height="0" width="0" style="display:none;visibility:hidden">
Home
Categories
Categories
Industry Solutions
Emerging Technologies
Wireless and Mobile Technology
Supply Chain
Cybersecurity
Sales and Marketing
Engineering and Manufacturing
IT Services
IT Management
Application Development Software
Data Center and Facilities Management
Enterprise Communications and Networking
Featured categories
All categories
Industry Solutions categories
Industry Solutions categories
Local Government CRM
Core Banking Software
EHR
Critical Event Management (CEM)
Oscilloscopes
Digital Forensics Platforms
Digital Banking Engagement Platforms
Point of Sale (POS) Systems
Anti-Money Laundering (AML)
Operations Support Systems
Loan Management Software
Mass Notification Software
Student Information System (SIS)
K-12 Student Information Systems (SIS)
Open Banking Platforms
Meter Data Management
Medical Insurance Claims Software
Insurance Claims Processing
Revenue Management
Hospital Information System
Emerging Technologies categories
Emerging Technologies categories
Emerging Solutions
Wireless and Mobile Technology categories
Wireless and Mobile Technology categories
Mobile Development Platforms
Mobile Device Management (MDM)
Mobile App Platforms
Mobile Marketing and Advertising
Mobile Application Management
Mobile Measurement Partner (MMP)
Managed Mobility Services
Instant Communications Security and Compliance
Mobile Communication Gateways
Text Messaging
Mobile Platforms
Mobile Video Optimization
Supply Chain categories
Supply Chain categories
Demand Management
Supply Chain Analytics
Procurement Software
Contract Management Software
Warehouse Management
Supply Chain Management Software
Transportation Management
Advanced Distribution Management Systems (ADMS)
Inventory Management Software
Accounts Payable Automation Software
Mobile Supply Chain Applications
Cybersecurity categories
Cybersecurity categories
Endpoint Detection and Response (EDR)
Firewalls
Endpoint Protection Platform (EPP)
Extended Detection and Response (XDR)
Cloud Security Posture Management (CSPM)
Vulnerability Management
Container Security
Security Information and Event Management (SIEM)
Advanced Threat Protection (ATP)
Anti-Malware Tools
Cloud-Native Application Protection Platforms (CNAPP)
Cloud Workload Protection Platforms (CWPP)
Secure Access Service Edge (SASE)
Security Orchestration Automation and Response (SOAR)
Ransomware Protection
Software Composition Analysis (SCA)
Web Application Firewall (WAF)
Cloud Access Security Brokers (CASB)
Data Security Posture Management (DSPM)
ZTNA as a Service
Sales and Marketing categories
Sales and Marketing categories
Marketing Management
Opportunity Management
Sales Force Automation
Marketing Automation
eCommerce Platforms
Product Configuration and Quoting
App Monetization Platforms
Web Analytics
Payment Processing Software
Marketing Intelligence
Marketing Resource Management
Personalization Engines
EDI
Tag Management
Advertisement Technology Platforms
Digital Marketing Service Providers
Content Marketing Software
Social Login
Sales and Market Intelligence
Field Activity Management
Engineering and Manufacturing categories
Engineering and Manufacturing categories
Production Planning
Enterprise Resource Planning for Manufacturing
PLM Tools
Collaborative Product Data Management
Engineering Process
CAD
Graphic Design Software
CAM
Electronic Design Automation
CAE
Artwork Management Software
MRO Software
Spatial Information Management Software
Prototyping Tools
IT Services categories
IT Services categories
Disaster Recovery as a Service
Data and Analytics Service Providers
IT Infrastructure Consumption Services
Managed Service Providers
Data Recovery Service Providers
Service Desk Outsourcing
Public Cloud Infrastructure Managed Service Providers
Communications Outsourcing and Professional Services
Data Center Outsourcing (USA)
IT Asset Disposal Services
Google Workspace Consulting
Data Center Outsourcing (Europe)
Desktop Outsourcing
Data Center Outsourcing (Canada)
Managed Private Cloud Services
Managed SD-WAN Services
Hosted Virtual Desktop Services
IT Management categories
IT Management categories
Log Management
IT Infrastructure Monitoring
Server Virtualization Software
Remote Access
Configuration Management
Operating Systems (OS) for Business
Container Monitoring
Server Monitoring
IT Asset Management
IT Service Management (ITSM)
Workload Automation
Virtual Desktop Infrastructure (VDI)
Managed DNS
Container Management
Managed File Transfer (MFT)
User Provisioning Software
Container Registry
Configuration Management Databases
Virtualization Management Tools
Remote Monitoring and Management (RMM)
Application Development Software categories
Application Development Software categories
Application Security Tools
Application Performance Monitoring (APM) and Observability
Application Security Testing (AST)
Rapid Application Development Software
DevSecOps
API Testing Tools
Software Development Analytics
Functional Testing Tools
Test Automation Tools
Application Lifecycle Management (ALM) Suites
Release Automation
IT Operations Analytics
Enterprise Agile Planning Tools
Mobile APM
Regression Testing Tools
Patch Management
Build Automation
Mobile App Testing Tools
Enterprise Architecture Management
Performance Testing Tools
Data Center and Facilities Management categories
Data Center and Facilities Management categories
Data Center Networking
Enterprise Asset Management
Data Center Infrastructure Management
Data Center Power Solutions
Data Center Cooling Systems
Workplace Management Software
Facility Maintenance Management Software
Data Center Monitoring
Computerized Maintenance Management Software (CMMS)
Workplace Analytics Software
Wiring and Cabling Solutions
Enterprise Communications and Networking categories
Enterprise Communications and Networking categories
WAN Edge
Software Defined WAN (SD-WAN) Solutions
Network Monitoring Software
AIOps
Secure Web Gateways (SWG)
Ethernet Switches
Wireless LAN
Network Traffic Analysis (NTA)
Application Delivery Controllers (ADC)
Network Automation
CDN
Network Management Applications
LAN Switching
Routers
AV Over IP Switching
Network Troubleshooting
Software Defined Networking (SDN)
Wireless WAN
Network Virtualization
WAN Optimization
Comparisons
Comparisons
Most compared vendors
Amazon Web Services (AWS)
Cisco
Dell Technologies
Fortinet
Google
IBM
Microsoft
Oracle
SAP
VMware
Top comparisons
More comparisons
Top Amazon Web Services (AWS) solutions comparisons
Top Amazon Web Services (AWS) solutions comparisons
Amazon API Gateway vs. Microsoft Azure API Management
Amazon AWS vs. Linode
AWS Secrets Manager vs. Azure Key Vault
Amazon QuickSight vs. Microsoft Power BI
Amazon EFS (Elastic File System) vs. Microsoft Azure File Storage
Amazon Route 53 vs. Azure DNS
AWS Batch vs. AWS Lambda
AWS Security Hub vs. Microsoft Sentinel
Amazon EKS vs. OpenShift Container Platform
AWS Database Migration Service vs. AWS Glue
Top Cisco solutions comparisons
Top Cisco solutions comparisons
Cisco Secure Firewall vs. Fortinet FortiGate
Aruba Wireless vs. Cisco Wireless
Aruba ClearPass vs. Cisco ISE (Identity Services Engine)
Aruba Switches vs. Cisco Ethernet Switches
Cisco Umbrella vs. Zscaler Internet Access
Cisco Meraki Wireless LAN vs. Ubiquiti Wireless
Arista Networks Platform vs. Cisco Catalyst Switches
Cisco Enterprise Routers vs. MikroTik Routers and Switches
Cisco Linksys Ethernet Switches vs. NETGEAR Switches
Cisco AnyConnect Secure Mobility Client vs. OpenVPN Access Server
Top Dell Technologies solutions comparisons
Top Dell Technologies solutions comparisons
Dell PowerEdge Rack Servers vs. HPE ProLiant DL Servers
VMware vSAN vs. VxRail
Dell PowerStore vs. Dell Unity XT
Dell PowerProtect DD (Data Domain) vs. HPE StoreOnce
Dell Avamar vs. Dell PowerProtect Data Manager
Dell PowerEdge T vs. HPE Proliant ML
Dell PowerScale (Isilon) vs. NetApp FAS Series
Dell RecoverPoint for Virtual Machines vs. VMware SRM
Amazon AWS vs. Dell ECS
Cisco Catalyst Switches vs. Dell PowerConnect Switches
Top Fortinet solutions comparisons
Top Fortinet solutions comparisons
Fortinet FortiGate vs. Sophos XG
Fortinet FortiClient vs. OpenVPN Access Server
Cisco Ethernet Switches vs. Fortinet FortiSwitch - Secure Access
Cisco ISE (Identity Services Engine) vs. Fortinet FortiNAC
Azure Firewall vs. Fortinet FortiGate-VM
Fortinet FortiGate Cloud vs. Fortinet FortiManager
F5 Advanced WAF vs. Fortinet FortiWeb
Fortinet FortiToken vs. Microsoft Entra ID
Cisco Umbrella vs. Fortinet FortiGate SWG
CrowdStrike Falcon vs. Fortinet FortiEDR
Top Google solutions comparisons
Top Google solutions comparisons
Apigee vs. Microsoft Azure API Management
Google Firebase vs. Microsoft Azure
Google AdMob vs. Unity Ads
Google Cloud Identity vs. Microsoft Entra ID
Google Cloud DNS vs. Quad9
Azure OpenAI vs. Google Vertex AI
Google Workspace vs. Microsoft Exchange Online
Amazon RDS vs. Google Cloud SQL
AWS Snowball vs. Google Transfer Appliance
Google Cloud vs. Oracle Cloud Infrastructure (OCI)
Top IBM solutions comparisons
Top IBM solutions comparisons
IBM Spectrum Computing vs. Red Hat CloudForms
Apache Kafka vs. IBM MQ
IBM MaaS360 vs. Microsoft Intune
IBM Security QRadar vs. Microsoft Sentinel
IBM Public Cloud vs. Microsoft Azure
IBM Db2 Database vs. SQL Server
IBM API Connect vs. IBM DataPower Gateway
IBM Power Systems vs. Intel Server System
Open Liberty vs. Spring Boot
Dell PowerStore vs. IBM FlashSystem
Top Microsoft solutions comparisons
Top Microsoft solutions comparisons
Hyper-V vs. VMware vSphere
Amazon API Gateway vs. Microsoft Azure API Management
GitLab vs. Microsoft Azure DevOps
Jamf Pro vs. Microsoft Intune
AWS Secrets Manager vs. Azure Key Vault
Microsoft Power Automate vs. UiPath
Amazon QuickSight vs. Microsoft Power BI
Amazon EFS (Elastic File System) vs. Microsoft Azure File Storage
Intercept X Endpoint vs. Microsoft Defender for Endpoint
Microsoft Azure vs. Oracle Cloud Infrastructure (OCI)
Top Oracle solutions comparisons
Top Oracle solutions comparisons
Oracle VM VirtualBox vs. Proxmox VE
Oracle Linux vs. Ubuntu Linux
Microsoft Azure vs. Oracle Cloud Infrastructure (OCI)
Oracle Database vs. SAP HANA
Firebird SQL vs. MySQL
Microsoft Power Apps vs. Oracle Application Express (APEX)
Oracle VM vs. VMware vSphere
Oracle Data Integrator (ODI) vs. Oracle Integration Cloud Service
Oracle WebLogic Server vs. Tomcat
Oracle HCM Cloud vs. SAP SuccessFactors
Top SAP solutions comparisons
Top SAP solutions comparisons
SAP ERP vs. SAP S/4HANA
Oracle Database vs. SAP HANA
Amazon AWS vs. SAP Cloud Platform
Celonis vs. SAP Signavio Process Manager
SAP HCM vs. SAP SuccessFactors
SAP Analytics Cloud vs. SAP BusinessObjects Business Intelligence Platform
Oracle WMS vs. SAP Warehouse Management
Kinaxis vs. SAP Integrated Business Planning for Supply Chain
SAP PowerDesigner vs. erwin Data Modeler by Quest
Microsoft Azure Synapse Analytics vs. SAP BW4HANA
Top VMware solutions comparisons
Top VMware solutions comparisons
Hyper-V vs. VMware vSphere
Microsoft Intune vs. VMware Workspace ONE
Jakarta EE vs. Spring Boot
VMware vSAN vs. VxRail
Rancher Labs vs. VMware Tanzu Mission Control
KVM vs. VMware Workstation
Microsoft Azure vs. Pivotal Cloud Foundry
VMware SRM vs. Veeam Backup & Replication
Parallels Desktop vs. VMware Fusion
IBM MQ vs. VMware RabbitMQ
Top comparisons
Top comparisons
Netgate pfSense vs. OPNsense
Cloudflare DNS vs. Quad9
Fortinet FortiGate vs. Sophos XG
Figma vs. Miro
Hyper-V vs. VMware vSphere
Checkmarx One vs. SonarQube
Amazon API Gateway vs. Microsoft Azure API Management
GitLab vs. Microsoft Azure DevOps
Aruba Wireless vs. Cisco Wireless
Jamf Pro vs. Microsoft Intune
For Vendors
For Vendors
Learn More
Get Listed
Sign In
Home
Endpoint Detection and Response (EDR)
WithSecure Elements Endpoint Detection and Response
Pros & Cons
WithSecure Elements Endpoint Detection and Response pros and cons
Vendor:
WithSecure
4.0
out of 5
6 reviews
100% willing to recommend
Follow
Post review
Overview
Reviews
Pros & Cons
Pricing
Alternatives
WithSecure Elements Endpoint Detection and Response Pros review quotes
Preeti Bhave
Technical Lead- Security Specialist at ALE
May 17, 2023
WithSecure includes an encrypted drive that stores a key for accessing the encrypted data.
Read full review
LL
reviewer1692144
IT Manager at a tech services company with 51-200 employees
Nov 16, 2021
The only issue that we have today is with false positives. We have too many false positives with the solution.
Read full review
Eckart Jensen
CEO at HR ACT Pte Ltd
Apr 11, 2023
I use the solution to protect our infrastructure. The tool has special frames for banking. There is an additional secure filter for banking-related pages. It protects me from viruses, malware, and attacks.
Read full review
Buyer's Guide
Endpoint Detection and Response (EDR)
May 2024
Download Free Report
Find out what your peers are saying about WithSecure, Microsoft, CrowdStrike and others in Endpoint Detection and Response (EDR).
Updated: May 2024.
DOWNLOAD NOW
770,394 professionals have used our research since 2012.
VesaKivistö
Chief Information Security Officer at Saarni Cloud Oy
Jul 8, 2023
It is a scalable solution.
Read full review
Daniel Winninger
Head of IT & Telecommunications at VA-Erzberg GmbH
Apr 11, 2023
It offers good scalability.
Read full review
Nobuaki Kitamura
managing director of IT Department at Nara OA System Inc
Jan 5, 2024
The product is stable.
Read full review
WithSecure Elements Endpoint Detection and Response Cons review quotes
Preeti Bhave
Technical Lead- Security Specialist at ALE
May 17, 2023
The monthly reporting feature of WithSecure can be improved.
Read full review
LL
reviewer1692144
IT Manager at a tech services company with 51-200 employees
Nov 16, 2021
The initial setup is very straightforward.
Read full review
Eckart Jensen
CEO at HR ACT Pte Ltd
Apr 11, 2023
The tool’s mobile version needs to be improved.
Read full review
Buyer's Guide
Endpoint Detection and Response (EDR)
May 2024
Download Free Report
Find out what your peers are saying about WithSecure, Microsoft, CrowdStrike and others in Endpoint Detection and Response (EDR).
Updated: May 2024.
DOWNLOAD NOW
770,394 professionals have used our research since 2012.
VesaKivistö
Chief Information Security Officer at Saarni Cloud Oy
Jul 8, 2023
Its automated functionality could be better.
Read full review
Daniel Winninger
Head of IT & Telecommunications at VA-Erzberg GmbH
Apr 11, 2023
The website rules are too complicated.
Read full review
Nobuaki Kitamura
managing director of IT Department at Nara OA System Inc
Jan 5, 2024
WithSecure Elements Endpoint Detection and Response is scalable. My company has 800-1000 customers.
Read full review
Product Categories
Product Categories
Endpoint Detection and Response (EDR)
Popular Comparisons
Popular Comparisons
Microsoft Defender for Endpoint
vs WithSecure Elements Endpoint Detection and Response
CrowdStrike Falcon
vs WithSecure Elements Endpoint Detection and Response
Fortinet FortiEDR
vs WithSecure Elements Endpoint Detection and Response
SentinelOne Singularity Complete
vs WithSecure Elements Endpoint Detection and Response
Cortex XDR by Palo Alto Networks
vs WithSecure Elements Endpoint Detection and Response
Intercept X Endpoint
vs WithSecure Elements Endpoint Detection and Response
Elastic Security
vs WithSecure Elements Endpoint Detection and Response
VMware Carbon Black Endpoint
vs WithSecure Elements Endpoint Detection and Response
Trend Vision One
vs WithSecure Elements Endpoint Detection and Response
Cynet
vs WithSecure Elements Endpoint Detection and Response
Bitdefender GravityZone EDR
vs WithSecure Elements Endpoint Detection and Response
See all alternatives
Product Categories
Product Categories
Endpoint Detection and Response (EDR)
Popular Comparisons
Popular Comparisons
Microsoft Defender for Endpoint
vs WithSecure Elements Endpoint Detection and Response
CrowdStrike Falcon
vs WithSecure Elements Endpoint Detection and Response
Fortinet FortiEDR
vs WithSecure Elements Endpoint Detection and Response
SentinelOne Singularity Complete
vs WithSecure Elements Endpoint Detection and Response
Cortex XDR by Palo Alto Networks
vs WithSecure Elements Endpoint Detection and Response
Intercept X Endpoint
vs WithSecure Elements Endpoint Detection and Response
Elastic Security
vs WithSecure Elements Endpoint Detection and Response
VMware Carbon Black Endpoint
vs WithSecure Elements Endpoint Detection and Response
Trend Vision One
vs WithSecure Elements Endpoint Detection and Response
Cynet
vs WithSecure Elements Endpoint Detection and Response
Bitdefender GravityZone EDR
vs WithSecure Elements Endpoint Detection and Response
See all alternatives
Related questions
4,235
What is the biggest difference between EPP and EDR products?
2,731
What is the difference between EDR and traditional antivirus?
252
What is your recommendation for a 5-star EDR with low resource consumption for a financial services company?
49
Which is the best EDR for a logistics company with 500-1000 employees?
256
What is the best EDR or XDR product for a company with 9000 employees?
457
What to choose: an endpoint antivirus, an EDR solution or both?
1,266
Do we need to use both EDR and Antivirus (AV) solutions for better protection of IT assets?
980
How does EternalBlue work?
247
What is Mimikatz?
745
What are the main differences between XDR and SIEM?
Overview
Reviews
Pros & Cons
Pricing
Alternatives
© 2024 PeerSpot, All Rights Reserved.
Twitter
Facebook
LinkedIn
YouTube