Introducing G2.ai, the future of software buying.Try now

Anti-Malware Software

Typically, Anti-Malware is a capability of a variety of other G2 Software categories. See more below to select the

best Anti-Malware Software.

Anti-malware software is used to prevent malware attacks on corporate and individual information technology (IT) systems. Since there is a rise in cyber attacks, cybersecurity is a must for all devices. A device falls prey to a malware attack in various ways such as by plugging in an infected USB drive, opening an infected file or a link sent over phishing emails, downloading suspicious apps, and more. All systems, be it Windows, iOS, or Android are susceptible to these malware attacks. It is not to be mistaken with antivirus software, which does not have sufficient capabilities to detect ransomware and other forms of malicious threats. Users can also consider endpoint protection suites for an all-in-one security solution.
Show More
Show Less

Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the m

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Extended Detection and Response (XDR) Platforms, Endpoint Detection & Response (EDR), Antivirus


PS
“Comprehensive Protection with Advanced EDR Features”
What do you like best about Sophos Endpoint?

Sophos’ Intercept X engine is widely regarded as one of the most robust solutions available. It leverages deep learning for malware detection and offers highly effective anti-ransomware and anti-exploit features. Administrators are able to manage endpoints, servers, firewalls, mobile devices, and more through a single, unified console. The user interface is straightforward and intuitive, making navigation simple. Additionally, Sophos endpoint agents generally operate efficiently, even on older hardware, which is an advantage over some traditional antivirus products. Review collected by and hosted on G2.com.

What do you dislike about Sophos Endpoint?

In larger organizations, this kind of load can affect regular productivity, such as causing slow file access or delays when working with large files like spreadsheets or presentations, especially during scans or threat-hunting activities. Additionally, some legitimate applications or harmless files may be incorrectly flagged as threats (false positives), requiring IT staff or users to manually review or whitelist them. Review collected by and hosted on G2.com.

What problems is Sophos Endpoint solving and how is that benefiting you?

Sophos Endpoint (especially with Intercept X) blocks ransomware, exploits, and file-less attacks that traditional antivirus tools often miss. Its web filtering and URL threat intelligence help prevent users from accidentally accessing malicious websites or downloading harmful files. Review collected by and hosted on G2.com.

Show More
Show Less
ThreatDown

ThreatDown

(1,064)4.6 out of 5

ThreatDown

(1,064)4.6 out of 5

Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs a

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Managed Detection and Response (MDR), Endpoint Detection & Response (EDR), Endpoint Management, Antivirus


Joshua S.
JS
“From Malwarebytes to ThreatDown: A Trusted Evolution in Endpoint Protection”
What do you like best about ThreatDown?

Having used Malwarebytes’ free version since 2005 and later its paid offerings, I recently upgraded to ThreatDown to protect our clinical systems more comprehensively.

From the outset, ThreatDown impressed me with:

-Unified Management: One console to deploy and manage across endpoints; servers and workstations alike.

-Impressive Detection & Response: The EDR component identifies and interrupts malicious behaviors that traditional AV might miss.

-Simplified Security for IT-constrained setups: As an admin who juggles many tasks, I appreciate how the platform emphasizes ease of use and rapid deployment.

-Advanced features beyond malware removal: These include vulnerability assessment, patch management, device control, browser and phishing protections, and firewall management - all in the paid bundles.

In practice, deploying ThreatDown meant I could standardize on a single platform for endpoint security, phishing protection, and incident response—reducing complexity and giving me better visibility across our environment.

If I were to sum up: ThreatDown feels like the logical next step after years of trusting Malwarebytes for manual cleanup, now with full proactive protection and enterprise features. It gives me confidence we’re better covered for modern threats. Review collected by and hosted on G2.com.

What do you dislike about ThreatDown?

I have encountered a few minor issues related to support. Review collected by and hosted on G2.com.

What problems is ThreatDown solving and how is that benefiting you?

My main use for this product is Endpoint Protection, and I find myself relying on its management features more and more often. Review collected by and hosted on G2.com.

Show More
Show Less
ESET PROTECT

ESET PROTECT

(914)4.6 out of 5

ESET PROTECT

(914)4.6 out of 5

ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from e

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Extended Detection and Response (XDR) Platforms, Managed Detection and Response (MDR), Endpoint Detection & Response (EDR), Malware Analysis Tools, Patch Management


AK
“Eset Protect works really well so I can't complain much”
What do you like best about ESET PROTECT?

I really liked that it came with the OS and therefore I didn’t have to spend one whole week deploying it. The kusto query language scripting is great for finding weird stuff once you get good at scripting. This tool also communicates with Office 365 and when someone clicks on an email link that has a virus in outlook, this tool will notify us and won’t crash. Review collected by and hosted on G2.com.

What do you dislike about ESET PROTECT?

I hate this product the most because the licensing model is so complex and I would probably need a phd to be able to determine what I’m paying for or what tier provides what feature set. In addition it consumes huge amounts of system resource on older laptops, causing the fan to spin so fast I cannot even hear myself think. Review collected by and hosted on G2.com.

What problems is ESET PROTECT solving and how is that benefiting you?

This tool solves the problem of remote workers accidentally destroying our servers while working remotely from their living room and also the automated removal of standard malware from the network prevents me from having to manually clean each infected machine. So overall this tool prevents me from being fired due to a breach. Review collected by and hosted on G2.com.

Show More
Show Less

Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Digital Forensics, Endpoint Management, Antivirus, Endpoint Detection & Response (EDR), Extended Detection and Response (XDR) Platforms


Abhimanyu K.
AK
“Comprehensive Security and Seamless Management for Remote Teams”
What do you like best about Check Point Harmony Endpoint?

Check Point Harmony Endpoint for its robust and comprehensive security, which includes layers of protection like behavioral analysis and threat emulation. Its unified management console, the Harmony Infinity Portal, is highly valued for simplifying policy management across all endpoints, including remote devices. Other key benefits include a lightweight agent that doesn't impact performance, automated response and recovery features to minimize downtime, and valuable forensic data for incident analysis. Review collected by and hosted on G2.com.

What do you dislike about Check Point Harmony Endpoint?

Check Point Harmony Endpoint include its complex initial setup and learning curve, potential for high resource usage that can slow down older devices, and sometimes slow technical support responses. Other criticisms include a lack of third-party application integration and issues with policy management, especially regarding user-specific settings. Review collected by and hosted on G2.com.

What problems is Check Point Harmony Endpoint solving and how is that benefiting you?

Check Point Harmony Endpoint solves the problems of fragmented endpoint security and modern cyber threats by providing a single, consolidated solution for remote and cloud-based workforces. It protects against ransomware, malware, phishing, and zero-day attacks through features like behavioral analysis, exploit prevention, and threat emulation. This benefits users by simplifying security management, ensuring productivity and data security, and providing unified, enterprise-grade protection with automated detection and response Review collected by and hosted on G2.com.

Show More
Show Less

Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation

Top Anti-Malware Software Result from Cloud Data Security

Also listed in Cloud Email Security, Server Backup, SaaS Backup, Patch Management, Endpoint Detection & Response (EDR)


Rifana H.
RH
Original Information
“Comprehensive Backup and Security, All-in-One!”
What do you like best about Acronis Cyber Protect Cloud?

I like how Acronis Cyber Protect Cloud manages everything from one place. This makes it easier for us to handle backups and recover files whenever something goes wrong. I value the security features that monitor potential threats, giving us notifications for suspicious activities, which helps us respond sooner. The system's ability to check backups, run scans, and restore files as needed is incredibly convenient and saves a lot of time in daily work. The unified dashboard helps us stay organized, ensuring we don't have to switch between different tools. The setup process was smooth and straightforward, much easier and faster than expected. I also appreciate that the integration with other tools works fine without major issues, offering a more unified and intelligent solution than our previous setup. Review collected by and hosted on G2.com.

What do you dislike about Acronis Cyber Protect Cloud?

The time taken for some scans to finish, especially on older machines. I felt that a few settings in the dashboard could be explained better, because it took more time to understand each option. The area that could be improved is the speed of loading pages in the console; they are slower. It would also be helpful if the guidance in the dashboard was a bit clearer for new users to understand better, and if the reporting section had more simple, ready-made templates. Review collected by and hosted on G2.com.

What problems is Acronis Cyber Protect Cloud solving and how is that benefiting you?

I use Acronis Cyber Protect Cloud to handle backups and keep systems safe. It simplifies file recovery and sends security alerts for faster responses. Managing everything from one place saves time and effort while ensuring peace of mind with reliable scans. Review collected by and hosted on G2.com.

Show More
Show Less

CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene,

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in AWS Marketplace, Identity Threat Detection and Response (ITDR), Extended Detection and Response (XDR) Platforms, User and Entity Behavior Analytics (UEBA), ServiceNow Store Apps


D H S.
DS
Original Information
“Effortless Security with Real-Time Protection and Clear Insights”
What do you like best about CrowdStrike Falcon Endpoint Protection Platform?

I like how CrowdStrike Falcon is easy to use and works in the background without slowing down the system. It provides real-time protection against various types of cyber threats, and the cloud-based setup makes it simple to manage. The platform also gives clear reports and insights, helping to quickly spot and fix security issues. Review collected by and hosted on G2.com.

What do you dislike about CrowdStrike Falcon Endpoint Protection Platform?

While CrowdStrike Falcon is effective, it can sometimes generate false positives, which may require extra time to review and resolve. Additionally, the pricing can be on the higher side, especially for smaller businesses or those with many endpoints. Review collected by and hosted on G2.com.

What problems is CrowdStrike Falcon Endpoint Protection Platform solving and how is that benefiting you?

CrowdStrike Falcon solves the problem of protecting endpoints from a wide range of cyber threats, such as malware, ransomware, and phishing attacks. It helps by providing real-time threat detection and automatic responses, reducing the risk of a security breach. This benefits me by ensuring that our systems stay secure without manual intervention, saving time and reducing the workload on the security team. Review collected by and hosted on G2.com.

Show More
Show Less

Chrome offers an dedicated enterprise download bundle, giving admins access to additional resources and policy templates for managing Chrome across desktop environments in the

Top Anti-Malware Software Result from Browser

Also listed in Secure Enterprise Browser, Digital Employee Experience (DEX) Management, Endpoint Protection Platforms


Nyasa B.
NB
“User-Friendly and Secure, but Compatibility Needs Improvement”
What do you like best about Chrome Enterprise?

I appreciate that Chrome Enterprise serves as both an operating system and a collaboration tool in my company, which simplifies our technological framework significantly. The security features provide peace of mind by effectively removing the hassle of managing multiple devices securely. I love the user-friendly and easy-to-use interface, which makes management tasks feel effortless. The clean design saves me a lot of time by allowing me to find menus easily and without complications, streamlining my daily operations. The setup process for Chrome Enterprise was surprisingly simple; I only needed to input my email and set a password, and then the straightforward setup began, which made transitioning to this system remarkably easy. Additionally, I enjoy using Chrome Enterprise alongside Google Workspace and other Google internal tools, fostering a smooth and integrated workflow. Switching from traditional PCs to the Chrome OS was beneficial as it supports Google tools effectively, offering robust security and smooth operation. Review collected by and hosted on G2.com.

What do you dislike about Chrome Enterprise?

Sometimes compatibility with certain apps and software creates hindrance to work with them, especially those that need full desktop support. Review collected by and hosted on G2.com.

What problems is Chrome Enterprise solving and how is that benefiting you?

I use Chrome Enterprise to save time by managing multiple devices securely and effortlessly. Its user-friendly interface makes finding menus quick and simplifies management. Switching from traditional PCs, it provides smooth operation, supporting Google tools with strong security. Review collected by and hosted on G2.com.

Show More
Show Less

Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Zero Trust Platforms, Endpoint Detection & Response (EDR), Managed Detection and Response (MDR), Zero Trust Networking


Mike D.
MD
“As the owner of an MSP, having ThreatLocker as a trusted partner is invaluable!”
What do you like best about ThreatLocker Platform?

ThreatLocker has been one of the best security solutions I’ve ever had the opportunity to work with. What makes it stand out is the balance between powerful, enterprise-grade protection and practical usability for IT teams and end users.

One of the features I like most is Application Whitelisting. It puts full control back into the hands of administrators by allowing only approved applications to run. This proactive approach drastically reduces the risk of ransomware, malware, and unauthorized software slipping through the cracks.

Another standout is Ringfencing, which is incredibly effective in minimizing lateral movement and limiting how applications interact with each other and with sensitive data. Even if something malicious does get on a machine, the damage it can cause is severely restricted.

I also really appreciate the Storage Control feature. Having the ability to lock down USB devices and external drives is essential in today’s security environment. ThreatLocker makes it easy to set granular policies without inconveniencing end users.

The ease of policy management and visibility through the dashboard is excellent. The interface is intuitive, the audit logs are clear, and the ThreatLocker team provides top-notch support whenever needed. Their support staff is knowledgeable, responsive, and genuinely invested in helping customers succeed.

The thing I like the most about ThreatLocker is that they truly care about their customers and partners. You are not just a number to them, and you always have someone that you can reach out to when you need something. Compared to some of the other vendors out there, that is invaluable to me!

Overall, ThreatLocker gives me confidence that endpoints are secured at a much deeper level than traditional antivirus or endpoint detection tools can provide. It’s a solution that not only strengthens the security posture but also empowers IT administrators with control and clarity in ways that were previously possible but certainly not practical. I highly recommend ThreatLocker to any organization seeking robust, modern zero-trust endpoint security. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker Platform?

ThreatLocker is an excellent security platform, but like any solution, there are always areas where enhancements could make it even stronger.

The ThreatLocker dev team is constantly working to improve the product, and they are rolling out new features regularly. While this is definitely a good thing, it can also make the implementation and ongoing training a little more challenging because things are always changing. However, the Cyber Hero support team is always there to assist in any way you need.

Any negative issues that you may run into are always addressed right away, so that gives me the comfort of knowing that even if there is an issue, I feel confident that we will be able to get it resolved promptly! Review collected by and hosted on G2.com.

What problems is ThreatLocker Platform solving and how is that benefiting you?

As an MSP, we face the daily challenge of securing diverse client environments while balancing ease of management and cost efficiency. ThreatLocker helps address many of the most common pain points like Ransomware & Malware Prevention. Traditional antivirus often reacts after an attack is underway, where ThreatLocker’s application whitelisting flips the model by only allowing known, approved applications to run, dramatically reducing ransomware and malware risk.

MSPs also struggle with users installing risky or unlicensed software. ThreatLocker gives complete control over what can run, helping maintain compliance and reducing support issues caused by shadow IT. Having protection against lateral movement and data breach means that even if an endpoint is compromised, Ringfencing restricts how applications interact with each other and sensitive data, containing threats before they spread across a client’s network.

USB drives and external devices are a major attack vector and with Storage Control, we can block or tightly control external media access, protecting against data theft and malware infections.

As you can imagine, managing dozens of clients can be overwhelming, but ThreatLocker’s centralized dashboard allows us to push consistent security policies, monitor compliance, and respond to issues quickly, while also reducing support tickets. By enforcing strict application and device controls, we see fewer incidents of users breaking systems with unauthorized installs or infected USB devices, freeing technicians to focus on more important work.

Many industries require strict access and application controls (HIPAA, PCI-DSS, CMMC, etc.). ThreatLocker provides MSPs with the tools to help clients achieve and demonstrate compliance more easily.

By deploying ThreatLocker, MSPs position themselves as proactive security partners who prevent problems rather than just react to them, strengthening client relationships and retention. Review collected by and hosted on G2.com.

Show More
Show Less

Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.

Top Anti-Malware Software Result from Cloud Data Security

Also listed in Insider Threat Management (ITM), Malware Analysis Tools, Cloud Security Monitoring and Analytics, Cloud File Security, Cloud Compliance


LJ
Original Information
“Coro Cyber Security”
What do you like best about Coro Cybersecurity?

It sits in front of the office 365 and uses the AI to identify and flag potential spam and phishing. it puts the white list and black list for office 365 on a single dashboard allowing the administrator to easily change the list. (anyone that is using office 365 knows the admin console is very clunky to get around in)

There have been a couple improvements in the dashboard and they are moving towards a very intuitive platform that will be extrememly easy to use Review collected by and hosted on G2.com.

What do you dislike about Coro Cybersecurity?

It appears to be a little particular about the version of outlook for the coro add-in so the end users can let the admin know what they think of the flagged e-mails. This is still an issue. Review collected by and hosted on G2.com.

What problems is Coro Cybersecurity solving and how is that benefiting you?

It makes it tremendously easier to white list or blacklist e-mails individual addresses or whole domains.

it also is constantly looking for other threats such as credit card numbers inside e-mail bodies to try and mitigate risks.

we are also using the endpoint protection in conjunction with our WEBROOT.

it really seems to strengthen or cybersecurity no issues so far Review collected by and hosted on G2.com.

Show More
Show Less

Kaspersky AntiVirus is the smarter way to protect everything on your PC… to help keep you safe from viruses, spyware & Trojans – and help stop ransomware locking up all your f

Top Anti-Malware Software Result from Antivirus


Nestor G.
NG
“Simple, silent, and always there when I need it”
What do you like best about Kaspersky AntiVirus?

What I like most about Kaspersky AntiVirus is that it works in the background without bothering, but it's always there when needed. I've noticed that it doesn't slow down my computer like other antivirus programs I tried before, and its detection system is very accurate. It gives me peace of mind knowing that I'm protected without having to be on alert all the time. Additionally, its interface is clear, without unnecessary complications, which I really appreciate. Review collected by and hosted on G2.com.

What do you dislike about Kaspersky AntiVirus?

What I don't like about Kaspersky AntiVirus is that sometimes its notifications can be a bit persistent, especially when there are pending updates or certain files it detects as suspicious but I know are safe. I would also like the renewal process to be clearer, as the subscription system can be confusing if you're not very attentive. Other than that, it works quite well. Review collected by and hosted on G2.com.

What problems is Kaspersky AntiVirus solving and how is that benefiting you?

One of the main problems I used to have was the constant worry about downloading files or opening emails with viruses. Since I started using Kaspersky AntiVirus, that has stopped being a stress. The program detects threats in real-time and alerts me before something serious happens, even on suspicious websites. It has also helped me keep my computer clean and fast because it blocks suspicious programs that I didn't even know were running before. In summary, it gives me peace of mind and that is worth a lot. Review collected by and hosted on G2.com.

Show More
Show Less
MetaDefender

MetaDefender

(14)4.5 out of 5

MetaDefender

(14)4.5 out of 5

MetaDefender is a software that analises suspicious files.

Top Anti-Malware Software Result from Antivirus

Also listed in Cloud File Security, Data Loss Prevention (DLP), Vulnerability Scanner, Threat Intelligence, Endpoint Protection Platforms


AS
“Seamless software for file security and protection against malware and data breaches”
What do you like best about MetaDefender?

The software is great as it helps one to scan the whole computer hence eliminating threats. The platform helps users to know and get all the solutions to the problems that they may experience when they are operating the computer. The software has also a splendid supportive team that is always on the foremost path in helping their customers and this leads to great customer satisfaction. Review collected by and hosted on G2.com.

What do you dislike about MetaDefender?

The platform is a game-changer in every sense!! it has exceeded my expectations as it has a low price that is budget-friendly and a great user interface that is simple to use and I could recommend it to all individuals. Review collected by and hosted on G2.com.

What problems is MetaDefender solving and how is that benefiting you?

The platform is great as it enables its users to have a clean computer that is free from malicious files. The platform is an indispensable tool to most users as it allows them to upload all kinds of documents as it scans online before saving them on the system. The platform enables most of the companies to secure their data and sensitive files that could be in a computer and it erase the dangerous files that could corrupt the computer. Review collected by and hosted on G2.com.

Show More
Show Less

Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Mode

Top Anti-Malware Software Result from Endpoint Management

Also listed in Antivirus


PV
“Powerful Application Control enabling Enhanced Security”
What do you like best about Carbon Black App Control?

It has given us confidence in securing critical systems by preventing unauthorized apps from running reducing out attack surface. The best part is it is easy to use and implement with good integration capabilities. Carbon Black Support is awesome and the long-term benefits of using the product every day helped us enhance security and compliance. Review collected by and hosted on G2.com.

What do you dislike about Carbon Black App Control?

While rare, we have encountered a few false positives like any other tool. But we took care of this with manual whitelisting. Carbon Black provides excellend value for organizations with strict security needs and hence, smaller organizations may find the pricing on the higher side. Review collected by and hosted on G2.com.

What problems is Carbon Black App Control solving and how is that benefiting you?

It has reduced Unauthorized Apps from running on our Endpoints significantly thus reducing the risk of malware infections. It also helps us meet compliance requirements where we allow only authorized applications to run. Another benefit is we can have strict lockdown on critical servers where security is crucial. Review collected by and hosted on G2.com.

Show More
Show Less
BlackFog

BlackFog

(29)4.9 out of 5

BlackFog

(29)4.9 out of 5

BlackFog provides GDPR privacy and fileless cyberattack defense for real time protection against online threats. It focuses on non-signature based threat detection using outbo

Top Anti-Malware Software Result from Insider Threat Management (ITM)

Also listed in Managed Detection and Response (MDR), Data Loss Prevention (DLP), Endpoint Management, Endpoint Detection & Response (EDR), Threat Intelligence


CC
Original Information
“Reliable Data Security with Outstanding Support”
What do you like best about BlackFog?

I greatly appreciate BlackFog’s exceptional service and product quality. The software stands out as fantastic, providing a level of performance that is thoroughly satisfying. Its user-friendly interface and support staff are incredibly friendly and easy to work with, which greatly enhances the overall experience. The straightforward setup, with substantial assistance from the BlackFog team, made the initial deployment seamless. The software effectively addresses critical issues like data security for various clients, including those in the legal, medical, and insurance fields, which is crucial for my managed service packages. Additionally, the deployment process and the management console are highly efficient, particularly with the new tenant function. This feature significantly simplifies client management and deployment processes. Overall, I'm impressed with the value BlackFog offers, making it a choice I'm likely to repurchase and recommend enthusiastically. Review collected by and hosted on G2.com.

What do you dislike about BlackFog?

Nothing Review collected by and hosted on G2.com.

What problems is BlackFog solving and how is that benefiting you?

I use BlackFog for data security in the legal, medical, and insurance fields, ensuring client information is safe. The deployment and management console, especially the new tenant function, streamline managing clients, making my work more efficient. Review collected by and hosted on G2.com.

Show More
Show Less

Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, ra

Top Anti-Malware Software Result from Endpoint Detection & Response (EDR)

Also listed in Identity Threat Detection and Response (ITDR), Extended Detection and Response (XDR) Platforms, Deception Technology, Endpoint Protection Platforms, Vulnerability Scanner


Colin B.
CB
“Outstanding Security Solution with Seamless Compliance”
What do you like best about SentinelOne Singularity Endpoint?

SentinelOne was the only player in the market willing to sign a business associate agreement and ensure HIPAA compliance. I also appreciate the really great price they offer considering these features. SentinelOne Singularity was willing to work with us despite our smaller size and heightened compliance requirements, whereas some other companies wouldn't even quote us given our limited number of users. I found the initial setup to be very easy. Review collected by and hosted on G2.com.

What do you dislike about SentinelOne Singularity Endpoint?

None, we love it. Review collected by and hosted on G2.com.

What problems is SentinelOne Singularity Endpoint solving and how is that benefiting you?

I use SentinelOne Singularity to fulfill compliance requirements, protect endpoints and our network. It offers great pricing and signed a business associate agreement. They were one of the only vendors in the space that would sign a BAA and for HIPAA compliance, and one of the only vendors willing to quote us despite our small size. Review collected by and hosted on G2.com.

Show More
Show Less

Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solut

Top Anti-Malware Software Result from Antivirus


Zin Min L.
ZL
“Malwarebytes is a good endpoint detection software.”
What do you like best about Malwarebytes for Teams?

Malwarebytes's scanning method is good enough for an endpoint and easy to use for even non-technical users. It can inspect deeply to the system with its deep scan option. Quick scan option is also a good way for daily scan. It is so easy to install. Set up guide is so helpful. Review collected by and hosted on G2.com.

What do you dislike about Malwarebytes for Teams?

Its deep scan option takes so long to finish the scanning process. It may even take more than 24 hours. It is not inconvenient for daily usage. Review collected by and hosted on G2.com.

What problems is Malwarebytes for Teams solving and how is that benefiting you?

Malwarebytes protect endpoints from malicious malwares, virus and blocks malicious websites. It can rescue the infected system and remove the malicious malware. Review collected by and hosted on G2.com.

Show More
Show Less

Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. AMP can uncover even

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Endpoint Detection & Response (EDR), Antivirus, Endpoint Management


Jay K.
JK
“Superior in Endpoint Security”
What do you like best about Cisco Secure Endpoints?

Ease of use and deployment to our endpoints. Policy customization and reporting is excellent. Reasearching and finding root cause of an issue with tools provided helps tremendously as well. Review collected by and hosted on G2.com.

What do you dislike about Cisco Secure Endpoints?

Only issue we have come accross is the usability of the product with deprecated operating systems. We understand the risk in that area, but some systems take time to upgrade and many moving parts on said systems might not support newer operating systems. Review collected by and hosted on G2.com.

What problems is Cisco Secure Endpoints solving and how is that benefiting you?

It helps us solve issues with software vulnerabilties, provides solid antivirus and the ability to isolate a machine off the network if a problem is found. Plus so much more. Review collected by and hosted on G2.com.

Show More
Show Less

Bitdefender Antivirus Plus 2018 delivers multiple layers of protection against ransomware. It uses behavioral threat detection to prevent infections, and protects your most im

Top Anti-Malware Software Result from Antivirus


Fabio F.
FF
“Concise tool and serves the purpose”
What do you like best about Bitdefender Antivirus Plus 2020?

lightweight and very effective software for use in offices and companies Review collected by and hosted on G2.com.

What do you dislike about Bitdefender Antivirus Plus 2020?

the VPN part is very limited, generating many notifications Review collected by and hosted on G2.com.

What problems is Bitdefender Antivirus Plus 2020 solving and how is that benefiting you?

Protect me against threats, generate a great sense of security while browsing the internet without increasing the processing consumption of my machine. Review collected by and hosted on G2.com.

Show More
Show Less

AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visib

Top Anti-Malware Software Result from Endpoint Detection & Response (EDR)

Also listed in Extended Detection and Response (XDR) Platforms, Deception Technology, User and Entity Behavior Analytics (UEBA), Managed Detection and Response (MDR), Endpoint Protection Platforms


Adam N.
AN
“An Intuitive All-in-One Security Platform with Room to Grow in Customization”
What do you like best about Cynet - All-in-One Cybersecurity Platform?

What I like best about Cynet is how intuitive and well-organized the dashboard is. The UI feels modern, clean, and easy to navigate, even for users who are not security experts. I also appreciate how much can be automated, from alert triage to remediation, which saves a lot of manual work and speeds up response times. The built-in visibility across endpoints, users, and network activity makes it easy to get a full picture of what’s happening in the environment without having to jump between different tools. Overall, it’s a solid all-in-one platform that simplifies complex security operations. Review collected by and hosted on G2.com.

What do you dislike about Cynet - All-in-One Cybersecurity Platform?

While Cynet is generally very solid, there are a few areas that could be improved. The alert volume can sometimes feel overwhelming, and fine-tuning detection rules or exclusions isn’t always as straightforward as it could be. The reporting section could also use more customization options and better visualization tools. In addition, some updates or scans can slightly impact endpoint performance for a short time. Overall, these are minor issues, but addressing them would make the platform even more efficient and user-friendly. Review collected by and hosted on G2.com.

What problems is Cynet - All-in-One Cybersecurity Platform solving and how is that benefiting you?

Cynet has enabled us to centralize our endpoint protection and response within a single platform. By automating detection and remediation, it has greatly reduced the time we spend investigating alerts and responding to threats. Previously, we depended on several different tools for visibility, threat analysis, and response, but now everything is integrated, making management much simpler. Additionally, Cynet assists in identifying lateral movement and suspicious behavior at an early stage, which strengthens our overall security posture and helps minimize potential downtime for our end-users. Review collected by and hosted on G2.com.

Show More
Show Less
Agency

Agency

(41)4.8 out of 5

Agency

(41)4.8 out of 5

Agency for Business provides personalized managed cybersecurity for your organization's most vulnerable threat surface, the digital lives of your employees. Businesses use Age

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Digital Risk Protection (DRP) Platforms, Employee Identity Theft Protection


Herman P.
HP
Original Information
“Fantastic cybersecurity, and a great team”
What do you like best about Agency?

Vicky, Tyler, and the whole Agency team are fantastic and have made the process for maintaining our security posture simple and straightforward. To give you an idea about how good they are, I really haven't thought about our cybersecurity or device management at all in the almost year that we've been using Agency. Implementing it took maybe 30 minutes total, with our whole team getting on a Zoom and it was done. Review collected by and hosted on G2.com.

What do you dislike about Agency?

I think Agency is most useful for companies with high risk devices. The UI / UX on their platform could use some work. Review collected by and hosted on G2.com.

What problems is Agency solving and how is that benefiting you?

Agency helped us get set up with multi-device management on high risk employee devices, along with installing VPNs and other monitoring services. This helps us with security compliance and simply maintaining our security posture. Their threat detection is great, and so is their penetration testing which revealed some vulnerabilities which we were quickly able to remediate. Review collected by and hosted on G2.com.

Show More
Show Less

Bastion is a new breed of cybersecurity platform for small and mid-sized businesses (SMBs) and the Managed Service Providers (MSPs) that support them. A single platform that s

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Cloud Email Security, Security Awareness Training


Nicolas D.
ND
“Easy, intuitive and really all-in-one cybersecurity solution”
What do you like best about Bastion Technologies?

In less than one hour, I’ve been able to protect my employees, e-mails, endpoints, Google Workspace and websites all within the same interface. It’s super intuitive and provided actionable feedback on how to improve my company’s security posture. The most impactful features are the phishing / awareness suites and the external surface scan.

On a weekly basis, it now provides in-depth visibility on my exposure. The reporting modules are also super useful to demonstrate our company’s commitment to cyber security to customers & partners. Review collected by and hosted on G2.com.

What do you dislike about Bastion Technologies?

I don’t see anything to complain really at this stage Review collected by and hosted on G2.com.

What problems is Bastion Technologies solving and how is that benefiting you?

Bastion Technologies is taking off me the burden of thinking about cyber and cover all items I need to protect my start up. I do not have time or knowledge to compare all solutions and know what is required for me. Bastion is tailored for SMBs and this is saving me hours and headhakes. I set it up quickly, support is super responsive when I had a question, and then I could fix all my issues on my own. Even my employees liked the trainings and phishing simulations and are challenging themselves with it. In a word Bastion is taking all the brain power and risks of cyber of me. Review collected by and hosted on G2.com.

Show More
Show Less