Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the m
Also listed in Extended Detection and Response (XDR) Platforms, Endpoint Detection & Response (EDR), Antivirus
I really like the advanced threat protection and how it uses AI and deep Learning to catch new malware. The ransomware rollback feature is a lifesaver, and the root cause analysis makes investigations easier. the dashboard is clean and simple, and having everything in one place saves time. it is easy to deploy. and easy to integrate. Review collected by and hosted on G2.com.
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs a
Also listed in Managed Detection and Response (MDR), Endpoint Detection & Response (EDR), Endpoint Management, Antivirus
ThreatDown is a fantastic product that we use daily for around 27 clients. Across our client base, we use the full range of ThreatDown products, including Email Security, DNS Filtering, Patch Management, EDR, MDR, and more.
Customer support is quick to respond and resolves issues as efficiently as any support desk can. The product itself is easy to deploy and manage, with clear and flexible policies available through the OneView portal.
While we don’t currently use many integrations, I did set up the Microsoft Teams integration for a period, and it was straightforward to configure and worked as expected. Review collected by and hosted on G2.com.
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from e
Also listed in Extended Detection and Response (XDR) Platforms, Managed Detection and Response (MDR), Endpoint Detection & Response (EDR), Malware Analysis Tools, Patch Management
I really liked that it came with the OS and therefore I didn’t have to spend one whole week deploying it. The kusto query language scripting is great for finding weird stuff once you get good at scripting. This tool also communicates with Office 365 and when someone clicks on an email link that has a virus in outlook, this tool will notify us and won’t crash. Review collected by and hosted on G2.com.
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X
Also listed in Digital Forensics, Endpoint Management, Antivirus, Endpoint Detection & Response (EDR), Extended Detection and Response (XDR) Platforms

One new thing I like about Check Point Harmony Endpoint is the improved visibility and control in the management console. It is easier to see the security status of endpoints and take quick action when something looks risky.
I also like the stronger prevention features, such as better protection against ransomware and suspicious behavior. It helps us respond faster and reduces the chance of an infection spreading. Review collected by and hosted on G2.com.
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation
Also listed in Cloud Email Security, Server Backup, SaaS Backup, Patch Management, Endpoint Detection & Response (EDR)

I like how Acronis Cyber Protect Cloud manages everything from one place. This makes it easier for us to handle backups and recover files whenever something goes wrong. I value the security features that monitor potential threats, giving us notifications for suspicious activities, which helps us respond sooner. The system's ability to check backups, run scans, and restore files as needed is incredibly convenient and saves a lot of time in daily work. The unified dashboard helps us stay organized, ensuring we don't have to switch between different tools. The setup process was smooth and straightforward, much easier and faster than expected. I also appreciate that the integration with other tools works fine without major issues, offering a more unified and intelligent solution than our previous setup. Review collected by and hosted on G2.com.
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene,
Also listed in AWS Marketplace, Identity Threat Detection and Response (ITDR), Extended Detection and Response (XDR) Platforms, User and Entity Behavior Analytics (UEBA), ServiceNow Store Apps

My favorite part of the EDR platform is the platform itself. The portal is very well organized. The navigation of the dashboard is easy to follow to locate the components you are actually looking for. I also like the detection page because of the great breakdown of detailed information it provides in one window. Review collected by and hosted on G2.com.
MetaDefender is a software that analises suspicious files.
Also listed in Cloud File Security, Data Loss Prevention (DLP), Vulnerability Scanner, Threat Intelligence, Endpoint Protection Platforms
File scanning runs consistently in the background and we have not seen noticeable slowdowns in applications or file services. The scan results are easy for non security teams to understand, which helps reduce escalations to IT. Integration was also straightforward, allowing us to add file inspection into existing systems without introducing new tools for staff to manage. Review collected by and hosted on G2.com.
Chrome offers an dedicated enterprise download bundle, giving admins access to additional resources and policy templates for managing Chrome across desktop environments in the
Also listed in Secure Enterprise Browser, Digital Employee Experience (DEX) Management, Endpoint Protection Platforms

As an enterprise-managed version of Chrome, it offers organizations the flexibility to provide employees with organization-specific tools, extensions, and bookmarks. At the same time, it ensures that the browsing environment remains secure for all users. Review collected by and hosted on G2.com.
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how
Also listed in Zero Trust Platforms, Endpoint Detection & Response (EDR), Managed Detection and Response (MDR), Zero Trust Networking

ThreatLocker has been one of the best security solutions I’ve ever had the opportunity to work with. What makes it stand out is the balance between powerful, enterprise-grade protection and practical usability for IT teams and end users.
One of the features I like most is Application Whitelisting. It puts full control back into the hands of administrators by allowing only approved applications to run. This proactive approach drastically reduces the risk of ransomware, malware, and unauthorized software slipping through the cracks.
Another standout is Ringfencing, which is incredibly effective in minimizing lateral movement and limiting how applications interact with each other and with sensitive data. Even if something malicious does get on a machine, the damage it can cause is severely restricted.
I also really appreciate the Storage Control feature. Having the ability to lock down USB devices and external drives is essential in today’s security environment. ThreatLocker makes it easy to set granular policies without inconveniencing end users.
The ease of policy management and visibility through the dashboard is excellent. The interface is intuitive, the audit logs are clear, and the ThreatLocker team provides top-notch support whenever needed. Their support staff is knowledgeable, responsive, and genuinely invested in helping customers succeed.
The thing I like the most about ThreatLocker is that they truly care about their customers and partners. You are not just a number to them, and you always have someone that you can reach out to when you need something. Compared to some of the other vendors out there, that is invaluable to me!
Overall, ThreatLocker gives me confidence that endpoints are secured at a much deeper level than traditional antivirus or endpoint detection tools can provide. It’s a solution that not only strengthens the security posture but also empowers IT administrators with control and clarity in ways that were previously possible but certainly not practical. I highly recommend ThreatLocker to any organization seeking robust, modern zero-trust endpoint security. Review collected by and hosted on G2.com.
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
Also listed in Insider Threat Management (ITM), Malware Analysis Tools, Cloud Security Monitoring and Analytics, Cloud File Security, Cloud Compliance
It sits in front of the office 365 and uses the AI to identify and flag potential spam and phishing. it puts the white list and black list for office 365 on a single dashboard allowing the administrator to easily change the list. (anyone that is using office 365 knows the admin console is very clunky to get around in)
There have been a couple improvements in the dashboard and they are moving towards a very intuitive platform that will be extrememly easy to use Review collected by and hosted on G2.com.
Kaspersky Anti-Virus is a comprehensive security solution designed to protect computers from a wide range of malware threats, including viruses, trojans, worms, spyware, adwar

What I like most about Kaspersky AntiVirus is that it works in the background without bothering, but it's always there when needed. I've noticed that it doesn't slow down my computer like other antivirus programs I tried before, and its detection system is very accurate. It gives me peace of mind knowing that I'm protected without having to be on alert all the time. Additionally, its interface is clear, without unnecessary complications, which I really appreciate. Review collected by and hosted on G2.com.
Heimdal® is a leading cybersecurity provider offering a comprehensive suite of solutions designed to protect organizations from a wide range of digital threats. Established in
Also listed in Email Anti-spam, Patch Management, Privileged Access Management (PAM), Endpoint Management, Antivirus
I like that Heimdal® 'does what it says on the box,' which means it reliably provides the security solutions we expect. I also appreciate that their technicians are available 24x7 for support or help and they really know what they are talking about. Review collected by and hosted on G2.com.
Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Mode
Also listed in Antivirus
It has given us confidence in securing critical systems by preventing unauthorized apps from running reducing out attack surface. The best part is it is easy to use and implement with good integration capabilities. Carbon Black Support is awesome and the long-term benefits of using the product every day helped us enhance security and compliance. Review collected by and hosted on G2.com.
BlackFog provides GDPR privacy and fileless cyberattack defense for real time protection against online threats. It focuses on non-signature based threat detection using outbo
Also listed in Managed Detection and Response (MDR), Data Loss Prevention (DLP), Endpoint Management, Endpoint Detection & Response (EDR), Threat Intelligence
I greatly appreciate BlackFog’s exceptional service and product quality. The software stands out as fantastic, providing a level of performance that is thoroughly satisfying. Its user-friendly interface and support staff are incredibly friendly and easy to work with, which greatly enhances the overall experience. The straightforward setup, with substantial assistance from the BlackFog team, made the initial deployment seamless. The software effectively addresses critical issues like data security for various clients, including those in the legal, medical, and insurance fields, which is crucial for my managed service packages. Additionally, the deployment process and the management console are highly efficient, particularly with the new tenant function. This feature significantly simplifies client management and deployment processes. Overall, I'm impressed with the value BlackFog offers, making it a choice I'm likely to repurchase and recommend enthusiastically. Review collected by and hosted on G2.com.
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, ra
Also listed in Identity Threat Detection and Response (ITDR), Extended Detection and Response (XDR) Platforms, Deception Technology, Endpoint Protection Platforms, Vulnerability Scanner

The best thing is how quickly it detects and blocks the threats without any manual work , agent is very light and doesn't slow down the system and it has very reliable real time threat monitoring. Another great part is Storyline, which shows the chain of events in a simple way Review collected by and hosted on G2.com.
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solut

Malwarebytes's scanning method is good enough for an endpoint and easy to use for even non-technical users. It can inspect deeply to the system with its deep scan option. Quick scan option is also a good way for daily scan. It is so easy to install. Set up guide is so helpful. Review collected by and hosted on G2.com.
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visib
Also listed in Extended Detection and Response (XDR) Platforms, Deception Technology, User and Entity Behavior Analytics (UEBA), Managed Detection and Response (MDR), Endpoint Protection Platforms

What I like best about Cynet is how intuitive and well-organized the dashboard is. The UI feels modern, clean, and easy to navigate, even for users who are not security experts. I also appreciate how much can be automated, from alert triage to remediation, which saves a lot of manual work and speeds up response times. The built-in visibility across endpoints, users, and network activity makes it easy to get a full picture of what’s happening in the environment without having to jump between different tools. Overall, it’s a solid all-in-one platform that simplifies complex security operations. Review collected by and hosted on G2.com.
Bastion is a new breed of cybersecurity platform for small and mid-sized businesses (SMBs) and the Managed Service Providers (MSPs) that support them. A single platform that s
Also listed in Cloud Email Security, Security Awareness Training

In less than one hour, I’ve been able to protect my employees, e-mails, endpoints, Google Workspace and websites all within the same interface. It’s super intuitive and provided actionable feedback on how to improve my company’s security posture. The most impactful features are the phishing / awareness suites and the external surface scan.
On a weekly basis, it now provides in-depth visibility on my exposure. The reporting modules are also super useful to demonstrate our company’s commitment to cyber security to customers & partners. Review collected by and hosted on G2.com.
Agency is a forward-deployed AI cybersecurity and compliance firm dedicated to delivering customized security solutions that protect organizations' most critical threat surfac
Also listed in Digital Risk Protection (DRP) Platforms, Employee Identity Theft Protection

Vicky, Tyler, and the whole Agency team are fantastic and have made the process for maintaining our security posture simple and straightforward. To give you an idea about how good they are, I really haven't thought about our cybersecurity or device management at all in the almost year that we've been using Agency. Implementing it took maybe 30 minutes total, with our whole team getting on a Zoom and it was done. Review collected by and hosted on G2.com.
Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. AMP can uncover even
Also listed in Endpoint Detection & Response (EDR), Antivirus, Endpoint Management
Advanced threat detection through behavioral analysis, with strong EDR and incident investigation capabilities. It also integrates well with other Cisco security solutions, and the centralized, cloud-based management makes it easier to oversee everything from one place. Review collected by and hosted on G2.com.