Avast Business Endpoint Protection Alternatives and Competitors

Get our free report covering Bitdefender, Broadcom, Palo Alto Networks, and other competitors of Avast Business Endpoint Protection. Updated: May 2021.
511,307 professionals have used our research since 2012.

Read reviews of Avast Business Endpoint Protection alternatives and competitors

Mohammad Ali Khan
Director at Pacific Infotech UK ltd
Real User
Top 5
Automatic remediation and rollback help us minimize the number of technicians needed to support customers

What is our primary use case?

We are a managed services provider. We are not just using it for ourselves, but we are also supporting it and deploying it for a number of our customers. The primary use case is that it's endpoint protection software and we use it to protect our end customers' endpoints, whether they are Apple or computers, laptops or servers. SentinelOne is software as a service, but it has an agent that has to be installed on a computer or a server onsite.

Pros and Cons

  • "It has a one-click button that we can use to reverse all those dodgy changes made by the virus program and bring the system quickly back to what it was. That's one of the most important features."
  • "Another valuable feature is that if a machine is infected, one that may infect other computers within the network, we have the capability of segregating that machine in the network so that it remains connected to the internet but is cut off from the other machines in the network. That helps prevent spreading of the infection. That's a very unique feature, one I have not seen in the last 10 to 15 years from any other antivirus program. That's amazing."
  • "One of the areas which would benefit from being improved is the policies. There are still software programs where we need to manually program in the policies to tell the system, "This program is legitimate." Some level of AI-based automation in creating those policies would go a long way in improving the amount of time it takes to deploy the system."

What other advice do I have?

Go for it. It's an absolutely brilliant product. But understand what it is before starting to deploy. Unless you understand the product, you will not know how to use it to the best of its best capabilities. The solution's Behavioral AI works with and without a network connection, providing the internal protection. But having that network connection is important because it will then be able to report it to the central dashboard. While it will do what it has to do locally, it's helpful when the agent reports back to the central dashboard so that the IT Admin can take action. It is important that…
Larry Mackey
Sr Project Manager at a tech services company with 11-50 employees
Real User
Top 5Leaderboard
Low maintenance with good scalability but needs better DNS support

What is our primary use case?

All of our machines have Webroot installed on it and actively engage in endpoint protection.

Pros and Cons

  • "We've not had any issues with scalability. If an organization needs to expand, they can do so quite easily."
  • "Technical support is not the best. It's hard to get a hold of them if we need help. It's something that definitely needs improvement."

What other advice do I have?

We're just customers. We aren't consultants or resellers. We're using the most up to date version of the solution. All of our users are geographically diverse, so we're basically all diversely distributed. At the moment it's a great product. They recently got acquired by Carbonite and I'm still trying to sort out what the fallout is from a corporate standpoint. Otherwise, for the near term, it's a good product. We're just a bit worried due to the fact that we've dealt with other products from Carbonite in the past and it's left a bad taste in our mouth. We're kind of looking around for other…
NM
Team Lead Implementation Services/Systems Integration Engineer at Trinidad Systems Limited
Real User
Top 10
Threat Emulation and Threat Extraction features scan email attachments before the user is able to access the file and then provide a safe copy of the attachment

What is our primary use case?

Our primary use case for this solution is Antivirus capabilities. These include Antimalware, Antibot, Anti-Ransomware, and Threat Emulation and Anti Exploit. We have a mixed environment that includes Windows 2012 R2 Windows 7 Windows 10 and macOS 10.xx. We also use VMware. The client has been installed on all servers, PC,s, laptops and MAC machines. We need all this infrastructure monitored for malicious activity and reporting if something happens in realtime. This solution has worked very well.

Pros and Cons

  • "One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users machine. This is a very valuable feature of this solution."
  • "As I understand there will be a URL filtering feature included with the browser agent in the future. This will allow URL filtering without the need for a Gateway Device. This is something I am looking forward to and would be a great addition to list of features."

What other advice do I have?

Check Point Endpoint Security just works. You will not be disappointed.
BH
Manager at EZ Computers Ltd.
Real User
Easy to use, proactive protection, has a good management center, and free training is available

What is our primary use case?

We are a reseller and this is one of the products that we use ourselves, as well as recommend it to other companies. The primary use case is as an anti-virus.

Pros and Cons

  • "The most valuable feature of this solution is the management."
  • "Everything has some kind of room for improvement."

What other advice do I have?

This is a good, all-in product. Even the home, end-user products by this vendor are very good. If you're serious about endpoint security then this is the only product you will need because it's a one-stop solution. I would rate this solution a nine out of ten.
CG
Team Lead at a tech services company with 1-10 employees
Real User
Top 10
Easy to use with great anti-malware features and quite stable

What is our primary use case?

We primarily use it due to the fact that it comes with the Windows 10 bundle and is free. We use it for security purposes. It scans for viruses and malware for us.

Pros and Cons

  • "It's absolutely free to use."
  • "The anti-ransomware features need to be improved upon."

What other advice do I have?

I'd recommend the solution. Why not, after all? It's already there within Windows 10 and is part of a user's Microsoft bundle. Overall, I'd rate the product eight out of ten. If it had more ransomware protection, I'd rate it higher. As it is, the solution offers great malware features, is ranked pretty highly in Gartner and is easy to implement and use. Plus, it doesn't drain a lot of your machine's resources, which is a bonus.
Get our free report covering Bitdefender, Broadcom, Palo Alto Networks, and other competitors of Avast Business Endpoint Protection. Updated: May 2021.
511,307 professionals have used our research since 2012.