Over 259,791 professionals have used IT Central Station research.
Compare the best Endpoint Protection vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score.
The score is calculated as follows: The product with the highest count in each area gets the highest available score.
(20 points for Reviews; 16 points for Views, Comparisons, and Followers.)
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 20% (weighting factor) *
80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
When evaluating endpoint security products, the IT Central Station users were clear on what aspects were most important. Proactive protection is a clear indication of superior quality in a product, since the days of reactive protection are gone. Another essential feature to look for is the capability to block a variety of attack vectors, since testing with known malware simply isn't sufficient. Additionally, our members want to see good customer support, easy installation and removal, and competitive pricing for the endpoint security product.
Endpoint Protection Reviews
Read reviews of Endpoint Protection that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
* Patching support: IBM BigFix supports most of the major OSs with natively packages patches. This includes Windows, MacOSX, Oracle Linux, Solaris, AIX, RedHat, Ubuntu and others. * Pre-packaged support for many third-party applications such... more»
Our primary use for IBM BigFix is around patching and reporting on Microsoft Windows servers. We are also using the reporting capabilities for patching state on AIX, Solaris, and Red Hat Linux. These reports are being presented to the... more»
IBM has been heavily focused on adding and improving features to the tool, especially with new components like IBM BigFix Detect. While all these new features are great and provide useful information, IBM has not focused on the Web Reports... more»
There are a number of features that all work synergistically to be able to provide the protection. Originally, anti-virus was based on definition. About 10 years ago, the bad guys figured out how to get past that. So what they've been doing for the past 10 years is adding in additional features to help mitigate any of these other attack vectors that the hackers... more»
They're just starting to get into this now, but I think they can do better - they're just starting out with I think is called the SEP Cloud Console. It has more limited functionality. It will be good once we can run SEP from the cloud. That would be good.
I think the most valuable feature is its flexibility and the fact that there's one agent that allows you to do a lot of different things. We use it for compliance, primarily patching. Also, it becomes our master source collector for most of... more»
It gives us one tool that allows us to patch our systems, so we don't have multiple tools to patch our systems. We have one tool that allows us to patch multiple platforms, as well as inventory and provide insights on all of those different... more»
I would like to see more multithreading, which I understand comes, clustering and we may end up doing some container-related work with Bluemix and lead some of that effort to allow us to scale on demand. Because there are times when you have... more»
My organization came from a product that was not nearly as reliable. It was causing failures across our infrastructure and across our enterprise. Switching to BixFix has alleviated that to a great degree. The other part is it's now allowing... more»
IBM dropped what's called BigFix Detect on us here at Interconnect this year. That blew our socks off because we had just completed signing a contract with a software that does almost the exact same thing called Carbon Black. So we came here... more»
We saw Lockey very early on and caught it via behavioral signatures on the traditional AV. We already had parts of the payload downloaded because the traditional AV behavioral signatures were not blocking everything. We had removed the... more»
The engineering team continues to add useful features, like the ability to search for files and hashes across the environment. At the moment, I am very happy with the product. Not a deal killer, but making the portal mobile friendly would be... more»
SONAR/Auto-Protect feature and Generic Exploit Mitigation: Can detect and prevent attacks that are exploring common software vulnerabilities. It monitors suspicious files that have behavior actions on memory, network, etc. The console and... more»
In a large environment, it is a challenge to manage what areas can have specific rights or functions enabled or disabled, considering their needs. SEP had the opportunity to integrated Microsoft Active Directory structure into the SEP Admin... more»
Reports: It would be nice to have customized reports integrated on the main console with no additional DB server or BI server. Vulnerabilities: A vulnerability scan integrated with SEP would be important for the admin to understand the risk... more»
The most valuable feature of BigFix is the ability to manage all the clients that we have in our environment. So, every PC that we have has to come in and BigFix aids in all that so that we can record it, add software to it and also inventory... more»
Dynamic messaging needs improvement because one of the things that we deal with a lot is the messaging when pushing releases out. I know that there is a message we can display, but it's post-installation. On the post-installation, we have to... more»
* Being able to see inside every asset that we have * Finding those assets * Being able to deep dive and pull reports of any kind that we want * Customizable If we're looking for some data that is not there natively, we can make it appear in... more»
We get audited quite a bit because of PCI compliance. There are a lot of requirements that we have to meet on our endpoints to reach that certification for the compliance. BigFix allows us to see the data and remediate those vulnerabilities... more»
Providing information about areas with room for improvement is tough. I recently attended a roadmap session, and they're pretty much addressing a lot of the stuff we have. I would like to see more automation, and that's the name of the game.... more»
Rather than having to log onto a central server to manage the endpoint protection, I can log onto the dashboard to manage everything. No on-premise server required, chewing up resources needed for other tasks and projects. Endpoints are... more»
Work on the math model. We are catching a lot of false positives, which gets to be a pain at the start of a deployment. It is not hard to decipher and add a global safe list, so you do not have to touch or adjust Clients on all endpoints.... more»
My experience with McAfee is very good. They give excellent support, they are proactive to solve issues, and willing to integrate their products. Their ability to execute is very high. Their malware detection rate is excellent for all type of... more»
Our datacenter cloud services such as email, and web services for internal and external use, had to be protected with different systems and the web services where left really unprotected, since we used an standard IPS/IDS to protect ourselves... more»
Being able to hit all of our endpoints is the most beneficial feature of this solution. It mainly gives us a lot of consistency. For example, with the previous product that we were using for endpoint management, we were getting like 70-80%... more»
It just streamlined the whole process, because it allows us to manage everything from one endpoint solution. It's reliable. So, we never had to spend time with the senior technicians for circling back to remediate all the ones that it missed.
Probably, there is need to just expand the WebUI and make it a full management console and really deprecate the Windows-based command console. They should definitely update the web reports to make it up to the executive level, something I'd... more»
It's easy to manage. It gives me great power over the devices that I manage with very little effort, compared to other products. With other products, it takes a lot more effort just to do the same kind of work.
It has one central location to manage all the different platforms that we have such as desktop, Windows Servers, Linux Server, Solaris, AIX and zLinux. It's great to be able to manage them all from one central location.
The feature that I would like them to implement is for the command line and I know this is probably against the design. We come from the command line and sometimes, you want to talk to the agent in real time. Seems like now with the new... more»
From an IT management point-of-view, the most valuable features are the force of the ePO console and its simplicity. For security, the most valuable feature is that it offers clear security dashboards and reporting.
Our endpoints are secure and updated daily. Viruses and malware are detected and quarantined automatically. Users are informed when a detection has been made with alerts. We have confidence in the product to keep our business users secure. We... more»
The client-side interface is out of date, and has not been updated over the last few years. Additionally, the interfaces of different modules do not integrate common settings. This should be reworked in the next-gen version of the product... more»
Website and EComm at a retailer with 1,001-5,000 employees
Apr 12 2017
What do you think of Symantec Endpoint Protection?
It is unacceptable for an organisation to be without some form of Anti-virus protection. Symantec Endpoint Protection was a product we picked because we were coming off of Sophos as the charity discount expired. Charities tend to shop around for AV yearly to take advantage of discounts to standard pricing.Whilst this means install costs (time and/or money) it means we get to experience a lot of products and vendors. Now, that is a good and bad thing.
We had some teething problems on install. It wasn't the product at fault per se but the IT Company who installed a 2011 version instead of the current 2013 version. This resulted in multiple BSOD for our W7 users. I used Symantec support and logged an online ticket. Literally, within 10mins I had a call from a Symantec support...
I like the overall usage of it. It's easy to use, gives you great visibility into your envionment, customization of your reports, and the community of users that you can pull experience and knowledge from. So that's one of the main advantages... more»
It has definitely improved our patch process, being able to create compliance reports and hand those to management, executives and so on, and making the overall procedure of managing assets, managing end points, patching endpoints, etc. It... more»
It's not perfect, but it's close. There are some things here or there, for instance if you get down to the small details, such as if you could deploy and action it a different way, or you selected multiple endpoints and then from there,... more»
SentinelOne’s Rollback is its best feature. No solution can ever provide a 100% protection, but their rollback feature closes this gap in endpoint security giving end users a ray of hope in the event of a worst case scenario endpoint breach,... more»
Before it was a challenge for us to know who had an existing endpoint issue or who had the most attacks within the corporate network. Since SentinelOne was introduced, it has provided overall endpoint status visibility for us. Giving us the... more»
They need to improve their UI and the way they show that the scanning is running on the endpoint. Sometimes users wanted to see whether their AV is working via visual context. They could add “right click>scan” where most users were trained... more»
It keeps our machines up-to-date with the definitions of the current zero day attacks, which happens in real-time scenarios. It protects our data and the clients' data, which can be secured by using this product.
I am happy to say that the Symantec comes into the picture where the issues are reported from the product, it might be a product bug or it might be a product defect. The product engineer works on this and the latest upgrade has it built into... more»
McAfee Endpoint Protection is a a good product that's easy to administer. It provides endpoint protection for desktops, laptops, and servers, and the protection includes anti-virus, anti-malware, anti-spam, DLP, and encryption.
We're less affected by viruses and threats on end-user device, able to manage all endpoints from a centralized server across locations. We're also able to encrypt sensitive laptops with ease. Very good reporting and compliance to endpoints.
It needs much better control on zero-day viruses and easier submission of threats to McAfee. They also need to improve the DLP rules since loads of false positives and patch releases are not quick enough when a new OS hits the market. Because... more»
In today's IT environment, IT Security threats are very dynamic in nature. Every minute, new threat emerges. Every feature of the MEP suite, be it small or big, is very important. They complement each other and if one fails, my IT Security... more»
While SAE & DLP have helped us to control the sites our user visits and the removable media they uses on their PC, at the same time, MSME has helped us to prevent the threat getting in our network via SPAM emails. The MEP suite has... more»
They need to improve the anti-virus engine which, although fast and efficient, sometimes uses too much hardware resources. The scanning engine should be designed in a way that it doesn’t slow down the PC while it's running scheduled scans.
In his article in CSO Online, Jon Oltsik writes that enterprises focus disproportionately on the network when developing a cybersecurity strategy. He continues that it is important to also make endpoint and server security a priority, as this network-only focus creates “a cybersecurity... more»
What do users think about their endpoint protection software?
What do endpoint protection users look for in the software they use? Which solutions offer the most value, and how?
Which endpoint protection solutions did professionals use prior to their current tool?
Most importantly, are they... more»
Real users choose their top endpoint protection software
What do Users Look for when Choosing their Endpoint Protection Tools?
According to Eric Cole of the SANS Institute, big data breaches and large-scale compromises often start with an initial compromise in an endpoint device, such as a... more»
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement.
Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
I am a ㊙️ Security guy and have titles like Security Officer, Security Manager, Säkerhetschef and Säkerhetsskyddschef.
These are only titles and not limitations. My knowledge of Management, IT, Processes and people are broad and i love to do many things and help people wherever I go.
My passion is helping my customers with their cool projects. I have been working in IT for a decade, developing myself from computer technician to IT professional. In that that time I have worked many security technologies. Far from being a security jack of all trades, I have pursued a path which... more>>
Security Consultant -Team lead at Accenture
Sr Engineer - Security management at Wipro
Service delivery consultant at HP
Sr Engineer network and security at Tulip telecom
Information security policies and procedures
Security compliance, Governance
Firewall (Check point, Cisco,... more>>
Excessive in the IT industry, working as a Consultant at Advania Öst, located at Norrköping, sweden.
A happy, talkative and polite person.
Educating myself in both network security and endpoint security.
McAfee endpoint protection certificated.
Exchange specialist with migration projects from Exchange 2003 and Exchange 2007 to Exchange 2010, Exchange 2013, Exchange 2016 and Office 365.
Exchange System Engineer and Administrator since Exchange 5.0 with migration projects from MS Mail to Exchange 5.0, Exchange 5.0 to 5.5 and Exchange 5.5... more>>
A purely self-motivated & diligent professional with significant experience in the networking and IT-Security industry. Seeks out new challenges constantly and applies a positive and infectious mind set to deliver results that exceed expectations. Proven ability to troubleshoot network... more>>