Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

EnCase Endpoint Security

4.8
(2)

EnCase Endpoint Security combines two industry-leading products, EnCase Analytics and EnCase Cybersecurity, to detect, validate and prioritize unknown threats, assess the scope and impact of a compromise, and return devices to a trusted state.

Work for EnCase Endpoint Security?

Learning about EnCase Endpoint Security?

We can help you find the solution that fits you best.

EnCase Endpoint Security Reviews

Ask EnCase Endpoint Security a Question
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 2 EnCase Endpoint Security reviews
LinkedIn Connections
EnCase Endpoint Security review by User in Law Practice
User in Law Practice
Validated Reviewer
Verified Current User
Review Source
content

"Top notch security "

What do you like best?

We have seen our malware and spyware issues dramatically drop since releasing this product. We have not had any issues with systems being down for any period of time.

What do you dislike?

Does slow down the bandwidth but we are secure. Takes a while to create bypass list and the need to add sites that you wouldn't think you would.

Recommendations to others considering the product

A great level of protection against the nastiness of the outside world.

What business problems are you solving with the product? What benefits have you realized?

A safer computer environment for our users and most importantly our data. We have dramatically lowered the amount of PC downtime.

Sign in to G2 to see what your connections have to say about EnCase Endpoint Security
EnCase Endpoint Security review by Collette K.
Collette K.
Validated Reviewer
Verified Current User
Review Source
content

"EnCase Endpoint Security Review"

What do you like best?

Ease of use, ability to import apps and scripts, layout is better than ftk

What do you dislike?

There is nothing I dislike about EnCase, it is a great product and gets the job done.

What business problems are you solving with the product? What benefits have you realized?

Imaging, data review, data searching, reporting, custom content, filtering

What Endpoint Detection & Response (EDR) solution do you use?

Thanks for letting us know!

There are not enough reviews of EnCase Endpoint Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Webroot Endpoint Protection Logo
Webroot Endpoint Protection
4.7
(126)
Webroot SecureAnywhere Business Endpoint Protection offers a revolutionary approach to malware protection.
2
FortiClient Logo
FortiClient
4.3
(50)
Fortinet is a leader in network security appliance solutions and provides real-time network protection to more than 125,000 customers worldwide.
3
CB Defense (on the PSC) Logo
CB Defense (on the PSC)
4.2
(19)
CB Defense (on the PSC) is a next-generation anti-virus solution for desktops, laptops, and servers that protects computers from the full spectrum of modern cyber attacks, delivering the best endpoint protection with the least amount of work.
4
SentinelOne Endpoint Protection Platform Logo
SentinelOne Endpoint Protection Platform
4.6
(12)
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.
5
FireEye Endpoint Security Logo
FireEye Endpoint Security
3.8
(6)
FireEye Endpoint Security (HX series) products provide organizations with the ability to continuously monitor endpoints for advanced malware and indicators of compromise that routinely bypass signature-based and defense-in-depth security systems.
6
Tanium Logo
Tanium
4.2
(5)
An enterprise solution that allows you to query and modify your managed computer assets in seconds, regardless of the size of your network.
7
Comodo Endpoint Security Manager Logo
Comodo Endpoint Security Manager
4.0
(4)
Endpoint security management is all about adequately securing such endpoints and thereby securing a network by blocking access attempts and such risky activities at endpoints.
8
Symantec Endpoint Detection and Response (EDR) Logo
Symantec Endpoint Detection and Response (EDR)
4.0
(5)
Detect, isolate, and eliminate intrusions across all endpoints using AI, automated incident generation, and unparalleled threat intelligence.
9
Cybereason Endpoint Detection and Response  Platform Logo
Cybereason Endpoint Detection and Response Platform
4.5
(3)
Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Most organizations deploy Cybereason and start detecting attacks within 24 to 48 hours.
10
Falcon Endpoint Protection Logo
Falcon Endpoint Protection
4.3
(2)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
Show more
Kate from G2

Learning about EnCase Endpoint Security?

I can help.
* We monitor all EnCase Endpoint Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.