Over 246,941 professionals have used IT Central Station research.
Compare the best Endpoint Protection vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate
score. For Views, Comparisons, Reviews, and Followers the score is calculated as follows: The
product with the highest count in each area gets the highest available score of 17.5 points.
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 17.5% (weighting factor) *
80% = 14. For Average Rating, the maximum score is 30 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
When evaluating endpoint security products, the IT Central Station users were clear on what aspects were most important. Proactive protection is a clear indication of superior quality in a product, since the days of reactive protection are gone. Another essential feature to look for is the capability to block a variety of attack vectors, since testing with known malware simply isn't sufficient. Additionally, our members want to see good customer support, easy installation and removal, and competitive pricing for the endpoint security product.
Endpoint Protection Reviews
Read reviews of Endpoint Protection that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement.
Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
I am a ㊙️ Security guy and have titles like Security Officer, Security Manager, Säkerhetschef and Säkerhetsskyddschef.
These are only titles and not limitations. My knowledge of Management, IT, Processes and people are broad and i love to do many things and help people wherever I go.
Excessive in the IT industry, working as a Consultant at Advania Öst, located at Norrköping, sweden.
A happy, talkative and polite person.
Educating myself in both network security and endpoint security.
McAfee endpoint protection certificated.
Security Consultant (Team lead) in Accenture
Leveraged service delivery (Wipro)
Worked for Bank client .(HP)
Worked on Government Tax dept.(Tulip telecom)
• Firewall (Check point, Cisco, Palo Alto, Fortinet, Juniper)
• IPS/IDS (Cisco, Checkpoint, IBM, McAfee)
• Proxy (Bluecoat,... more>>
Exchange specialist with migration projects from Exchange 2003 and Exchange 2007 to Exchange 2010, Exchange 2013, Exchange 2016 and Office 365.
Exchange System Engineer and Administrator since Exchange 5.0 with migration projects from MS Mail to Exchange 5.0, Exchange 5.0 to 5.5 and Exchange 5.5... more>>
A purely self-motivated & diligent professional with significant experience in the networking and IT-Security industry. Seeks out new challenges constantly and applies a positive and infectious mind set to deliver results that exceed expectations. Proven ability to troubleshoot network... more>>