Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the m
Also listed in Extended Detection and Response (XDR) Platforms, Endpoint Detection & Response (EDR), Antivirus
I really like the advanced threat protection and how it uses AI and deep Learning to catch new malware. The ransomware rollback feature is a lifesaver, and the root cause analysis makes investigations easier. the dashboard is clean and simple, and having everything in one place saves time. it is easy to deploy. and easy to integrate. Review collected by and hosted on G2.com.
Endpoint Central is an integrated desktop and mobile device management software that helps in managing servers, laptops, desktops, smartphones, and tablets from a central loca
Also listed in Endpoint Management, Endpoint Protection Platforms, Patch Management, Antivirus, Enterprise IT Management
Endpoint Central provides us with a single console to manage and secure all our Windows and Linux endpoints across multiple offices. Automated OS and third-party patch deployment, software rollouts, and remote control have cut down on manual effort for the IT team and helped keep our systems consistently up to date. The built-in hardware and software inventory, together with compliance reporting, also makes it easier to prepare for audits and clearly track what’s installed on each device. Review collected by and hosted on G2.com.
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs a
Also listed in Managed Detection and Response (MDR), Endpoint Detection & Response (EDR), Endpoint Management, Antivirus

ThreatDown has been very helpful, particularly with its patch management capabilities. The ability to deploy updates and remotely restart computers directly from the console when a software update is pending is extremely efficient and saves significant administrative time. The centralized management interface simplifies oversight and reduces manual intervention. At this time, I have not experienced any issues or complaints with the platform. Review collected by and hosted on G2.com.
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from e
Also listed in Extended Detection and Response (XDR) Platforms, Managed Detection and Response (MDR), Endpoint Detection & Response (EDR), Malware Analysis Tools, Patch Management
What I like most about ESET PROTECT is how thoroughly it scans the entire system for vulnerabilities, which makes it much easier to understand what’s happening across the environment. When it detects a threat, it shows up in a dedicated panel, so it’s immediately noticeable and simple to track, investigate, and follow up on. The scanner checks for both internal and external threats, including ransomware, which helps stop attacks before they can cause real damage. That saves time and can also help keep costs down. It also produces detailed, automated reports that managers can quickly review and act on.
It also stands out for its clean, intuitive interface that feels genuinely user-friendly. Setup, configuration, and implementation are straightforward, so people can adopt it quickly without extra complexity. Since it’s cloud-based, day-to-day management feels smoother and more efficient. On top of that, it can scan and monitor the web to identify both known and unknown threats, while helping reduce the overall attack surface. Review collected by and hosted on G2.com.
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene,
Also listed in AWS Marketplace, Identity Threat Detection and Response (ITDR), Extended Detection and Response (XDR) Platforms, User and Entity Behavior Analytics (UEBA), ServiceNow Store Apps
What I like most is the lightweight agent and powerful real-time threat detection capabilities. The platform runs smoothly without impacting system performance, which is critical in a production environment. It's behavioral-based detection and AI-driven analysis provide excellent protection against advanced threats, including ransomware and zero-day attacks. Having a centralized cloud console also gives strong visibility across our endpoints, making monitoring and incident investigation much more efficient. Review collected by and hosted on G2.com.
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X
Also listed in Digital Forensics, Endpoint Management, Antivirus, Endpoint Detection & Response (EDR), Extended Detection and Response (XDR) Platforms

One new thing I like about Check Point Harmony Endpoint is the improved visibility and control in the management console. It is easier to see the security status of endpoints and take quick action when something looks risky.
I also like the stronger prevention features, such as better protection against ransomware and suspicious behavior. It helps us respond faster and reduces the chance of an infection spreading. Review collected by and hosted on G2.com.
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation
Also listed in Cloud Email Security, Server Backup, SaaS Backup, Patch Management, Endpoint Detection & Response (EDR)
The centralised management gives us strong visibility across client sites, and it supports and integrates with a wide range of the products our customers rely on, including Microsoft 365 and SQL Server. This coupled with ease of use makes this a great value offering to add to our service portfolio. Implementation to workloads are also easy and quick. Review collected by and hosted on G2.com.
Chrome offers an dedicated enterprise download bundle, giving admins access to additional resources and policy templates for managing Chrome across desktop environments in the
Also listed in Secure Enterprise Browser, Digital Employee Experience (DEX) Management, Endpoint Protection Platforms
What I like about it really comes down to three main things. First, the private browsing capability makes it feel both effective and reliable. Second, it’s very customizable, which helps me keep it secure and set up exactly the way I want. Third, the history management is excellent: it’s straightforward to use, easy to understand, and consistently dependable. Review collected by and hosted on G2.com.
MetaDefender is a software that analises suspicious files.
Also listed in Cloud File Security, Data Loss Prevention (DLP), Vulnerability Scanner, Threat Intelligence, Endpoint Protection Platforms
File scanning runs consistently in the background and we have not seen noticeable slowdowns in applications or file services. The scan results are easy for non security teams to understand, which helps reduce escalations to IT. Integration was also straightforward, allowing us to add file inspection into existing systems without introducing new tools for staff to manage. Review collected by and hosted on G2.com.
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
Also listed in Insider Threat Management (ITM), Malware Analysis Tools, Cloud Security Monitoring and Analytics, Cloud File Security, Cloud Compliance

The product is super simple to use, and you can essentially set it and forget it. It will proactively email alerts to you, and their team can also take action on your behalf if you prefer that. The best thing is their Customer Success team. You get a dedicated person who works to help implement and will also support your end users in setting the system up if you prefer a white-glove treatment or don't have a deep team to manage deployment. We have been incredibly pleased with Madi Fittanto, who always exceeds expectations. While this is not the traditional system you spend thousands annually on, it's an incredible value and perfectly meets our needs for compliance with our cybersecurity insurance policy. Review collected by and hosted on G2.com.
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how
Also listed in Zero Trust Platforms, Endpoint Detection & Response (EDR), Managed Detection and Response (MDR), Zero Trust Networking

I appreciate ThreatLocker Platform for its application allow listing functionality, which is key in securing both our company and our clients from cyber threats. Even though it's not the most straightforward software to use, the training resources are plentiful and the support is excellent. I value features like ring fencing that restrict app interactions and control their internet access, as well as network and storage protection. The initial installation is pretty easy, and I like that it can run in learning mode, which is important for training it before moving to the protection mode. Review collected by and hosted on G2.com.
Kaspersky Anti-Virus is a comprehensive security solution designed to protect computers from a wide range of malware threats, including viruses, trojans, worms, spyware, adwar

What I like most about Kaspersky AntiVirus is that it works in the background without bothering, but it's always there when needed. I've noticed that it doesn't slow down my computer like other antivirus programs I tried before, and its detection system is very accurate. It gives me peace of mind knowing that I'm protected without having to be on alert all the time. Additionally, its interface is clear, without unnecessary complications, which I really appreciate. Review collected by and hosted on G2.com.
Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Mode
Also listed in Antivirus
It has given us confidence in securing critical systems by preventing unauthorized apps from running reducing out attack surface. The best part is it is easy to use and implement with good integration capabilities. Carbon Black Support is awesome and the long-term benefits of using the product every day helped us enhance security and compliance. Review collected by and hosted on G2.com.
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, ra
Also listed in Identity Threat Detection and Response (ITDR), Extended Detection and Response (XDR) Platforms, Deception Technology, Endpoint Protection Platforms, Vulnerability Scanner

The best thing is how quickly it detects and blocks the threats without any manual work , agent is very light and doesn't slow down the system and it has very reliable real time threat monitoring. Another great part is Storyline, which shows the chain of events in a simple way Review collected by and hosted on G2.com.
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solut
I really appreciate that Malwarebytes for Teams blocks attacks on my PC, providing immense peace of mind and keeping my system completely secure. I especially like the value and ease of use it offers, along with the ease of setting it up initially. The automatic scans and ability to set parameters make it very user-friendly and efficient. Review collected by and hosted on G2.com.
BlackFog provides GDPR privacy and fileless cyberattack defense for real time protection against online threats. It focuses on non-signature based threat detection using outbo
Also listed in Managed Detection and Response (MDR), Data Loss Prevention (DLP), Endpoint Management, Endpoint Detection & Response (EDR), Threat Intelligence
I greatly appreciate BlackFog’s exceptional service and product quality. The software stands out as fantastic, providing a level of performance that is thoroughly satisfying. Its user-friendly interface and support staff are incredibly friendly and easy to work with, which greatly enhances the overall experience. The straightforward setup, with substantial assistance from the BlackFog team, made the initial deployment seamless. The software effectively addresses critical issues like data security for various clients, including those in the legal, medical, and insurance fields, which is crucial for my managed service packages. Additionally, the deployment process and the management console are highly efficient, particularly with the new tenant function. This feature significantly simplifies client management and deployment processes. Overall, I'm impressed with the value BlackFog offers, making it a choice I'm likely to repurchase and recommend enthusiastically. Review collected by and hosted on G2.com.
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visib
Also listed in Extended Detection and Response (XDR) Platforms, Deception Technology, User and Entity Behavior Analytics (UEBA), Managed Detection and Response (MDR), Endpoint Protection Platforms

I love the console because it is very user-friendly and has many options. I also really like the whole SOC part, which is very efficient and effective. Additionally, I value the ability to integrate security into different clouds like Microsoft and Google, which is very important for us. The ability to centralize logs from third-party devices, such as SonyWolf and Fortinet Firewalls, is also one of the things I like the most. This whole set is what I truly appreciate about Cynet - All-in-One Cybersecurity Platform. Review collected by and hosted on G2.com.
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vu
Also listed in Endpoint Management, Antivirus, Zero Trust Networking, Zero Trust Platforms

What I like most about FortiClient VPN is its reliability and strong security prioritization. Once the IT team has configured it, connecting to the company network is simple, consistent, and easy to repeat on a day-to-day basis. The client feels stable overall, and I rarely run into unexpected disconnects. I also appreciate how well it integrates with Fortinet’s security ecosystem, which gives me added confidence that my data is encrypted and protected. From a user perspective, it does its job in the background without noticeably slowing down my system. Review collected by and hosted on G2.com.
Bastion is a new breed of cybersecurity platform for small and mid-sized businesses (SMBs) and the Managed Service Providers (MSPs) that support them. A single platform that s
Also listed in Cloud Email Security, Security Awareness Training

In less than one hour, I’ve been able to protect my employees, e-mails, endpoints, Google Workspace and websites all within the same interface. It’s super intuitive and provided actionable feedback on how to improve my company’s security posture. The most impactful features are the phishing / awareness suites and the external surface scan.
On a weekly basis, it now provides in-depth visibility on my exposure. The reporting modules are also super useful to demonstrate our company’s commitment to cyber security to customers & partners. Review collected by and hosted on G2.com.
Agency is a forward-deployed AI cybersecurity and compliance firm dedicated to delivering customized security solutions that protect organizations' most critical threat surfac
Also listed in Digital Risk Protection (DRP) Platforms, Employee Identity Theft Protection

Vicky, Tyler, and the whole Agency team are fantastic and have made the process for maintaining our security posture simple and straightforward. To give you an idea about how good they are, I really haven't thought about our cybersecurity or device management at all in the almost year that we've been using Agency. Implementing it took maybe 30 minutes total, with our whole team getting on a Zoom and it was done. Review collected by and hosted on G2.com.