Endpoint protection report from it central station 2017 12 24 thumbnail
Find out what your peers are saying about Symantec, Intel Security, IBM and others in Endpoint Protection.
246,941 professionals have used our research since 2012.
Endpoint protection report from it central station 2017 12 24 thumbnail
Find out what your peers are saying about Symantec, Intel Security, IBM and others in Endpoint Protection.
246,941 professionals have used our research since 2012.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. For Views, Comparisons, Reviews, and Followers the score is calculated as follows: The product with the highest count in each area gets the highest available score of 17.5 points. Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 17.5% (weighting factor) * 80% = 14. For Average Rating, the maximum score is 30 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.

What is Endpoint Protection?

When evaluating endpoint security products, the IT Central Station users were clear on what aspects were most important. Proactive protection is a clear indication of superior quality in a product, since the days of reactive protection are gone. Another essential feature to look for is the capability to block a variety of attack vectors, since testing with known malware simply isn't sufficient. Additionally, our members want to see good customer support, easy installation and removal, and competitive pricing for the endpoint security product.

Endpoint Protection Reviews

Read reviews of Endpoint Protection that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Endpoint protection report from it central station 2017 12 24 thumbnail
Find out what your peers are saying about Symantec, Intel Security, IBM and others in Endpoint Protection.
246,941 professionals have used our research since 2012.
Endpoint protection report from it central station 2017 12 24 thumbnail
Find out what your peers are saying about Symantec, Intel Security, IBM and others in Endpoint Protection.
246,941 professionals have used our research since 2012.

Endpoint Protection Articles

Birzu alexandru adrian li?1414334311
5,953

3
TOP 5POPULAR
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
9e223545 7a7f 404d b59a d11569013a8a avatar?1438002727
3,529
TOP REVIEWERTOP 5
Säkerhetschef / Säkerhetsskyddschef / Security Manager
I am a ㊙️ Security guy and have titles like Security Officer, Security Manager, Säkerhetschef and Säkerhetsskyddschef. These are only titles and not limitations. My knowledge of Management, IT, Processes and people are broad and i love to do many things and help people wherever I go. The... more>>
7f6a6b89 091f 4fdc 96a3 fc47165dea3a avatar
116
Excessive in the IT industry, working as a Consultant at Advania Öst, located at Norrköping, sweden. A happy, talkative and polite person. Educating myself in both network security and endpoint security. McAfee endpoint protection certificated.
Reviewed McAfee Complete Endpoint Protection: One valuable feature is Threat Prevention with the...
Arshad khan li?1424931700
49
Security Consultant
Security Consultant (Team lead) in Accenture Leveraged service delivery (Wipro) Worked for Bank client .(HP) Worked on Government Tax dept.(Tulip telecom) • Firewall (Check point, Cisco, Palo Alto, Fortinet, Juniper) • IPS/IDS (Cisco, Checkpoint, IBM, McAfee) • Proxy (Bluecoat,... more>>
0932b531 19b8 4c84 b438 ed562988c58f avatar
2
Systems Consultant
Exchange specialist with migration projects from Exchange 2003 and Exchange 2007 to Exchange 2010, Exchange 2013, Exchange 2016 and Office 365. Exchange System Engineer and Administrator since Exchange 5.0 with migration projects from MS Mail to Exchange 5.0, Exchange 5.0 to 5.5 and Exchange 5.5... more>>
Krishnaraj raveendran nair li?1414338209
1,960
TOP 20POPULAR
IT Security Consultant
A purely self-motivated & diligent professional with significant experience in the networking and IT-Security industry. Seeks out new challenges constantly and applies a positive and infectious mind set to deliver results that exceed expectations. Proven ability to troubleshoot network... more>>
Reviewed McAfee Complete Endpoint Protection: Good reporting and compliance. Easy to administer.

Sign Up with Email