Introducing G2.ai, the future of software buying.Try now
Product Avatar Image
Stormshield Endpoint Protection

By Stormshield

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Stormshield Endpoint Protection and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.7 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Stormshield Endpoint Protection?

It's been two months since this profile received a new review
Leave a Review
Product Avatar Image

Have you used Stormshield Endpoint Protection before?

Answer a few questions to help the Stormshield Endpoint Protection community

Stormshield Endpoint Protection Reviews (3)

Reviews

Stormshield Endpoint Protection Reviews (3)

4.7
3 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
TG
Recruitment Consultant
Mid-Market (51-1000 emp.)
"Best Security Features For an Endpoint Protection Software in Its Class and Cost"
What do you like best about Stormshield Endpoint Protection?

While Stormshield Endpoint Protection may look simple, it offers some of the best security features when it comes to endpoint protection. It secures all business endpoints and filters and blocks all threats leaving the business infrastructure safe

The software comes with other features such as quick scan, virus detection, notifications and offers an all-around protection. Review collected by and hosted on G2.com.

What do you dislike about Stormshield Endpoint Protection?

For such an affordable and effective endpoint solution, there is barely anything to complain about Review collected by and hosted on G2.com.

PG
Frontend Developer
Small-Business (50 or fewer emp.)
"My Experience With This Endpoint Protection Tool"
What do you like best about Stormshield Endpoint Protection?

There are many things to like about Stormshield Endpoint Protection. First, the tool comes at a bargain compared with other tools

Another reason to like this tool is that it is very capable despite being affordable

Thirdly, the tool works from the background and never obtrusive

Forth, scaning is easy and fast. Review collected by and hosted on G2.com.

What do you dislike about Stormshield Endpoint Protection?

Stormshield Endpoint Protection offers many benefits that I cannot think of any flaws. No issues so far with this software. Review collected by and hosted on G2.com.

DG
Digital Marketer
Small-Business (50 or fewer emp.)
"Best Endpoint Protection Solution"
What do you like best about Stormshield Endpoint Protection?

I like that the tool is easy to deploy.

The tool is easy to customize and manage. What's more scanning for viruses and malware is easy.

The tool also is not obtrusive Review collected by and hosted on G2.com.

What do you dislike about Stormshield Endpoint Protection?

For the 2 years I have used this tool, I have encountered zero flaws. Review collected by and hosted on G2.com.

There are not enough reviews of Stormshield Endpoint Protection for G2 to provide buying insight. Below are some alternatives with more reviews:

1
ThreatDown Logo
ThreatDown
4.6
(1,073)
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.
2
Check Point Next Generation Firewalls (NGFWs) Logo
Check Point Next Generation Firewalls (NGFWs)
4.5
(567)
Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
3
Symantec End-user Endpoint Security Logo
Symantec End-user Endpoint Security
4.4
(550)
Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus.
4
NinjaOne Logo
NinjaOne
4.7
(3,372)
NinjaOne, the automated endpoint management platform, delivers real-time visibility, security, and control over all endpoints to increase productivity for more than 20,000 customers.
5
ManageEngine Endpoint Central Logo
ManageEngine Endpoint Central
4.5
(1,038)
Endpoint Central is an integrated desktop and mobile device management software that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
6
Atera Logo
Atera
4.6
(1,012)
Atera offers an all-in-one IT management platform that combines Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation tools, providing efficient infrastructure management, enhanced service quality, and comprehensive features like patch management and AI-driven analytics, all under a transparent per-technician pricing model.
7
Action1 Logo
Action1
4.9
(841)
Action1 reinvents patching with an infinitely scalable, highly secure, cloud-native platform configurable in 5 minutes — it just works and is always free for the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted by thousands of enterprises managing millions of endpoints globally, Action1 is certified for SOC and ISO 7001. The company is founder-led by industry veterans Alex Vovk and Mike Walters, who founded Netwrix, which has grown into a multi-billion-dollar industry-leading cybersecurity company.
8
Iru Logo
Iru
4.7
(740)
Iru allows you to effortlessly configure and enforce advanced macOS security parameters with just a few clicks. Continuous endpoint monitoring and auto-remediation make staying in compliance a breeze.
9
Acronis Cyber Protect Logo
Acronis Cyber Protect
4.3
(735)
Acronis Cyber Protect is an integrated solution that combines advanced cybersecurity, data protection, and endpoint management to safeguard businesses against modern cyber threats. By merging backup and anti-malware capabilities into a single platform, it simplifies IT operations, enhances system efficiency, and ensures comprehensive protection across physical, virtual, and cloud environments. Key Features and Functionality: - Integrated Cybersecurity and Backup: Combines AI-based anti-malware with reliable backup to streamline protection processes. - Vulnerability Assessments and Patch Management: Identifies security gaps and applies necessary patches to maintain system integrity. - Disaster Recovery: Ensures business continuity by enabling rapid recovery of data and systems in the event of a cyberattack or system failure. - Endpoint Management: Provides centralized control over all endpoints, facilitating efficient monitoring and management. - Continuous Data Protection: Safeguards critical data by continuously backing up changes, minimizing data loss risks. Primary Value and User Solutions: Acronis Cyber Protect addresses the growing complexity of managing multiple security and backup solutions by offering a unified platform. This integration reduces operational overhead, lowers total cost of ownership, and enhances protection against evolving cyber threats. Businesses benefit from streamlined operations, improved system reliability, and the assurance that their data and systems are secure and recoverable.
10
Datto RMM Logo
Datto RMM
4.5
(725)
A proactive remote monitoring & management (RMM) that maximizes productivity.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Stormshield Endpoint Protection
View Alternatives