To help you find the best endpoint protection tools for your business, IT Central Station ranked them based on hundreds of real user reviews. These reviews cover all of the best solutions from top endpoint protection vendors, from our esteemed community of enterprise technology professionals. You'll find comparisons of pricing, performance, features, stability and many other criteria. Read below to find out what your peers have to say about endpoint protection vendors such as Symantec, IBM, McAfee, ESET and others.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score.
The score is calculated as follows: The product with the highest count in each area gets the highest available score.
(20 points for Reviews; 16 points for Views, Comparisons, and Followers.)
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 20% (weighting factor) *
80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
When evaluating endpoint security products, the IT Central Station users were clear on what aspects were most important. Proactive protection is a clear indication of superior quality in a product, since the days of reactive protection are gone. Another essential feature to look for is the capability to block a variety of attack vectors, since testing with known malware simply isn't sufficient. Additionally, our members want to see good customer support, easy installation and removal, and competitive pricing for the endpoint security product.
Best Endpoint Protection for Business
Read reviews of Endpoint Protection that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
* Patching support: IBM BigFix supports most of the major OSs with natively packages patches. This includes Windows, MacOSX, Oracle Linux, Solaris, AIX, RedHat, Ubuntu and others. * Pre-packaged support for many third-party applications such... more»
Our primary use for IBM BigFix is around patching and reporting on Microsoft Windows servers. We are also using the reporting capabilities for patching state on AIX, Solaris, and Red Hat Linux. These reports are being presented to the... more»
IBM has been heavily focused on adding and improving features to the tool, especially with new components like IBM BigFix Detect. While all these new features are great and provide useful information, IBM has not focused on the Web Reports... more»
There are a number of features that all work synergistically to be able to provide the protection. Originally, anti-virus was based on definition. About 10 years ago, the bad guys figured out how to get past that. So what they've been doing for the past 10 years is adding in additional features to help mitigate any of these other attack vectors that the hackers... more»
They're just starting to get into this now, but I think they can do better - they're just starting out with I think is called the SEP Cloud Console. It has more limited functionality. It will be good once we can run SEP from the cloud. That would be good.
I think the most valuable feature is its flexibility and the fact that there's one agent that allows you to do a lot of different things. We use it for compliance, primarily patching. Also, it becomes our master source collector for most of... more»
It gives us one tool that allows us to patch our systems, so we don't have multiple tools to patch our systems. We have one tool that allows us to patch multiple platforms, as well as inventory and provide insights on all of those different... more»
I would like to see more multithreading, which I understand comes, clustering and we may end up doing some container-related work with Bluemix and lead some of that effort to allow us to scale on demand. Because there are times when you have... more»
First of all, it does the job. It prevents harm to the operating system. Also, the visibility it gives to the user and to the administrator is very good, it provides visibility in a very convenient, easy way.
The benefit is that it gives a solution to a critical issue that we were facing, to Zero-day attacks and the ransomware threat. The company feels more secure and is working more securely without fear of opening every email or having to be... more»
The main feature that is missing is to have the same solution on servers. Currently it's only protecting the client side, not the server. If they would add the server in the same solution, that would be great. You also need to protect the... more»
My organization came from a product that was not nearly as reliable. It was causing failures across our infrastructure and across our enterprise. Switching to BixFix has alleviated that to a great degree. The other part is it's now allowing... more»
IBM dropped what's called BigFix Detect on us here at Interconnect this year. That blew our socks off because we had just completed signing a contract with a software that does almost the exact same thing called Carbon Black. So we came here... more»
We saw Lockey very early on and caught it via behavioral signatures on the traditional AV. We already had parts of the payload downloaded because the traditional AV behavioral signatures were not blocking everything. We had removed the... more»
The engineering team continues to add useful features, like the ability to search for files and hashes across the environment. At the moment, I am very happy with the product. Not a deal killer, but making the portal mobile friendly would be... more»
SONAR/Auto-Protect feature and Generic Exploit Mitigation: Can detect and prevent attacks that are exploring common software vulnerabilities. It monitors suspicious files that have behavior actions on memory, network, etc. The console and... more»
In a large environment, it is a challenge to manage what areas can have specific rights or functions enabled or disabled, considering their needs. SEP had the opportunity to integrated Microsoft Active Directory structure into the SEP Admin... more»
Reports: It would be nice to have customized reports integrated on the main console with no additional DB server or BI server. Vulnerabilities: A vulnerability scan integrated with SEP would be important for the admin to understand the risk... more»
The most valuable feature of BigFix is the ability to manage all the clients that we have in our environment. So, every PC that we have has to come in and BigFix aids in all that so that we can record it, add software to it and also inventory... more»
Dynamic messaging needs improvement because one of the things that we deal with a lot is the messaging when pushing releases out. I know that there is a message we can display, but it's post-installation. On the post-installation, we have to... more»
* Being able to see inside every asset that we have * Finding those assets * Being able to deep dive and pull reports of any kind that we want * Customizable If we're looking for some data that is not there natively, we can make it appear in... more»
We get audited quite a bit because of PCI compliance. There are a lot of requirements that we have to meet on our endpoints to reach that certification for the compliance. BigFix allows us to see the data and remediate those vulnerabilities... more»
Providing information about areas with room for improvement is tough. I recently attended a roadmap session, and they're pretty much addressing a lot of the stuff we have. I would like to see more automation, and that's the name of the game.... more»
Rather than having to log onto a central server to manage the endpoint protection, I can log onto the dashboard to manage everything. No on-premise server required, chewing up resources needed for other tasks and projects. Endpoints are... more»
Work on the math model. We are catching a lot of false positives, which gets to be a pain at the start of a deployment. It is not hard to decipher and add a global safe list, so you do not have to touch or adjust Clients on all endpoints.... more»
My experience with McAfee is very good. They give excellent support, they are proactive to solve issues, and willing to integrate their products. Their ability to execute is very high. Their malware detection rate is excellent for all type of... more»
Our datacenter cloud services such as email, and web services for internal and external use, had to be protected with different systems and the web services where left really unprotected, since we used an standard IPS/IDS to protect ourselves... more»
Being able to hit all of our endpoints is the most beneficial feature of this solution. It mainly gives us a lot of consistency. For example, with the previous product that we were using for endpoint management, we were getting like 70-80%... more»
It just streamlined the whole process, because it allows us to manage everything from one endpoint solution. It's reliable. So, we never had to spend time with the senior technicians for circling back to remediate all the ones that it missed.
Probably, there is need to just expand the WebUI and make it a full management console and really deprecate the Windows-based command console. They should definitely update the web reports to make it up to the executive level, something I'd... more»
It's easy to manage. It gives me great power over the devices that I manage with very little effort, compared to other products. With other products, it takes a lot more effort just to do the same kind of work.
It has one central location to manage all the different platforms that we have such as desktop, Windows Servers, Linux Server, Solaris, AIX and zLinux. It's great to be able to manage them all from one central location.
The feature that I would like them to implement is for the command line and I know this is probably against the design. We come from the command line and sometimes, you want to talk to the agent in real time. Seems like now with the new... more»
Patch Management for a variety of operating systems makes it valuable as we can rely on a single tool for obtaining patch compliance of the entire compute infrastructure. This also ensures that we do not need to have different skills for... more»
Patch compliance has improved. Using software distribution, the software distributed in the environment has been standardized. With the same software versions across the environment, compatibility issues have come down with a reduction in... more»
* Relay selection and availability needs improvement as an incorrect relay selected can cause network chokes. * Client reporting to the console is a minor issue but definitely needs improvement. * Reporting needs to be enhanced with maybe a... more»
Website and EComm at a retailer with 1,001-5,000 employees
Apr 12 2017
What do you think of Symantec Endpoint Protection?
It is unacceptable for an organisation to be without some form of Anti-virus protection. Symantec Endpoint Protection was a product we picked because we were coming off of Sophos as the charity discount expired. Charities tend to shop around for AV yearly to take advantage of discounts to standard pricing.Whilst this means install costs (time and/or money) it means we get to experience a lot of products and vendors. Now, that is a good and bad thing.
We had some teething problems on install. It wasn't the product at fault per se but the IT Company who installed a 2011 version instead of the current 2013 version. This resulted in multiple BSOD for our W7 users. I used Symantec support and logged an online ticket. Literally, within 10mins I had a call from a Symantec support...
I like the overall usage of it. It's easy to use, gives you great visibility into your envionment, customization of your reports, and the community of users that you can pull experience and knowledge from. So that's one of the main advantages... more»
It has definitely improved our patch process, being able to create compliance reports and hand those to management, executives and so on, and making the overall procedure of managing assets, managing end points, patching endpoints, etc. It... more»
It's not perfect, but it's close. There are some things here or there, for instance if you get down to the small details, such as if you could deploy and action it a different way, or you selected multiple endpoints and then from there,... more»
SentinelOne’s Rollback is its best feature. No solution can ever provide a 100% protection, but their rollback feature closes this gap in endpoint security giving end users a ray of hope in the event of a worst case scenario endpoint breach,... more»
Before it was a challenge for us to know who had an existing endpoint issue or who had the most attacks within the corporate network. Since SentinelOne was introduced, it has provided overall endpoint status visibility for us. Giving us the... more»
They need to improve their UI and the way they show that the scanning is running on the endpoint. Sometimes users wanted to see whether their AV is working via visual context. They could add “right click>scan” where most users were trained... more»
It keeps our machines up-to-date with the definitions of the current zero day attacks, which happens in real-time scenarios. It protects our data and the clients' data, which can be secured by using this product.
I am happy to say that the Symantec comes into the picture where the issues are reported from the product, it might be a product bug or it might be a product defect. The product engineer works on this and the latest upgrade has it built into... more»
I would like to see improvements in the device control features, which are limited. I can block devices by the policy in the device control such as usb and cd but i can block devices like sound that not supported by Kaspersky I would see... more»
In his article in CSO Online, Jon Oltsik writes that enterprises focus disproportionately on the network when developing a cybersecurity strategy. He continues that it is important to also make endpoint and server security a priority, as this network-only focus creates “a cybersecurity... more»
What do users think about their endpoint protection software?
What do endpoint protection users look for in the software they use? Which solutions offer the most value, and how?
Which endpoint protection solutions did professionals use prior to their current tool?
Most importantly, are they... more»
Real users choose their top endpoint protection software
What do Users Look for when Choosing their Endpoint Protection Tools?
According to Eric Cole of the SANS Institute, big data breaches and large-scale compromises often start with an initial compromise in an endpoint device, such as a... more»
Security Consultant -Team lead at Accenture
Sr Engineer - Security management at Wipro
Service delivery consultant at HP
Sr Engineer network and security at Tulip telecom
Information security policies and procedures
Security compliance, Governance
Firewall (Check point, Cisco,... more>>
I am a Security person and have titles like Security Officer, Security Manager, Säkerhetschef and Säkerhetsskyddschef, these are only titles and not limitations.
My last twenty years has been a road that started with Novell and now i live in the Cloud.
Security in all forms have always been... more>>
My passion is helping my customers with their cool projects. I have been working in IT for a decade, developing myself from computer technician to IT professional. In that that time I have worked many security technologies. Far from being a security jack of all trades, I have pursued a path which... more>>
Excessive in the IT industry, working as a Consultant at Advania Öst, located at Norrköping, sweden.
A happy, talkative and polite person.
Educating myself in both network security and endpoint security.
McAfee endpoint protection certificated.
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement.
Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
Exchange specialist with migration projects from Exchange 2003 and Exchange 2007 to Exchange 2010, Exchange 2013, Exchange 2016 and Office 365.
Exchange System Engineer and Administrator since Exchange 5.0 with migration projects from MS Mail to Exchange 5.0, Exchange 5.0 to 5.5 and Exchange 5.5... more>>
A purely self-motivated & diligent professional with significant experience in the networking and IT-Security industry. Seeks out new challenges constantly and applies a positive and infectious mind set to deliver results that exceed expectations. Proven ability to troubleshoot network... more>>