-phishing and antispam.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 83

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.1/10 (Category avg: 8.9/10)
- **Compliance:** 8.7/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.6/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.5/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Bitdefender](https://www.g2.com/sellers/bitdefender)
- **Year Founded:** 2001
- **HQ Location:** Bucuresti, Romania
- **Twitter:** @Bitdefender (113,880 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6825/ (2,317 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 54% Small-Business, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Features (11 reviews)
- Ease of Use (10 reviews)
- Customer Support (8 reviews)
- Efficiency (8 reviews)
- Security (8 reviews)

**Cons:**

- Not User-Friendly (5 reviews)
- Complex Interface (4 reviews)
- Complexity (4 reviews)
- Configuration Issues (4 reviews)
- Difficult Configuration (4 reviews)

### 4. [Kaspersky Next Optimum](https://www.g2.com/products/kaspersky-next-optimum/reviews)
  Kaspersky Next Optimum is the ideal choice for small and mid-sized businesses with lean cybersecurity teams. The offering is uniting in itself with strong endpoint protection, essential detection and response capabilities (EDR), and a seamless upgrade to XDR and MXDR for sophisticated cybersecurity. Layers of Kaspersky Next Optimum: • Kaspersky Next EDR Foundations – Powerful ML-based EPP, flexible security controls and EDR root cause analysis tools equip you with the most straightforward way to build a strong foundation for your cybersecurity. • Kaspersky Next EDR Optimum – Combines strong endpoint protection with enhanced controls, patch and encryption management, training for IT staff, cloud security and more – all boosted by essential EDR functionality to help you deflect attacks rapidly, with minimal demand on your resources. • Kaspersky Next XDR Optimum – In addition to exceptional EPP and automatic response capabilities that help identify, analyze and neutralize evasive threats, the solution gives you affordable, user-friendly detection and response tools that go beyond endpoints, as well as access to our online learning platform to raise the security awareness of your employees. • Kaspersky Next MXDR Optimum – Get expert-managed protection against sophisticated threats, delivered by Kaspersky’s globally renowned SOC experts with 24/7 infrastructure monitoring – while keeping essential XDR capabilities in-house.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 195

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.2/10 (Category avg: 8.9/10)
- **Compliance:** 8.9/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.9/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Kaspersky](https://www.g2.com/sellers/kaspersky-bce2dc7f-2586-4e87-96da-114de2c40584)
- **Year Founded:** 1997
- **HQ Location:** Moscow
- **Twitter:** @kasperskylabind (1,294 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaspersky/ (4,494 employees on LinkedIn®)
- **Phone:** 1-866-328-5700

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 47% Mid-Market, 33% Small-Business


#### Pros & Cons

**Pros:**

- Blocking (5 reviews)
- Ease of Use (5 reviews)
- Threat Protection (5 reviews)
- Protection (4 reviews)
- Threat Detection (4 reviews)

**Cons:**

- High Resource Usage (6 reviews)
- Slow Performance (5 reviews)
- Compatibility Issues (2 reviews)
- Complex Setup (2 reviews)
- Difficult Configuration (2 reviews)

### 5. [Avast Small Business Cybersecurity](https://www.g2.com/products/avast-small-business-cybersecurity/reviews)
  Avast delivers all-in-one cybersecurity solutions, protecting over 400 million users. Our Endpoint Protection solutions like Next-gen Antivirus and automated Patch Management work together to protect your devices, data, and applications - saving both time and money.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 99

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Compliance:** 8.3/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.1/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Gen Digital](https://www.g2.com/sellers/gen-digital)
- **Year Founded:** 2022
- **HQ Location:** Tempe, Arizona
- **Twitter:** @GenDigitalInc (4,477 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/gendigitalinc (3,421 employees on LinkedIn®)
- **Ownership:** NASDAQ: GEN

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 63% Small-Business, 25% Mid-Market


#### Pros & Cons

**Pros:**

- Centralized Management (1 reviews)
- Dashboard Usability (1 reviews)
- Deployment Ease (1 reviews)
- Easy Management (1 reviews)
- Efficiency (1 reviews)

**Cons:**

- Alert Issues (1 reviews)
- Configuration Issues (1 reviews)

### 6. [Agency](https://www.g2.com/products/agency-2025-12-16/reviews)
  Agency is a forward-deployed AI cybersecurity and compliance firm dedicated to delivering customized security solutions that protect organizations&#39; most critical threat surfaces. By integrating proprietary technologies with leading software providers and deploying expert security engineering teams, Agency addresses complex, multiparty security challenges across various industries. Key Features and Functionality: - Custom Security Solutions: Tailored security and compliance programs designed to meet the unique needs of each organization. - Advanced Threat Detection: Deployment of endpoint detection and response (EDR) solutions to monitor and respond to suspicious activities in real-time. - Data Loss Prevention (DLP): Implementation of policies to safeguard sensitive data from unauthorized access, leakage, and loss across various environments. - Governance, Risk, and Compliance (GRC): Establishment and maintenance of robust frameworks to manage risk, ensure compliance with industry regulations, and implement policies to mitigate security threats. - Cloud Security: Continuous monitoring, threat detection, and compliance enforcement across cloud environments to ensure data protection. - Network Security: Design and securing of resilient network infrastructures to protect against unauthorized access and ensure secure communication. Primary Value and Solutions Provided: Agency empowers organizations to proactively manage and mitigate digital risks by offering fully customizable and integrated security solutions. Their services ensure compliance with industry standards such as ISO 27001, CMMC, NIST, GDPR, and HIPAA, thereby enhancing operational resilience. By addressing challenges like insider threats, social media risks, and the security of remote workers and contractors, Agency helps organizations maintain the integrity of their operations and protect sensitive data. Their 24/7 monitoring and response capabilities provide continuous protection, allowing businesses to focus on their core activities with confidence.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 40

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 8.9/10)
- **Compliance:** 9.8/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.6/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 9.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Agency](https://www.g2.com/sellers/agency)
- **Company Website:** https://getagency.com/
- **Year Founded:** 2020
- **HQ Location:** New York, NY
- **LinkedIn® Page:** https://www.linkedin.com/company/getagency22/ (41 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 78% Small-Business, 17% Mid-Market


#### Pros & Cons

**Pros:**

- Cybersecurity Protection (2 reviews)
- Dashboard Usability (1 reviews)
- Device Security (1 reviews)
- Easy Management (1 reviews)
- Security (1 reviews)

**Cons:**

- Notification Issues (1 reviews)
- Poor Usability (1 reviews)

### 7. [Heimdal](https://www.g2.com/products/heimdal/reviews)
  Accommodate all your cybersecurity needs under one convenient roof with the Heimdal® Unified Cybersecurity Platform. Our cybersecurity solutions can be used as standalone products or integrated into one another as part of a cohesive and unified XDR platform. Whether you’re a reseller, distributor, MSSP, or an organization committed to bolstering your online security, we provide an array of cutting-edge products to make your mission smoother. Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimdal has experienced spectacular growth by proactively building products that anticipate threatscape trends. The company offers a multi-layeredand unified security suite that combines threat prevention, patch and asset management, endpoint rights management, antivirus and mail security which together secure customers against cyberattacks and keep critical information and intellectual property safe. Heimdal has been recognized as a thought leader in the industry and has won multiple international awards both for its solutions and for its educational content creation. The Heimdal line of products currently consists of 10 products and 2 services. The former category encompasses DNS Security for Endpoints &amp; Network, Patch &amp; Asset Management, Privileged Access Management, Application Control, Next-Gen Endpoint Antivirus, Ransomware Encryption Protection, Email Security, Email Fraud Prevention, and Remote Desktop. The latter is represented by Endpoint Detection &amp; Response, as well as eXtended Detection &amp; Response, or EDR and XDR for short. Currently, Heimdal’s cybersecurity solutions are deployed in more than 45 countries and supported regionally from offices in 15+ countries, by 175+ highly qualified specialists. Heimdal is ISAE 3000 certified and secures more than 2 million endpoints for over 10,000 companies. The company supports its partners without concessions on the basis of predictability and scalability. The common goal is to create a sustainable ecosystem and a strategic partnership.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 59

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Heimdal®](https://www.g2.com/sellers/heimdal)
- **Company Website:** https://heimdalsecurity.com/
- **Year Founded:** 2014
- **HQ Location:** Copenhagen, Denmark
- **Twitter:** @HeimdalSecurity (5,108 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/heimdal-security/ (264 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Construction
  - **Company Size:** 59% Mid-Market, 27% Small-Business


#### Pros & Cons

**Pros:**

- Product Quality (2 reviews)
- Reliability (2 reviews)
- Security (2 reviews)
- 24/7 Availability (1 reviews)
- Customer Support (1 reviews)

**Cons:**

- Complex Interface (2 reviews)
- Not User-Friendly (2 reviews)
- Poor Interface Design (2 reviews)
- User Difficulty (2 reviews)
- User Interface (2 reviews)

### 8. [WithSecure Elements Extended Detection and Response (XDR)](https://www.g2.com/products/withsecure-elements-extended-detection-and-response-xdr/reviews)
  WithSecure Elements Extended Detection and Response (XDR) is a unified solution, designed to protect modern IT estates. It minimizes the impact of attacks by using automated and advanced preventative controls that keep incident volumes and lower-level attacks at bay. AI-powered tooling enables fast detection, investigation, and response to threats. Luminen GenAI assistant is automatically included with Elements XDR, further empowering your analyst. Secure your digital environment: - Endpoints (laptops and workstations, mobiles, servers) - Digital identities and their user credentials (Microsoft Entra ID) - Cloud resources (Microsoft Azure) - Emails and cloud-based collaboration services (Microsoft 365 including Exchange, SharePoint sites, OneDrive, and Microsoft Teams)


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 117

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.9/10)
- **Compliance:** 9.0/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.3/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 9.1/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [WithSecure](https://www.g2.com/sellers/withsecure)
- **Year Founded:** 1988
- **HQ Location:** Helsinki, Finland
- **Twitter:** @WithSecure (66,645 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6219/ (1,746 employees on LinkedIn®)
- **Ownership:** FSOYF

**Reviewer Demographics:**
  - **Company Size:** 45% Mid-Market, 40% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Efficiency (2 reviews)
- Alerting (1 reviews)
- Cloud Management (1 reviews)
- Easy Management (1 reviews)

**Cons:**

- Not User-Friendly (2 reviews)
- Alert Issues (1 reviews)
- Console Issues (1 reviews)
- Delay Issues (1 reviews)
- False Positives (1 reviews)

### 9. [Symantec Protection Suite Enterprise Edition](https://www.g2.com/products/symantec-symantec-protection-suite-enterprise-edition/reviews)
  Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threats along with industry-leading messaging protection.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 22

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.0/10 (Category avg: 8.9/10)
- **Compliance:** 8.1/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.6/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 44% Mid-Market, 36% Small-Business


### 10. [Bastion Technologies](https://www.g2.com/products/bastion-technologies/reviews)
  Bastion is a new breed of cybersecurity platform for small and mid-sized businesses (SMBs) and the Managed Service Providers (MSPs) that support them. A single platform that secures your entire company. Bastion protects employees, emails, data and cloud apps from ever-evolving digital threats. By delivering a suite of security modules that meet budget, security, and peace-of-mind requirements, Bastion is how SMBs defend against phishing, ransomware attacks, data loss, and user negligence.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 22

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 8.9/10)
- **Compliance:** 9.8/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.3/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.1/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Bastion Technologies](https://www.g2.com/sellers/bastion-technologies)
- **Year Founded:** 2022
- **HQ Location:** Paris, FR
- **LinkedIn® Page:** https://www.linkedin.com/company/bastiontech (19 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 64% Small-Business, 32% Mid-Market


### 11. [Carbon Black Cloud](https://www.g2.com/products/carbon-black-cloud/reviews)
  The Carbon Black Cloud security platform helps you strengthen and unify security tools to see more and stop more. Carbon Black unifies visibility across your endpoints, networks, and containers to enable you to stop threats targeting your organization with speed and confidence. Carbon Black protects against the full spectrum of modern cyber-attacks, including emerging threats and ransomware. Top SOC teams, IR firms and MSSPs have adopted Carbon Black as a core component of their prevention, detection, and response capability stack. Carbon Black is available via MSSP or directly.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 38

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Compliance:** 8.0/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 8.9/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Financial Services
  - **Company Size:** 56% Mid-Market, 33% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Antivirus Protection (1 reviews)
- Artificial Intelligence (1 reviews)
- Easy Management (1 reviews)
- Efficiency (1 reviews)

**Cons:**

- Compatibility Issues (1 reviews)
- Complex Implementation (1 reviews)
- Configuration Issues (1 reviews)
- Excessive Blocking (1 reviews)
- False Positives (1 reviews)

### 12. [VIPRE Endpoint Security Cloud](https://www.g2.com/products/vipre-endpoint-security-cloud/reviews)
  VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple MacOS desktops, laptops, and servers. Consistently ranked at the top of independent testing agencies&#39; lists, VIPRE combines excellent detection with low false positives, minimal system impact, and an easy to use mobile-ready administrative console. Packed with other goodies such as integrated vulnerability and patch management, web access control, and DNS protection, VIPRE will keep you safe against even the most sophisticated threats.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 56

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.9/10)
- **Endpoint Intelligence:** 10.0/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 10.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [VIPRE Security](https://www.g2.com/sellers/vipre-security)
- **Year Founded:** 1994
- **HQ Location:** Clearwater, FL
- **Twitter:** @VIPRESecurity (8,305 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/11052300/ (234 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 48% Small-Business, 43% Mid-Market


#### Pros & Cons

**Pros:**

- Alert Notifications (1 reviews)
- Antivirus Software (1 reviews)
- Ease of Use (1 reviews)
- Easy Installation (1 reviews)
- Easy Setup (1 reviews)


### 13. [Xcitium](https://www.g2.com/products/xcitium/reviews)
  Endpoint security management is all about adequately securing such endpoints and thereby securing a network by blocking access attempts and such risky activities at endpoints.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Xcitium](https://www.g2.com/sellers/xcitium)
- **Year Founded:** 2018
- **HQ Location:** Clifton, NJ
- **LinkedIn® Page:** https://www.linkedin.com/company/163167/ (676 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 41% Mid-Market, 33% Small-Business


#### Pros & Cons

**Pros:**

- Affordable (1 reviews)
- Affordable Pricing (1 reviews)
- Customer Support (1 reviews)
- Easy Implementation (1 reviews)
- Features (1 reviews)

**Cons:**

- Billing Issues (1 reviews)
- Communication Issues (1 reviews)
- Complexity (1 reviews)
- Expensive (1 reviews)
- Insufficient Training (1 reviews)

### 14. [Morphisec](https://www.g2.com/products/morphisec/reviews)
  Morphisec fortifies your organization by diminishing the blast radius of attacks, to preemptively reduce the organization’s exposure to cyber risk, pro-actively prevent advanced threats, and ensure optimal anti-ransomware defense. Powered by Automated Moving Target Defense (AMTD), this streamlined solution effortlessly integrates with your current endpoint protection array, enhancing existing protection capabilities or standing strong independently when necessary.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 12

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 8.9/10)
- **Compliance:** 8.3/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 10.0/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 5.6/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Morphisec](https://www.g2.com/sellers/morphisec)
- **Year Founded:** 2014
- **HQ Location:** Waltham, US
- **Twitter:** @morphisec (2,293 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/morphisec/ (97 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 75% Mid-Market, 17% Enterprise


#### Pros & Cons

**Pros:**

- Protection (1 reviews)
- Threat Detection (1 reviews)
- Threat Protection (1 reviews)


### 15. [AVG Internet Security Business Edition](https://www.g2.com/products/avg-internet-security-business-edition/reviews)
  More powerful than ever, our latest edition works even harder and smarter for you and your business. It comes with - \* Accelerated scanning engine \* Link protection \* Enhanced Firewall \* Advanced encryption for your critical folders and files \* Secure deletion of unwanted files \* Protects against Ransom ware \* Email Server Security \* Email Protection \* Remote admin Tools \* 24/7 support


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 33

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.9/10 (Category avg: 8.9/10)
- **Compliance:** 7.5/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 7.5/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Gen Digital](https://www.g2.com/sellers/gen-digital)
- **Year Founded:** 2022
- **HQ Location:** Tempe, Arizona
- **Twitter:** @GenDigitalInc (4,477 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/gendigitalinc (3,421 employees on LinkedIn®)
- **Ownership:** NASDAQ: GEN

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 59% Small-Business, 24% Enterprise


### 16. [Cybereason Defense Platform](https://www.g2.com/products/cybereason-defense-platform/reviews)
  Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Most organizations deploy Cybereason and start detecting attacks within 24 to 48 hours.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 18

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.9/10)
- **Compliance:** 9.2/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.2/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 10.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Cybereason](https://www.g2.com/sellers/cybereason)
- **Year Founded:** 2012
- **HQ Location:** La Jolla, San Diego, US
- **Twitter:** @cybereason (15,637 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cybereason (557 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 61% Enterprise, 22% Small-Business


#### Pros & Cons

**Pros:**

- Cybersecurity (2 reviews)
- Ease of Use (2 reviews)
- Security (2 reviews)
- AI (1 reviews)
- AI Technology (1 reviews)

**Cons:**

- Feature Limitations (1 reviews)
- Lack of Clarity (1 reviews)
- Limited Customization (1 reviews)
- Limited Features (1 reviews)
- Poor Customer Support (1 reviews)

### 17. [DeepArmor](https://www.g2.com/products/deeparmor/reviews)
  DeepArmor leverages the power of big data and patented machine learning algorithms to predict and prevent the most advanced attacks in a simple, lightweight solution. Security operations teams can use DeepArmor to protect against a broad spectrum of attack vectors while simplifying the deployment and management of their endpoint security program.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 4

**User Satisfaction Scores:**

- **Compliance:** 10.0/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 10.0/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Avathon](https://www.g2.com/sellers/avathon)
- **Year Founded:** 2013
- **HQ Location:** Austin, Texas
- **LinkedIn® Page:** https://www.linkedin.com/company/5155679 (253 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 75% Small-Business, 25% Mid-Market


### 18. [Symantec Enterprise Cloud](https://www.g2.com/products/symantec-enterprise-cloud/reviews)
  Symantec Integrated Cyber Defense (ICD is a comprehensive cybersecurity platform designed to unify and streamline security across an organization&#39;s entire digital infrastructure. By integrating advanced threat protection, information security, identity management, and compliance solutions, ICD effectively safeguards enterprises against sophisticated cyber threats. This unified approach reduces the complexity and cost associated with managing multiple security products, while enhancing the organization&#39;s overall security posture. Key Features and Functionality: - Endpoint Security: Provides multi-layered protection across all endpoints—including desktops, servers, mobile devices, and cloud workloads—ensuring robust defense against emerging threats. - Network Security: Offers both cloud and on-premises solutions to secure network traffic, utilizing advanced proxy architecture to defend against complex threats and ensure secure use of web applications. - Identity Security: Enforces granular security policies to prevent unauthorized access, protecting user identities and their associated privileges from exploitation. - Information Security: Integrates data loss prevention, encryption, and analytics to protect sensitive information across various platforms, including endpoints, cloud services, and on-premises systems. - Cloud Security: Delivers advanced solutions to secure cloud access, infrastructure, and applications, providing visibility and threat protection across public and private cloud environments. - Threat Intelligence: Leverages a global intelligence network that analyzes vast amounts of security data, enabling proactive identification and blocking of advanced targeted attacks. Primary Value and Problem Solved: Symantec Integrated Cyber Defense addresses the challenge of managing disparate security solutions by providing a unified platform that integrates various security technologies. This integration reduces operational complexity and costs, while enhancing the effectiveness of threat detection and response. By offering comprehensive protection across endpoints, networks, applications, and cloud environments, ICD enables organizations to proactively mitigate evolving cyber threats and maintain a robust security posture.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 8.9/10)
- **Compliance:** 9.2/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 9.2/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 38% Enterprise, 38% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (3 reviews)
- Integrations (3 reviews)
- Monitoring (3 reviews)
- Security (3 reviews)
- Centralized Management (2 reviews)

**Cons:**

- Complexity (2 reviews)
- Difficult Learning (2 reviews)
- Expensive (2 reviews)
- Complex Configuration (1 reviews)
- Complex Implementation (1 reviews)

### 19. [Active Ransomware Prevention](https://www.g2.com/products/active-ransomware-prevention/reviews)
  In today’s rapidly evolving threat landscape, ransomware and advanced cyberattacks are becoming more stealthy and sophisticated, targeting vulnerabilities that traditional security tools often miss. Deceptive Bytes offers an innovative approach to endpoint security by turning ransomware’s own evasive tactics against itself. Through its preemptive and proactive defenses, the solution distorts ransomware perception of the environment, breaks ransomware logic and prevents attacks before they can even begin. This forward-thinking strategy not only reduces the risk of breaches but also ensures your business remains operational, resilient, and secure in the face of emerging threats - Never Let Your Business Down! Recognized as a Gartner Cool Vendor in Security Operations and Threat Intelligence.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 4

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Deceptive Bytes](https://www.g2.com/sellers/deceptive-bytes)
- **Year Founded:** 2016
- **HQ Location:** Holon, IL
- **Twitter:** @DeceptiveBytes (241 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/deceptivebytes (6 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Small-Business, 25% Enterprise


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Dashboard Usability (1 reviews)
- Ease of Use (1 reviews)
- Experience Satisfaction (1 reviews)
- Features (1 reviews)


### 20. [Deep Instinct Data Security X](https://www.g2.com/products/deep-instinct-data-security-x/reviews)
  Deep Instinct is the only preemptive data security solution that PREVENTS \&gt;99% of UNKNOWN and ZERO-DAY threats, including ransomware and AI generated malware before they breach your environment, while providing world-class malware explainability with DIANNA, the DSX Companion. Leveraging the world&#39;s only deep learning framework trained for cybersecurity, we prevent threats in \&lt;20ms, faster than even the most advanced malware can encrypt. Our streamlined model scales to the needs of the enterprise without introducing operational bottlenecks or vulnerabilities while our lightning-quick scan speeds enable greater throughput than legacy tools can provide. We do it all while maintaining the industry’s lowest false positive rate of \&lt;0.1%. After a threat is detected and quarantined, DIANNA, the DSX Companion provides insights and explainability about unknown and zero-day threats in human language to your security teams, augmenting their capabilities and accelerating the investigation and remediation process. DIANNA&#39;s unique capabilities save security teams time and money while helping to close vulnerabilities faster and more effectively. Deep Instinct Data Security X (DSX) combines industry-leading static analysis based on the only deep learning framework dedicated to cybersecurity and includes several deployments: \* DSX for Applications is a flexible, containerized and highly scalable solution, deployed via API or ICAP, to scan millions of files per day and prevent malicious files from entering storage environments. \* DSX for NAS is purpose built for NAS solutions. It scans files at rest or in motion and prevents malicious files from entering your storage. Additionally, the speed of the DSX Brain allows full storage scans, identifying any malicious files that may be waiting to deploy. \*DSX for Cloud is purpose built for Cloud storage solutions. It is natively integrated with cloud storage providers to prevent threats before they infiltrate your cloud storage.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 2

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 8.9/10)
- **Endpoint Intelligence:** 10.0/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 10.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Deep Instinct](https://www.g2.com/sellers/deep-instinct)
- **Year Founded:** 2015
- **HQ Location:** New York, New York, United States
- **Twitter:** @DeepInstinctSec (8,754 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/deep-instinct (210 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Mid-Market


### 21. [Guardio](https://www.g2.com/products/guard-io-guardio/reviews)
  Guardio covers your security blind spots. When you work in a business, one click can take the whole team down, along with your customer base. That one click can quickly lead to company data and customer records being hacked and stolen. But not with Guardio for Teams. How does Guardio for Team work? \*Register for a 14-day free trial - you can cancel anytime. \*Super easy to set up \*Your business will be protected in a matter of minutes \*All team members will enjoy Guardio’s browser protection and data leaks management \*One admin can oversee any threats the company needs to take care of


  **Average Rating:** 3.5/5.0
  **Total Reviews:** 4


**Seller Details:**

- **Seller:** [Guard.io](https://www.g2.com/sellers/guard-io)
- **Year Founded:** 2018
- **HQ Location:** Tel Aviv , IL
- **LinkedIn® Page:** https://www.linkedin.com/company/19192220/ (125 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


#### Pros & Cons

**Pros:**

- System Protection (2 reviews)
- Threat Detection (2 reviews)
- Antivirus Software (1 reviews)
- Blocking (1 reviews)
- Console Management (1 reviews)

**Cons:**

- Advertisement Issues (1 reviews)
- Alert Issues (1 reviews)
- Excessive Blocking (1 reviews)
- False Positives (1 reviews)
- Inaccurate Information (1 reviews)

### 22. [OpenText Core Endpoint Backup](https://www.g2.com/products/opentext-core-endpoint-backup/reviews)
  Protecting data from human error, malware and theft gets infinitely more complicated when protection is spread across wide geographic distances and complex network topologies. Designed to simplify the administrative tasks associated with deploying data protection across an entire organization — no matter the size, distribution or sophistication of the environment — Carbonite® Endpoint is a comprehensive, automatic backup solution for all your endpoint devices and the data that resides on them. With centralized management and control features, deployment is a snap, while flexible configuration options reduce the impact of backup workloads traveling over the network. Carbonite Endpoint also includes advanced security options like device tracking, legal hold and more to keep endpoints like laptops and mobile devices safe from internal and external threats. This solution also gives your organization the necessary tools for managing global bandwidth usage intelligently so there’s minimal disruption to network performance. Discover scalable, flexible, enterprise-grade endpoint backup for your mobile workforce with Carbonite Endpoint.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [OpenText](https://www.g2.com/sellers/opentext)
- **Year Founded:** 1991
- **HQ Location:** Waterloo, ON
- **Twitter:** @OpenText (21,588 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2709/ (23,339 employees on LinkedIn®)
- **Ownership:** NASDAQ:OTEX

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 23. [PC Matic PRO Endpoint Suite](https://www.g2.com/products/pc-matic-pro-endpoint-suite/reviews)
  PC Matic PRO Endpoint Suite is a comprehensive endpoint security solution designed to protect businesses, organizations, and government entities from a wide range of cyber threats, including malware, ransomware, and unauthorized applications. By implementing a Zero Trust approach through its patented application allowlisting technology, PC Matic PRO ensures that only verified and trusted applications run on your network, effectively blocking malicious software before it can execute. This proactive defense mechanism not only enhances security but also reduces the burden on IT staff by automating threat prevention and system optimization tasks. Key Features and Functionality: - Application Allowlisting: Utilizes a default-deny security model that permits only known, trusted applications to run, effectively preventing unauthorized software and malware from executing. - Real-Time Protection: The SuperShield feature continuously monitors devices, blocking unknown and potentially harmful files and scripts in real time. - Multi-Layered Threat Prevention: Employs multiple layers of defense, including global, local, and signature allowlists, as well as specialized protections against fileless malware and Remote Desktop Protocol attacks. - Centralized Management Console: Offers a cloud-based dashboard for managing all endpoints, facilitating tasks such as remote monitoring, file management, and policy administration. - System Optimization Tools: Includes features to enhance device performance by removing unnecessary files, optimizing system settings, and ensuring software is up to date. Primary Value and Problem Solved: PC Matic PRO Endpoint Suite addresses the critical need for robust, proactive cybersecurity in an era of increasingly sophisticated cyber threats. By implementing a Zero Trust model with application allowlisting, it effectively prevents unauthorized applications and malware from executing, thereby reducing the risk of data breaches and system compromises. This approach not only enhances security but also streamlines IT operations by automating threat prevention and system optimization tasks, allowing IT staff to focus on strategic initiatives rather than constant threat mitigation. Additionally, its centralized management console simplifies the oversight of multiple endpoints, ensuring consistent security policies and efficient device management across the organization.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [PC Matic](https://www.g2.com/sellers/pc-matic)
- **Year Founded:** 1999
- **HQ Location:** Sioux City, US
- **LinkedIn® Page:** https://www.linkedin.com/company/pcmatic/ (64 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


#### Pros & Cons

**Pros:**

- Antivirus Software (1 reviews)
- Deployment Ease (1 reviews)
- Easy Deployment (1 reviews)
- Easy Management (1 reviews)


### 24. [Surf Security Zero Trust Enterprise Browser](https://www.g2.com/products/surf-security-zero-trust-enterprise-browser/reviews)
  Founded in London, UK in 2022, SURF Security is an endpoint protection Browser-SASE (secure access service edge) cybersecurity company that has created the world’s first enterprise zero-trust browser and extension with security at its core. These two products capitalise on the rise of both the working-from-home phenomenon, and ‘software as a service’ or SaaS platforms that are used through a browser. SURF secures the browser itself, either replacing or augmenting consumer browsers such as Chrome, Edge, or Safari. This approach helps ensure compliance, defends organisations from breaches and protects users from social engineering attacks such as phishing—all on the user’s device.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 5

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 8.9/10)
- **Compliance:** 10.0/10 (Category avg: 9.0/10)
- **Endpoint Intelligence:** 10.0/10 (Category avg: 9.0/10)
- **Behavioral Analysis:** 10.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [SURFSecurity](https://www.g2.com/sellers/surfsecurity)
- **Year Founded:** 2021
- **HQ Location:** London, GB
- **LinkedIn® Page:** http://www.linkedin.com/company/surfsecurity (33 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 40% Small-Business, 40% Enterprise


#### Pros & Cons

**Pros:**

- Security (4 reviews)
- Security Features (4 reviews)
- Reliability (3 reviews)
- Access Control (2 reviews)
- Ease of Use (2 reviews)

**Cons:**

- Complex Configuration (1 reviews)
- Difficult Configuration (1 reviews)
- Learning Curve (1 reviews)
- Limited Customization (1 reviews)
- Onboarding Difficulties (1 reviews)

### 25. [AhnLab EPP (Endpoint Protection Platform)](https://www.g2.com/products/ahnlab-epp-endpoint-protection-platform/reviews)
  AhnLab EPP unifies modern endpoint security tools across anti-malware, security assessment, patch management, personal data protection, and endpoint detection &amp; response (EDR) to accelerate dynamic endpoint protection. Why AhnLab EPP • Frictionless Integration AhnLab EPP represents our platform-centric approach by pulling together various security controls ranging from anti-malware to EDR. It drives our customers’ proactive approach toward security monitoring, policy enforcement, and threat response. • Next-Level Efficiency AhnLab EPP supercharges our customers with next-level operational efficiency and business productivity by delivering centralized management of industry-leading security tools within a single console and agent. • Unmatched Scalability &amp; Stability AhnLab EPP supports various deployment methods and server scaling techniques to address diverse security requirements. It ensures operational stability by harnessing load balancers and expands threat response coverage by smoothly interacting with third-party products. Key Features • Comprehensive Security Toolset AhnLab EPP pulls together full-scale endpoint security controls to actualize an ultimate single-pane-of-glass experience. It empowers users with unrivaled malware prevention, patch management, security assessment, data protection, and EDR to harden security posture and take down sophisticated cyber threats. • Integrated Rules &amp; Policies Integrated management is at the heart of our endpoint protection platform. A centralized rule and policy enforcement drive security tools of AhnLab EPP to run at the peak level and flexibly interact with each other. • User-Defined Dashboard &amp; Report User-defined dashboard and report of AhnLab EPP customizable with customers’ requirements bolster operational efficiency and flexibility. The central view of abundant security insights from multiple security controls accelerate organization’s security decision making process. • Centralized Data Ingestion AhnLab EPP garners extensive data from endpoint devices across the organization by leveraging its agent. Then, it performs comprehensive inspection and analysis into risky or suspicious devices to safeguard business assets from advanced malicious campaigns. • Zero Trust Implementation AhnLab EPP plays a significant part in realizing the zero trust initiative. It executes rigorous endpoint security assessment and allows network connection only for secure devices by interacting with our next-generation firewall, AhnLab TrusGuard.




**Seller Details:**

- **Seller:** [AhnLab](https://www.g2.com/sellers/ahnlab-7be65c0f-4030-4ddd-9d2c-8413df0f9f71)
- **Year Founded:** 1995
- **HQ Location:** Seongnam-si, KR
- **Twitter:** @AhnLab_SecuInfo (2,948 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/ahnlab-inc./ (639 employees on LinkedIn®)





## Parent Category

[Endpoint Protection Software](https://www.g2.com/categories/endpoint-protection)



## Related Categories

- [Endpoint Detection &amp; Response (EDR) Software](https://www.g2.com/categories/endpoint-detection-response-edr)
- [Antivirus Software](https://www.g2.com/categories/antivirus)
- [Endpoint Management Software](https://www.g2.com/categories/endpoint-management)
- [Patch Management Software](https://www.g2.com/categories/patch-management)
- [Managed Detection and Response (MDR)  Software](https://www.g2.com/categories/managed-detection-and-response-mdr)
- [Extended Detection and Response (XDR) Platforms](https://www.g2.com/categories/extended-detection-and-response-xdr-platforms)
- [Identity Threat Detection and Response (ITDR)  Software](https://www.g2.com/categories/identity-threat-detection-and-response-itdr)




