Introducing G2.ai, the future of software buying.Try now

Anti-Malware Software

Typically, Anti-Malware is a capability of a variety of other G2 Software categories. See more below to select the

best Anti-Malware Software.

Anti-malware software is used to prevent malware attacks on corporate and individual information technology (IT) systems. Since there is a rise in cyber attacks, cybersecurity is a must for all devices. A device falls prey to a malware attack in various ways such as by plugging in an infected USB drive, opening an infected file or a link sent over phishing emails, downloading suspicious apps, and more. All systems, be it Windows, iOS, or Android are susceptible to these malware attacks. It is not to be mistaken with antivirus software, which does not have sufficient capabilities to detect ransomware and other forms of malicious threats. Users can also consider endpoint protection suites for an all-in-one security solution.
Show More
Show Less

Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the m

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Extended Detection and Response (XDR) Platforms, Endpoint Detection & Response (EDR), Antivirus


HV
“Advanced Threat Protection and Seamless Dashboard Make Security Effortless”
What do you like best about Sophos Endpoint?

I really like the advanced threat protection and how it uses AI and deep Learning to catch new malware. The ransomware rollback feature is a lifesaver, and the root cause analysis makes investigations easier. the dashboard is clean and simple, and having everything in one place saves time. it is easy to deploy. and easy to integrate. Review collected by and hosted on G2.com.

What do you dislike about Sophos Endpoint?

Support can be slow in complex cases, and initial setup may feel overwhelming for beginners, it can slow down older devices due to high resource usage during scans, pricing isn't very clear you need to go through partners for quotes Review collected by and hosted on G2.com.

What problems is Sophos Endpoint solving and how is that benefiting you?

Sophos endpoint has solved a lot of security headaches for us. before using it, we struggled with ransomware risks, malware infections, and manual investigations that took hours, now the AI_ powered detection and ransomware rollback feature give us peace of mind. it also helps with phishing protection and blocks malicious websites. Review collected by and hosted on G2.com.

Show More
Show Less
ThreatDown

ThreatDown

(1,069)4.6 out of 5

ThreatDown

(1,069)4.6 out of 5

Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs a

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Managed Detection and Response (MDR), Endpoint Detection & Response (EDR), Endpoint Management, Antivirus


SC
“Effortless Security Management with Outstanding Support”
What do you like best about ThreatDown?

ThreatDown is a fantastic product that we use daily for around 27 clients. Across our client base, we use the full range of ThreatDown products, including Email Security, DNS Filtering, Patch Management, EDR, MDR, and more.

Customer support is quick to respond and resolves issues as efficiently as any support desk can. The product itself is easy to deploy and manage, with clear and flexible policies available through the OneView portal.

While we don’t currently use many integrations, I did set up the Microsoft Teams integration for a period, and it was straightforward to configure and worked as expected. Review collected by and hosted on G2.com.

What do you dislike about ThreatDown?

Sadly, ThreatDown is sometimes too effective and can be a little over-zealous with its blocking. We have also experienced some performance issues on end-user machines; however, ThreatDown support has been excellent and is working closely with us to identify and resolve the problems. Review collected by and hosted on G2.com.

What problems is ThreatDown solving and how is that benefiting you?

ThreatDown solves the challenge of providing comprehensive, layered security across our client base without adding unnecessary complexity. It gives us strong protection across email security, DNS filtering, patch management, EDR, and MDR from a single platform, which significantly reduces risk for our clients and simplifies day-to-day management for our team.

The benefit to us is twofold. Firstly, it allows us to deliver a high level of security coverage consistently across around 27 clients, using centrally managed policies within the OneView portal. Secondly, it gives us confidence that threats are being actively detected and blocked, sometimes even proactively — which, while occasionally over-zealous, ultimately reinforces the strength of the protection.

Where we’ve encountered performance or blocking issues, ThreatDown support has been highly responsive and effective in helping us identify root causes and resolve them quickly. This combination of strong protection, ease of management, and reliable vendor support has made ThreatDown a core part of our security offering and has materially improved our clients’ overall security posture. Review collected by and hosted on G2.com.

Show More
Show Less
ESET PROTECT

ESET PROTECT

(918)4.6 out of 5

ESET PROTECT

(918)4.6 out of 5

ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from e

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Extended Detection and Response (XDR) Platforms, Managed Detection and Response (MDR), Endpoint Detection & Response (EDR), Malware Analysis Tools, Patch Management


AK
“Eset Protect works really well so I can't complain much”
What do you like best about ESET PROTECT?

I really liked that it came with the OS and therefore I didn’t have to spend one whole week deploying it. The kusto query language scripting is great for finding weird stuff once you get good at scripting. This tool also communicates with Office 365 and when someone clicks on an email link that has a virus in outlook, this tool will notify us and won’t crash. Review collected by and hosted on G2.com.

What do you dislike about ESET PROTECT?

I hate this product the most because the licensing model is so complex and I would probably need a phd to be able to determine what I’m paying for or what tier provides what feature set. In addition it consumes huge amounts of system resource on older laptops, causing the fan to spin so fast I cannot even hear myself think. Review collected by and hosted on G2.com.

What problems is ESET PROTECT solving and how is that benefiting you?

This tool solves the problem of remote workers accidentally destroying our servers while working remotely from their living room and also the automated removal of standard malware from the network prevents me from having to manually clean each infected machine. So overall this tool prevents me from being fired due to a breach. Review collected by and hosted on G2.com.

Show More
Show Less

Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Digital Forensics, Endpoint Management, Antivirus, Endpoint Detection & Response (EDR), Extended Detection and Response (XDR) Platforms


Baris guney y.
BY
Original Information
“Harmony Endpoint is EDPR”
What do you like best about Check Point Harmony Endpoint?

One new thing I like about Check Point Harmony Endpoint is the improved visibility and control in the management console. It is easier to see the security status of endpoints and take quick action when something looks risky.

I also like the stronger prevention features, such as better protection against ransomware and suspicious behavior. It helps us respond faster and reduces the chance of an infection spreading. Review collected by and hosted on G2.com.

What do you dislike about Check Point Harmony Endpoint?

Check Point Harmony Endpoint is strong overall, but there are a few areas it could improve.

First, the management console could be faster and simpler for daily tasks, especially when filtering endpoints, reviewing events, and creating policies. Second, reporting could be more flexible, with easier custom reports and clearer summaries for non-technical stakeholders. Third, the agent could use fewer system resources during scans or updates, so users feel less impact on performance Review collected by and hosted on G2.com.

What problems is Check Point Harmony Endpoint solving and how is that benefiting you?

Harmony Endpoint benefits for installing enterprise endpoint security. It prevents the most imminent threats to the endpoint, such as ransomware, phishing, or malware, while quickly minimizing breach impact with autonomous detection and response. It is the best, I think. Review collected by and hosted on G2.com.

Show More
Show Less

Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation

Top Anti-Malware Software Result from Cloud Data Security

Also listed in Cloud Email Security, Server Backup, SaaS Backup, Patch Management, Endpoint Detection & Response (EDR)


Rifana H.
RH
Original Information
“Comprehensive Backup and Security, All-in-One!”
What do you like best about Acronis Cyber Protect Cloud?

I like how Acronis Cyber Protect Cloud manages everything from one place. This makes it easier for us to handle backups and recover files whenever something goes wrong. I value the security features that monitor potential threats, giving us notifications for suspicious activities, which helps us respond sooner. The system's ability to check backups, run scans, and restore files as needed is incredibly convenient and saves a lot of time in daily work. The unified dashboard helps us stay organized, ensuring we don't have to switch between different tools. The setup process was smooth and straightforward, much easier and faster than expected. I also appreciate that the integration with other tools works fine without major issues, offering a more unified and intelligent solution than our previous setup. Review collected by and hosted on G2.com.

What do you dislike about Acronis Cyber Protect Cloud?

The time taken for some scans to finish, especially on older machines. I felt that a few settings in the dashboard could be explained better, because it took more time to understand each option. The area that could be improved is the speed of loading pages in the console; they are slower. It would also be helpful if the guidance in the dashboard was a bit clearer for new users to understand better, and if the reporting section had more simple, ready-made templates. Review collected by and hosted on G2.com.

What problems is Acronis Cyber Protect Cloud solving and how is that benefiting you?

I use Acronis Cyber Protect Cloud to handle backups and keep systems safe. It simplifies file recovery and sends security alerts for faster responses. Managing everything from one place saves time and effort while ensuring peace of mind with reliable scans. Review collected by and hosted on G2.com.

Show More
Show Less

CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene,

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in AWS Marketplace, Identity Threat Detection and Response (ITDR), Extended Detection and Response (XDR) Platforms, User and Entity Behavior Analytics (UEBA), ServiceNow Store Apps


Matthew M.
MM
“Well-Organized EDR Portal with Easy Navigation and Detailed Detections”
What do you like best about CrowdStrike Falcon Endpoint Protection Platform?

My favorite part of the EDR platform is the platform itself. The portal is very well organized. The navigation of the dashboard is easy to follow to locate the components you are actually looking for. I also like the detection page because of the great breakdown of detailed information it provides in one window. Review collected by and hosted on G2.com.

What do you dislike about CrowdStrike Falcon Endpoint Protection Platform?

It's a bit of a double-edged sword. I like the dashboard layout and the separation of each function, but there can be information overload sometimes. The portal itself is well organized, the data being presented can be overwhelming and hard to follow though. For this reason, the home page of the dashboard can be so valuable as you can see the most significant information cleanly instead of in the mix with so much other information. This could be more of the result of me not personally being as versed in cyber-security. Review collected by and hosted on G2.com.

What problems is CrowdStrike Falcon Endpoint Protection Platform solving and how is that benefiting you?

It serves as just that. It's an endpoint protection tool. It allows our district to confidently monitor our issued devices. Working in schools can open the door to many threats, but the platform allows for me to see what exactly is being accessed and installed. I can perform analysis and remediate issues as they arise. Gone are the days of waiting for a teacher to report issues; I can actively see what is being performed on our laptops. Review collected by and hosted on G2.com.

Show More
Show Less
MetaDefender

MetaDefender

(25)4.5 out of 5

MetaDefender

(25)4.5 out of 5

MetaDefender is a software that analises suspicious files.

Top Anti-Malware Software Result from Antivirus

Also listed in Cloud File Security, Data Loss Prevention (DLP), Vulnerability Scanner, Threat Intelligence, Endpoint Protection Platforms


BT
“Consistent Background Scanning with Easy to Understand Results”
What do you like best about MetaDefender?

File scanning runs consistently in the background and we have not seen noticeable slowdowns in applications or file services. The scan results are easy for non security teams to understand, which helps reduce escalations to IT. Integration was also straightforward, allowing us to add file inspection into existing systems without introducing new tools for staff to manage. Review collected by and hosted on G2.com.

What do you dislike about MetaDefender?

The main effort is during rollout. Policies need careful adjustment so business files are not blocked unnecessarily. Once tuned, ongoing maintenance is minimal. Review collected by and hosted on G2.com.

What problems is MetaDefender solving and how is that benefiting you?

It reduces operational risk caused by infected or suspicious files entering the environment. This leads to fewer disruptions, fewer support tickets, and a more stable IT environment overall. Review collected by and hosted on G2.com.

Show More
Show Less

Chrome offers an dedicated enterprise download bundle, giving admins access to additional resources and policy templates for managing Chrome across desktop environments in the

Top Anti-Malware Software Result from Browser

Also listed in Secure Enterprise Browser, Digital Employee Experience (DEX) Management, Endpoint Protection Platforms


Akash B.
AB
“Flexible, Secure Browser Management for Enterprises”
What do you like best about Chrome Enterprise?

As an enterprise-managed version of Chrome, it offers organizations the flexibility to provide employees with organization-specific tools, extensions, and bookmarks. At the same time, it ensures that the browsing environment remains secure for all users. Review collected by and hosted on G2.com.

What do you dislike about Chrome Enterprise?

The frequent updates sent to users can become an issue, as each update requires a restart. This interrupts ongoing tasks and creates unnecessary hurdles, especially since these updates often bring little to no noticeable improvement to the overall experience. Review collected by and hosted on G2.com.

What problems is Chrome Enterprise solving and how is that benefiting you?

This is the professional, enterprise-grade version of the Chrome browser, designed to help organizations offer a secure browsing environment for their users. It allows organizations to configure multiple custom bookmarks, tools, and extensions, making both work and daily tasks more convenient for users. It make the browsing experience smoother for me with all the links and extensions handy to me, and a feel of a secure environment to work on. Review collected by and hosted on G2.com.

Show More
Show Less

Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Zero Trust Platforms, Endpoint Detection & Response (EDR), Managed Detection and Response (MDR), Zero Trust Networking


Mike D.
MD
“As the owner of an MSP, having ThreatLocker as a trusted partner is invaluable!”
What do you like best about ThreatLocker Platform?

ThreatLocker has been one of the best security solutions I’ve ever had the opportunity to work with. What makes it stand out is the balance between powerful, enterprise-grade protection and practical usability for IT teams and end users.

One of the features I like most is Application Whitelisting. It puts full control back into the hands of administrators by allowing only approved applications to run. This proactive approach drastically reduces the risk of ransomware, malware, and unauthorized software slipping through the cracks.

Another standout is Ringfencing, which is incredibly effective in minimizing lateral movement and limiting how applications interact with each other and with sensitive data. Even if something malicious does get on a machine, the damage it can cause is severely restricted.

I also really appreciate the Storage Control feature. Having the ability to lock down USB devices and external drives is essential in today’s security environment. ThreatLocker makes it easy to set granular policies without inconveniencing end users.

The ease of policy management and visibility through the dashboard is excellent. The interface is intuitive, the audit logs are clear, and the ThreatLocker team provides top-notch support whenever needed. Their support staff is knowledgeable, responsive, and genuinely invested in helping customers succeed.

The thing I like the most about ThreatLocker is that they truly care about their customers and partners. You are not just a number to them, and you always have someone that you can reach out to when you need something. Compared to some of the other vendors out there, that is invaluable to me!

Overall, ThreatLocker gives me confidence that endpoints are secured at a much deeper level than traditional antivirus or endpoint detection tools can provide. It’s a solution that not only strengthens the security posture but also empowers IT administrators with control and clarity in ways that were previously possible but certainly not practical. I highly recommend ThreatLocker to any organization seeking robust, modern zero-trust endpoint security. Review collected by and hosted on G2.com.

What do you dislike about ThreatLocker Platform?

ThreatLocker is an excellent security platform, but like any solution, there are always areas where enhancements could make it even stronger.

The ThreatLocker dev team is constantly working to improve the product, and they are rolling out new features regularly. While this is definitely a good thing, it can also make the implementation and ongoing training a little more challenging because things are always changing. However, the Cyber Hero support team is always there to assist in any way you need.

Any negative issues that you may run into are always addressed right away, so that gives me the comfort of knowing that even if there is an issue, I feel confident that we will be able to get it resolved promptly! Review collected by and hosted on G2.com.

What problems is ThreatLocker Platform solving and how is that benefiting you?

As an MSP, we face the daily challenge of securing diverse client environments while balancing ease of management and cost efficiency. ThreatLocker helps address many of the most common pain points like Ransomware & Malware Prevention. Traditional antivirus often reacts after an attack is underway, where ThreatLocker’s application whitelisting flips the model by only allowing known, approved applications to run, dramatically reducing ransomware and malware risk.

MSPs also struggle with users installing risky or unlicensed software. ThreatLocker gives complete control over what can run, helping maintain compliance and reducing support issues caused by shadow IT. Having protection against lateral movement and data breach means that even if an endpoint is compromised, Ringfencing restricts how applications interact with each other and sensitive data, containing threats before they spread across a client’s network.

USB drives and external devices are a major attack vector and with Storage Control, we can block or tightly control external media access, protecting against data theft and malware infections.

As you can imagine, managing dozens of clients can be overwhelming, but ThreatLocker’s centralized dashboard allows us to push consistent security policies, monitor compliance, and respond to issues quickly, while also reducing support tickets. By enforcing strict application and device controls, we see fewer incidents of users breaking systems with unauthorized installs or infected USB devices, freeing technicians to focus on more important work.

Many industries require strict access and application controls (HIPAA, PCI-DSS, CMMC, etc.). ThreatLocker provides MSPs with the tools to help clients achieve and demonstrate compliance more easily.

By deploying ThreatLocker, MSPs position themselves as proactive security partners who prevent problems rather than just react to them, strengthening client relationships and retention. Review collected by and hosted on G2.com.

Show More
Show Less

Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.

Top Anti-Malware Software Result from Cloud Data Security

Also listed in Insider Threat Management (ITM), Malware Analysis Tools, Cloud Security Monitoring and Analytics, Cloud File Security, Cloud Compliance


LJ
Original Information
“Coro Cyber Security”
What do you like best about Coro Cybersecurity?

It sits in front of the office 365 and uses the AI to identify and flag potential spam and phishing. it puts the white list and black list for office 365 on a single dashboard allowing the administrator to easily change the list. (anyone that is using office 365 knows the admin console is very clunky to get around in)

There have been a couple improvements in the dashboard and they are moving towards a very intuitive platform that will be extrememly easy to use Review collected by and hosted on G2.com.

What do you dislike about Coro Cybersecurity?

It appears to be a little particular about the version of outlook for the coro add-in so the end users can let the admin know what they think of the flagged e-mails. This is still an issue. Review collected by and hosted on G2.com.

What problems is Coro Cybersecurity solving and how is that benefiting you?

It makes it tremendously easier to white list or blacklist e-mails individual addresses or whole domains.

it also is constantly looking for other threats such as credit card numbers inside e-mail bodies to try and mitigate risks.

we are also using the endpoint protection in conjunction with our WEBROOT.

it really seems to strengthen or cybersecurity no issues so far Review collected by and hosted on G2.com.

Show More
Show Less

Kaspersky Anti-Virus is a comprehensive security solution designed to protect computers from a wide range of malware threats, including viruses, trojans, worms, spyware, adwar

Top Anti-Malware Software Result from Antivirus


Nestor G.
NG
“Simple, silent, and always there when I need it”
What do you like best about Kaspersky AntiVirus?

What I like most about Kaspersky AntiVirus is that it works in the background without bothering, but it's always there when needed. I've noticed that it doesn't slow down my computer like other antivirus programs I tried before, and its detection system is very accurate. It gives me peace of mind knowing that I'm protected without having to be on alert all the time. Additionally, its interface is clear, without unnecessary complications, which I really appreciate. Review collected by and hosted on G2.com.

What do you dislike about Kaspersky AntiVirus?

What I don't like about Kaspersky AntiVirus is that sometimes its notifications can be a bit persistent, especially when there are pending updates or certain files it detects as suspicious but I know are safe. I would also like the renewal process to be clearer, as the subscription system can be confusing if you're not very attentive. Other than that, it works quite well. Review collected by and hosted on G2.com.

What problems is Kaspersky AntiVirus solving and how is that benefiting you?

One of the main problems I used to have was the constant worry about downloading files or opening emails with viruses. Since I started using Kaspersky AntiVirus, that has stopped being a stress. The program detects threats in real-time and alerts me before something serious happens, even on suspicious websites. It has also helped me keep my computer clean and fast because it blocks suspicious programs that I didn't even know were running before. In summary, it gives me peace of mind and that is worth a lot. Review collected by and hosted on G2.com.

Show More
Show Less
Heimdal

Heimdal

(41)4.3 out of 5

Heimdal

(41)4.3 out of 5

Heimdal® is a leading cybersecurity provider offering a comprehensive suite of solutions designed to protect organizations from a wide range of digital threats. Established in

Top Anti-Malware Software Result from Managed Detection and Response (MDR)

Also listed in Email Anti-spam, Patch Management, Privileged Access Management (PAM), Endpoint Management, Antivirus


AR
“Reliable Security with Stellar Support, Navigational Hurdles”
What do you like best about Heimdal?

I like that Heimdal® 'does what it says on the box,' which means it reliably provides the security solutions we expect. I also appreciate that their technicians are available 24x7 for support or help and they really know what they are talking about. Review collected by and hosted on G2.com.

What do you dislike about Heimdal?

I struggle navigating around their admin portal as it is complex and can be illogical in its navigation. Deciding whether to go to Account settings/config or Endpoint settings is a problem; we often end up trying both to find the options we need. It's almost impossible to find the 'installer download' and 'activation key'; putting them in the 'guide' is not logical. And why do you need to log in to get the installer download? It should be available on a public page. Forcing a login makes it hard to direct clients to an installer, so we've made it available via our website support pages. Also, as far as I know, there are no links or admin connections between Heimdal and the RMM Management system Ninja RMM. It would be useful if there was a connection. Review collected by and hosted on G2.com.

What problems is Heimdal solving and how is that benefiting you?

Heimdal® protects us from malware, virus attacks, DNS interceptions, and encryption hijacks. Review collected by and hosted on G2.com.

Show More
Show Less

Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Mode

Top Anti-Malware Software Result from Endpoint Management

Also listed in Antivirus


PV
“Powerful Application Control enabling Enhanced Security”
What do you like best about Carbon Black App Control?

It has given us confidence in securing critical systems by preventing unauthorized apps from running reducing out attack surface. The best part is it is easy to use and implement with good integration capabilities. Carbon Black Support is awesome and the long-term benefits of using the product every day helped us enhance security and compliance. Review collected by and hosted on G2.com.

What do you dislike about Carbon Black App Control?

While rare, we have encountered a few false positives like any other tool. But we took care of this with manual whitelisting. Carbon Black provides excellend value for organizations with strict security needs and hence, smaller organizations may find the pricing on the higher side. Review collected by and hosted on G2.com.

What problems is Carbon Black App Control solving and how is that benefiting you?

It has reduced Unauthorized Apps from running on our Endpoints significantly thus reducing the risk of malware infections. It also helps us meet compliance requirements where we allow only authorized applications to run. Another benefit is we can have strict lockdown on critical servers where security is crucial. Review collected by and hosted on G2.com.

Show More
Show Less
BlackFog

BlackFog

(30)4.9 out of 5

BlackFog

(30)4.9 out of 5

BlackFog provides GDPR privacy and fileless cyberattack defense for real time protection against online threats. It focuses on non-signature based threat detection using outbo

Top Anti-Malware Software Result from Insider Threat Management (ITM)

Also listed in Managed Detection and Response (MDR), Data Loss Prevention (DLP), Endpoint Management, Endpoint Detection & Response (EDR), Threat Intelligence


CC
Original Information
“Reliable Data Security with Outstanding Support”
What do you like best about BlackFog?

I greatly appreciate BlackFog’s exceptional service and product quality. The software stands out as fantastic, providing a level of performance that is thoroughly satisfying. Its user-friendly interface and support staff are incredibly friendly and easy to work with, which greatly enhances the overall experience. The straightforward setup, with substantial assistance from the BlackFog team, made the initial deployment seamless. The software effectively addresses critical issues like data security for various clients, including those in the legal, medical, and insurance fields, which is crucial for my managed service packages. Additionally, the deployment process and the management console are highly efficient, particularly with the new tenant function. This feature significantly simplifies client management and deployment processes. Overall, I'm impressed with the value BlackFog offers, making it a choice I'm likely to repurchase and recommend enthusiastically. Review collected by and hosted on G2.com.

What do you dislike about BlackFog?

Nothing Review collected by and hosted on G2.com.

What problems is BlackFog solving and how is that benefiting you?

I use BlackFog for data security in the legal, medical, and insurance fields, ensuring client information is safe. The deployment and management console, especially the new tenant function, streamline managing clients, making my work more efficient. Review collected by and hosted on G2.com.

Show More
Show Less

Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, ra

Top Anti-Malware Software Result from Endpoint Detection & Response (EDR)

Also listed in Identity Threat Detection and Response (ITDR), Extended Detection and Response (XDR) Platforms, Deception Technology, Endpoint Protection Platforms, Vulnerability Scanner


Harshul S.
HS
“Strong - Reliable Endpoint Protection with Automation”
What do you like best about SentinelOne Singularity Endpoint?

The best thing is how quickly it detects and blocks the threats without any manual work , agent is very light and doesn't slow down the system and it has very reliable real time threat monitoring. Another great part is Storyline, which shows the chain of events in a simple way Review collected by and hosted on G2.com.

What do you dislike about SentinelOne Singularity Endpoint?

Just a little complicated if you are new to the platform and some advanced options are hidden for the extra licensing which will increase the cost , and no readymade templates , customization is not easy Review collected by and hosted on G2.com.

What problems is SentinelOne Singularity Endpoint solving and how is that benefiting you?

helps us detect threats early and responds automatically which saves a lot of time and energy and also isolates the infected device and kill any harmful processes and rolls back the changes as well, which will reduce the impact of any attack Review collected by and hosted on G2.com.

Show More
Show Less

Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solut

Top Anti-Malware Software Result from Antivirus


Zin Min L.
ZL
“Malwarebytes is a good endpoint detection software.”
What do you like best about Malwarebytes for Teams?

Malwarebytes's scanning method is good enough for an endpoint and easy to use for even non-technical users. It can inspect deeply to the system with its deep scan option. Quick scan option is also a good way for daily scan. It is so easy to install. Set up guide is so helpful. Review collected by and hosted on G2.com.

What do you dislike about Malwarebytes for Teams?

Its deep scan option takes so long to finish the scanning process. It may even take more than 24 hours. It is not inconvenient for daily usage. Review collected by and hosted on G2.com.

What problems is Malwarebytes for Teams solving and how is that benefiting you?

Malwarebytes protect endpoints from malicious malwares, virus and blocks malicious websites. It can rescue the infected system and remove the malicious malware. Review collected by and hosted on G2.com.

Show More
Show Less

AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visib

Top Anti-Malware Software Result from Endpoint Detection & Response (EDR)

Also listed in Extended Detection and Response (XDR) Platforms, Deception Technology, User and Entity Behavior Analytics (UEBA), Managed Detection and Response (MDR), Endpoint Protection Platforms


Adam N.
AN
“An Intuitive All-in-One Security Platform with Room to Grow in Customization”
What do you like best about Cynet - All-in-One Cybersecurity Platform?

What I like best about Cynet is how intuitive and well-organized the dashboard is. The UI feels modern, clean, and easy to navigate, even for users who are not security experts. I also appreciate how much can be automated, from alert triage to remediation, which saves a lot of manual work and speeds up response times. The built-in visibility across endpoints, users, and network activity makes it easy to get a full picture of what’s happening in the environment without having to jump between different tools. Overall, it’s a solid all-in-one platform that simplifies complex security operations. Review collected by and hosted on G2.com.

What do you dislike about Cynet - All-in-One Cybersecurity Platform?

While Cynet is generally very solid, there are a few areas that could be improved. The alert volume can sometimes feel overwhelming, and fine-tuning detection rules or exclusions isn’t always as straightforward as it could be. The reporting section could also use more customization options and better visualization tools. In addition, some updates or scans can slightly impact endpoint performance for a short time. Overall, these are minor issues, but addressing them would make the platform even more efficient and user-friendly. Review collected by and hosted on G2.com.

What problems is Cynet - All-in-One Cybersecurity Platform solving and how is that benefiting you?

Cynet has enabled us to centralize our endpoint protection and response within a single platform. By automating detection and remediation, it has greatly reduced the time we spend investigating alerts and responding to threats. Previously, we depended on several different tools for visibility, threat analysis, and response, but now everything is integrated, making management much simpler. Additionally, Cynet assists in identifying lateral movement and suspicious behavior at an early stage, which strengthens our overall security posture and helps minimize potential downtime for our end-users. Review collected by and hosted on G2.com.

Show More
Show Less

Bastion is a new breed of cybersecurity platform for small and mid-sized businesses (SMBs) and the Managed Service Providers (MSPs) that support them. A single platform that s

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Cloud Email Security, Security Awareness Training


Nicolas D.
ND
“Easy, intuitive and really all-in-one cybersecurity solution”
What do you like best about Bastion Technologies?

In less than one hour, I’ve been able to protect my employees, e-mails, endpoints, Google Workspace and websites all within the same interface. It’s super intuitive and provided actionable feedback on how to improve my company’s security posture. The most impactful features are the phishing / awareness suites and the external surface scan.

On a weekly basis, it now provides in-depth visibility on my exposure. The reporting modules are also super useful to demonstrate our company’s commitment to cyber security to customers & partners. Review collected by and hosted on G2.com.

What do you dislike about Bastion Technologies?

I don’t see anything to complain really at this stage Review collected by and hosted on G2.com.

What problems is Bastion Technologies solving and how is that benefiting you?

Bastion Technologies is taking off me the burden of thinking about cyber and cover all items I need to protect my start up. I do not have time or knowledge to compare all solutions and know what is required for me. Bastion is tailored for SMBs and this is saving me hours and headhakes. I set it up quickly, support is super responsive when I had a question, and then I could fix all my issues on my own. Even my employees liked the trainings and phishing simulations and are challenging themselves with it. In a word Bastion is taking all the brain power and risks of cyber of me. Review collected by and hosted on G2.com.

Show More
Show Less
Agency

Agency

(41)4.8 out of 5

Agency

(41)4.8 out of 5

Agency is a forward-deployed AI cybersecurity and compliance firm dedicated to delivering customized security solutions that protect organizations' most critical threat surfac

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Digital Risk Protection (DRP) Platforms, Employee Identity Theft Protection


Herman P.
HP
Original Information
“Fantastic cybersecurity, and a great team”
What do you like best about Agency?

Vicky, Tyler, and the whole Agency team are fantastic and have made the process for maintaining our security posture simple and straightforward. To give you an idea about how good they are, I really haven't thought about our cybersecurity or device management at all in the almost year that we've been using Agency. Implementing it took maybe 30 minutes total, with our whole team getting on a Zoom and it was done. Review collected by and hosted on G2.com.

What do you dislike about Agency?

I think Agency is most useful for companies with high risk devices. The UI / UX on their platform could use some work. Review collected by and hosted on G2.com.

What problems is Agency solving and how is that benefiting you?

Agency helped us get set up with multi-device management on high risk employee devices, along with installing VPNs and other monitoring services. This helps us with security compliance and simply maintaining our security posture. Their threat detection is great, and so is their penetration testing which revealed some vulnerabilities which we were quickly able to remediate. Review collected by and hosted on G2.com.

Show More
Show Less

Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. AMP can uncover even

Top Anti-Malware Software Result from Endpoint Protection Platforms

Also listed in Endpoint Detection & Response (EDR), Antivirus, Endpoint Management


Verified User in Education Management
UE
“Powerful Cisco EDR and Cloud Management, but Setup Can Be Complex and Costly”
What do you like best about Cisco Secure Endpoints?

Advanced threat detection through behavioral analysis, with strong EDR and incident investigation capabilities. It also integrates well with other Cisco security solutions, and the centralized, cloud-based management makes it easier to oversee everything from one place. Review collected by and hosted on G2.com.

What do you dislike about Cisco Secure Endpoints?

It can be complex to configure and manage, especially if you’re looking for a straightforward setup. It also comes at a higher cost compared to more basic antivirus solutions. On older devices, I’ve noticed it may impact system performance, which can be a drawback depending on your hardware. Review collected by and hosted on G2.com.

What problems is Cisco Secure Endpoints solving and how is that benefiting you?

It provides advanced threat detection and integrates well with other Cisco security products, which makes it a solid option for organizations already using the Cisco systems. Review collected by and hosted on G2.com.

Show More
Show Less