We performed a comparison between Microsoft Defender for Business and Panda Adaptive Defense 360 based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Protection Platform (EPP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The stability is very good."
"Ability to get forensics details and also memory exfiltration."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"The solution was relatively easy to deploy."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"The product's initial setup phase is very easy."
"It is stable and scalable."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"The interface is quite user-friendly."
"Microsoft Defender for Business is good for small and medium-sized businesses. It offers solid security flexibility and integration with tools like Microsoft Lighthouse and some other software. It takes some of the features of Defender for Endpoint EDR and provides those services for small and medium-sized business environments."
"It is scalable."
"If you're an Intune user, you can bring in certain capabilities like system-hardening policies, which further enhances the security."
"A few things are valuable. One is the alerting we see when any kind of intrusion is happening, any kind of malware is being deployed across the endpoints, or any kind of suspicious activity is going on. We have a footprint across all of North America, Canada, and Mexico, so we want to make sure that all our endpoints are protected and we are able to look for any anomalous activity."
"The product so far has been good at protecting us. We haven't faced a breach."
"The most valuable feature of the solution is its device control."
"The interface is great."
"The most valuable features of Panda Security Adaptive Defense are the useful hardware information it provides, light on resources, controllable from the console, remote scan functionality, and the blocking of a lot of URL malware."
"Great technical support staff."
"It is easy to manage."
"I've found it's got excellent web protection."
"We have control over our devices, specifically USB ports, allowing us to block or control the traffic."
"We find the solution to be a bit expensive."
"The SIEM could be improved."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"It takes about two business days for initial support, which is too slow in urgent situations."
"Making the portal mobile friendly would be helpful when I am out of office."
"ZTNA can improve latency."
"Detections could be improved."
"The biggest one is that Defender needs to be more proactive to the emerging threats. There can be tighter integration with email, especially how it integrates with our email system, which is the Microsoft Outlook suite. There should be the ability to react a lot quicker to emerging threats because sometimes, it takes a few days before some of these new threats are fully identified, and we need that to be a few hours."
"Defender's reporting is rather scattered, and its URL filtering mechanism doesn't really work."
"Defender's threat protection should be fine-tuned to reduce false positives. It could be more targeted, reflecting a continuous evolution in detecting. Also, it could be easier to integrate into other environments."
"We faced some issues while running some applications on Mac."
"The security could always be improved."
"Occasionally, we suffer from little bugs that give us the wrong message."
"The gap between the two final conclusions is a problem, whether or not a file is known to be malware or is known to be safe."
"Panda Security Adaptive Defense is stable. However, when updates are being done on the computers we can experience some troubles because the computers need to be restarted. When we start the computers they are not functioning correctly and we have not received proper feedback regarding this random issue."
"I'd like to integrate it into my main services."
"Their MacOS support isn't that good."
"Panda Security Adaptive Defense’s stability could be improved."
"The solution should have additional endpoint protection."
"We do get the odd false positive when we're trying to install the software."
More Microsoft Defender for Business Pricing and Cost Advice →
Microsoft Defender for Business is ranked 45th in Endpoint Protection Platform (EPP) with 5 reviews while Panda Adaptive Defense 360 is ranked 22nd in Endpoint Protection Platform (EPP) with 26 reviews. Microsoft Defender for Business is rated 8.0, while Panda Adaptive Defense 360 is rated 8.2. The top reviewer of Microsoft Defender for Business writes "Quicker response time, improved security posture, and reduced alerts". On the other hand, the top reviewer of Panda Adaptive Defense 360 writes "Managing multiple machines is a pain, but support is top notch". Microsoft Defender for Business is most compared with HP Wolf Security, Microsoft Defender for Office 365, Microsoft Intune, Microsoft Defender for Endpoint and Xprotect , whereas Panda Adaptive Defense 360 is most compared with Microsoft Defender for Endpoint, ESET Endpoint Protection Platform, CrowdStrike Falcon, SentinelOne Singularity Complete and Malwarebytes. See our Microsoft Defender for Business vs. Panda Adaptive Defense 360 report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.