Over 189,183 professionals have used IT Central Station research on enterprise tech.
Here are the best Endpoint Security vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product (and the bar length) is based on a weighted aggregate ranking.
For Views, Comparisons, Reviews, and Followers the score is calculated as follows:
The product with the highest count in each area gets the highest available score of 17.5 points.
Every other product gets assigned points based on its total in proportion to the #1 product in the category.
For example, if a product has 80% of the number of reviews compared to
the product with the most reviews then the product's score and bar length for reviews would be 17.5% (weighting factor) * 80% = 14.
In the final section, Average Rating, there are 30 points available to each product
independent of the other products.
Reviews and ratings that are more than 24 months old, as well as those by resellers, are excluded from the rankings.
When evaluating endpoint security products, the IT Central Station users were clear on what aspects were most important. Proactive protection is a clear indication of superior quality in a product, since the days of reactive protection are gone. Another essential feature to look for is the capability to block a variety of attack vectors, since testing with known malware simply isn't sufficient. Additionally, our members want to see good customer support, easy installation and removal, and competitive pricing for the endpoint security product.
Endpoint Security Reviews
Read reviews of Endpoint Security that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
My title is technical project manager consultant and have the last twelve years been doing everything from manager to consultant and both.
2014-2015 i worked mostly within IT-Security and with SIEM Solutions and now i am Configuration Manager and Customer Security Office for a large... more>>
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement.
Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
A purely self-motivated & diligent professional with significant experience in the networking and IT-Security industry. Seeks out new challenges constantly and applies a positive and infectious mind set to deliver results that exceed expectations. Proven ability to troubleshoot network... more>>