Over 209,588 professionals have used IT Central Station research on enterprise tech.
Compare the best Endpoint Protection vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product (and the bar length) is based on a weighted aggregate ranking.
For Views, Comparisons, Reviews, and Followers the score is calculated as follows:
The product with the highest count in each area gets the highest available score of 17.5 points.
Every other product gets assigned points based on its total in proportion to the #1 product in the category.
For example, if a product has 80% of the number of reviews compared to
the product with the most reviews then the product's score and bar length for reviews would be 17.5% (weighting factor) * 80% = 14.
In the final section, Average Rating, there are 30 points available to each product
independent of the other products.
Reviews and ratings that are more than 24 months old, as well as those by resellers, are excluded from the rankings.
When evaluating endpoint security products, the IT Central Station users were clear on what aspects were most important. Proactive protection is a clear indication of superior quality in a product, since the days of reactive protection are gone. Another essential feature to look for is the capability to block a variety of attack vectors, since testing with known malware simply isn't sufficient. Additionally, our members want to see good customer support, easy installation and removal, and competitive pricing for the endpoint security product.
Endpoint Protection Reviews
Read reviews of Endpoint Protection that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement.
Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
I am an Security guy and have the title: Security Manager.
This is only a title and not a limitation. My knowledge of Management, IT, Processes and people are broad and i love to do many things and help people wherever I go.
The last nineteen years has been a road from Novell Netware to... more>>
A purely self-motivated & diligent professional with significant experience in the networking and IT-Security industry. Seeks out new challenges constantly and applies a positive and infectious mind set to deliver results that exceed expectations. Proven ability to troubleshoot network... more>>