Introducing G2.ai, the future of software buying.Try now
Versa Cloud ERP
Sponsored
Versa Cloud ERP
Visit Website
Product Avatar Image
Seqrite Endpoint Protection Cloud

By Seqrite

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Seqrite Endpoint Protection Cloud and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.5 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Seqrite Endpoint Protection Cloud?

Versa Cloud ERP
Sponsored
Versa Cloud ERP
Visit Website

Seqrite Endpoint Protection Cloud Reviews & Product Details

Product Avatar Image

Have you used Seqrite Endpoint Protection Cloud before?

Answer a few questions to help the Seqrite Endpoint Protection Cloud community

Seqrite Endpoint Protection Cloud Reviews (1)

Reviews

Seqrite Endpoint Protection Cloud Reviews (1)

4.5
1 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Aman S.
AS
IT Director
Enterprise (> 1000 emp.)
"Governance Warrior - IT Administration"
What do you like best about Seqrite Endpoint Protection Cloud?

I have used this product extensively, particularly during the installation and configuration phases, and I often check the management console for escalations and reports.

What I appreciate most is that it serves as a final line of defense, offering access control for USB, Bluetooth, web filtering, and several other features.

Even if someone manages to bypass Fortinet security, they would still be blocked here, thanks to its active malware scanning, sandboxing, and IDS/IPS scanning capabilities.

Fairly easy to use for experienced IT Professionals and very easy for newbies as well.

Customer Support on the other hand is active for the most of problems or issues that arise.

The frequency of use is very subjective; notifications help us to keep a track and we login when changes are required.

Hosted on own server, ease of integration gets a 5 star from me. Review collected by and hosted on G2.com.

What do you dislike about Seqrite Endpoint Protection Cloud?

The pricing for the service seems fair considering the job it performs. However, when the configured endpoints fail to show up, it can become a real headache for IT executives and administrators alike.

The policies and groups could use better alignment to match the roles needed within an organization.

Additionally, the safe banking window leaves a green border on Chrome, and the browser's memory usage often spikes, making Chrome nearly unusable at times. Review collected by and hosted on G2.com.

There are not enough reviews of Seqrite Endpoint Protection Cloud for G2 to provide buying insight. Below are some alternatives with more reviews:

1
NinjaOne Logo
NinjaOne
4.7
(3,213)
NinjaOne, the automated endpoint management platform, delivers real-time visibility, security, and control over all endpoints to increase productivity for more than 20,000 customers.
2
ThreatDown Logo
ThreatDown
4.6
(1,065)
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.
3
ManageEngine Endpoint Central Logo
ManageEngine Endpoint Central
4.5
(1,029)
Endpoint Central is an integrated desktop and mobile device management software that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
4
Atera Logo
Atera
4.6
(959)
Atera offers an all-in-one IT management platform that combines Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation tools, providing efficient infrastructure management, enhanced service quality, and comprehensive features like patch management and AI-driven analytics, all under a transparent per-technician pricing model.
5
Action1 Logo
Action1
4.9
(813)
Action1 reinvents patching with an infinitely scalable, highly secure, cloud-native platform configurable in 5 minutes — it just works and is always free for the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted by thousands of enterprises managing millions of endpoints globally, Action1 is certified for SOC and ISO 7001. The company is founder-led by industry veterans Alex Vovk and Mike Walters, who founded Netwrix, which has grown into a multi-billion-dollar industry-leading cybersecurity company.
6
Acronis Cyber Protect Logo
Acronis Cyber Protect
4.3
(733)
Acronis Cyber Protect is an integrated solution that combines advanced cybersecurity, data protection, and endpoint management to safeguard businesses against modern cyber threats. By merging backup and anti-malware capabilities into a single platform, it simplifies IT operations, enhances system efficiency, and ensures comprehensive protection across physical, virtual, and cloud environments. Key Features and Functionality: - Integrated Cybersecurity and Backup: Combines AI-based anti-malware with reliable backup to streamline protection processes. - Vulnerability Assessments and Patch Management: Identifies security gaps and applies necessary patches to maintain system integrity. - Disaster Recovery: Ensures business continuity by enabling rapid recovery of data and systems in the event of a cyberattack or system failure. - Endpoint Management: Provides centralized control over all endpoints, facilitating efficient monitoring and management. - Continuous Data Protection: Safeguards critical data by continuously backing up changes, minimizing data loss risks. Primary Value and User Solutions: Acronis Cyber Protect addresses the growing complexity of managing multiple security and backup solutions by offering a unified platform. This integration reduces operational overhead, lowers total cost of ownership, and enhances protection against evolving cyber threats. Businesses benefit from streamlined operations, improved system reliability, and the assurance that their data and systems are secure and recoverable.
7
Iru Logo
Iru
4.7
(727)
Iru allows you to effortlessly configure and enforce advanced macOS security parameters with just a few clicks. Continuous endpoint monitoring and auto-remediation make staying in compliance a breeze.
8
Datto RMM Logo
Datto RMM
4.5
(723)
A proactive remote monitoring & management (RMM) that maximizes productivity.
9
Microsoft System Center Logo
Microsoft System Center
4.1
(585)
Microsoft System Center helps customers realize the benefits of the Microsoft Cloud Platform by delivering unified management. Experience fast time-to-value with out-of-the-box monitoring, provisioning, configuration, automation, protection and self-service.
10
Symantec End-user Endpoint Security Logo
Symantec End-user Endpoint Security
4.4
(549)
Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Seqrite Endpoint Protection Cloud
View Alternatives