Microsoft Defender for Endpoint is a comprehensive security solution that provides advanced threat protection for organizations. It offers real-time protection against various types of cyber threats, including malware, viruses, ransomware, and phishing attacks.
The product is free of charge and comes integrated into Windows.
The solution is free.
The product is free of charge and comes integrated into Windows.
The solution is free.
CrowdStrike Falcon is a comprehensive endpoint protection platform, primarily designed to meet the evolving cybersecurity needs of modern enterprises. It employs machine learning, behavioral analytics, and integrated threat intelligence to combat a wide range of cyber threats. CrowdStrike Falcon stands out for its cloud-native architecture, ensuring real-time protection and threat intelligence, essential for safeguarding dynamic environments. Its lightweight agent architecture minimizes system performance impact while offering extensive network visibility.
I do not have experience with the cost or licensing of the product.
The pricing will depend upon your volume of usage.
I do not have experience with the cost or licensing of the product.
The pricing will depend upon your volume of usage.
Cortex XDR by Palo Alto Networks is the first threat detection and response software to combine both visibility across all types of data as well as autonomous machine learning analytics. Threat detection very often requires analysts to divide their attention among many different data streams. This platform unifies a vast variety of data flows, which allows analysts to assess threats from a single location. Users can now maintain a level of visibility that other threat detection programs simply cannot offer. This level of transparency lends itself to both quick identification of problems that arise and the equally quick development of a potential solution.
I feel it is fairly priced.
The pricing seems fair, and I do like the licensing model. You use wherever they are, and it is elastic.
I feel it is fairly priced.
The pricing seems fair, and I do like the licensing model. You use wherever they are, and it is elastic.
Cisco ISE is an all-in-one solution that streamlines security policy management and reduces operating costs. Cisco ISE delivers visibility and access control over users and devices across wired, wireless, and VPN connections.
There are three levels of pricing: basic, plus, and apex. Basic satisfied our needs.
If you go directly with Cisco for the implementation it's very, very expensive.
There are three levels of pricing: basic, plus, and apex. Basic satisfied our needs.
If you go directly with Cisco for the implementation it's very, very expensive.
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
Pricing and licensing depend on the environment.
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
Pricing and licensing depend on the environment.
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing.
Purchasing on the AWS Marketplace is like shopping on Amazon Prime.
We have saved a 50% ROI for the on-premise product. It gave us significant improvement overall in productivity, costs, and efficiency.
Purchasing on the AWS Marketplace is like shopping on Amazon Prime.
We have saved a 50% ROI for the on-premise product. It gave us significant improvement overall in productivity, costs, and efficiency.
SailPoint is the leader in identity security for the cloud enterprise. We’re committed to protecting businesses from the inherent risk that comes with providing technology access across today’s diverse and remote workforce. Our identity security solutions secure and enable thousands of companies worldwide, giving our customers unmatched visibility into the entirety of their digital workforce, and ensuring that each worker has the right access to do their job, no more, no less. With SailPoint at the foundation of their business, our customers can provision access with confidence, protect business assets at scale and ensure compliance with certainty.
SailPoint IIQ is the best of best. That is reflected in the pricing of the solution. The pricing is based on the number of identities.
They are expensive.
SailPoint IIQ is the best of best. That is reflected in the pricing of the solution. The pricing is based on the number of identities.
They are expensive.
VMware Carbon Black Endpoint Security is a comprehensive endpoint protection platform (EPP) designed to safeguard enterprises from advanced cyber threats, malware, ransomware, and other forms of malicious attacks. Leveraging cloud-native architecture, it provides a robust set of tools to detect, prevent, investigate, and respond to cybersecurity incidents across environment. The solution stands out for its advanced behavioral analytics, real-time threat hunting, and customizable policies, making it a preferred choice for businesses seeking to fortify their defenses in the evolving cybersecurity landscape.
The cost/benefit factor has great relevance in Cb Defense implementations.
I am not really involved in the pricing of this product. But, from my understanding, it is OK for us.
The cost/benefit factor has great relevance in Cb Defense implementations.
I am not really involved in the pricing of this product. But, from my understanding, it is OK for us.
Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.
The initial price is very good as they give good initial discounts, but it seems a little expensive once you renew the license.
Pricing is fair.
The initial price is very good as they give good initial discounts, but it seems a little expensive once you renew the license.
Pricing is fair.
Omada Identity delivers an end-to-end identity and access management solution with essential identity governance functionality for secure, compliant, and efficient administration of all users' access rights across on-premises or cloud-based systems. The solution provides configurable best practice processes that covers all identity and access related scenarios from providing an access risk overview, management of identities lifecycle, to automated enforcement of policies.
The pricing is too high for SMBs.
Omada continues to be very competitive on pricing, especially on the Omada cloud product.
The pricing is too high for SMBs.
Omada continues to be very competitive on pricing, especially on the Omada cloud product.
Fortinet FortiAuthenticator is the primary secure point of approved access into the Fortinet network, authorizing users, reviewing access permissions, and relaying the information to all Fortigate devices for comparison with identity-based protocols. Fortinet FortiAuthenticator is a top-ranked authorization and SSO solution.
Appropriate secure access is fundamental to every role in an enterprise ecosystem. It is an integral function of every organization to ensure that every access and privilege is secure and to mitigate any possible risk to an organization. Approved users should only have access to the necessary information when they need it, from the appropriate location(s) to safeguard an organization's security at all times.
I would start off with a VM including the base license and scale according to the number of users you need to authenticate.
You can pay as you go with them. You purchase a base license and add to it as needed.
I would start off with a VM including the base license and scale according to the number of users you need to authenticate.
You can pay as you go with them. You purchase a base license and add to it as needed.
Check Point Harmony Endpoint is a robust security solution that enables users to use a single piece of software to accomplish tasks that often require the use of multiple pieces of software. It prevents impending threats from doing harm while at the same time enabling users to identify and deal with any harm that results from breaches.
In addition to the standard licensing fees, there is a cost for support.
We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it.
In addition to the standard licensing fees, there is a cost for support.
We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it.
Secret Server is a fully-featured Privileged Access Management (PAM) solution available both on premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.
It isn't terribly expensive.
The price of this solution is good.
It isn't terribly expensive.
The price of this solution is good.
Saviynt is an intelligent, cloud-first identity governance & access management solution. The solution is designed to help organizations quickly scale cloud initiatives and solve security and compliance challenges. Saviynt offers identity governance, granular application access, cloud security, and privileged access to secure your company’s ecosystem and provide a seamless user experience.
If you need to make any changes then there are additional fees.
The price of the license for this product is quite expensive.
If you need to make any changes then there are additional fees.
The price of the license for this product is quite expensive.
ForgeRock is a comprehensive open-source identity and access management solution designed to meet the unique needs of your users and workforce. With ForgeRock you can orchestrate, manage, and secure the complete lifecycle of identities in any cloud or hybrid environment. ForgeRock allows you to set up bot detection, identity proofing, and risk-based authentication.
It's a bit pricey and could be more competitive.
Its price is comparable to other products in the market.
It's a bit pricey and could be more competitive.
Its price is comparable to other products in the market.
One Identity Manager is a value-added and trusted active directory management and user provisioning software solution. One Identity Manager administers and protects an organization’s data and users, minimizes threats, and ensures that compliance regulations are consistently satisfied.
Users will have access to the data and applications they need when they need them. One Identity can be used on premises, in the cloud, and also with hybrid options. One Identity Manager is able to easily combine strict governance compliance regulations and rigorous security protocols to keep business enterprises secure and functional today and into the future. One Identity Manager is also a robust, scalable identity governance and administration (IGA) solution. The solution is designed to meet the changing needs of a growing dynamic business enterprise, and not be limited or left vulnerable by IT department constricts.
It is a very good product but it's not the cheapest or cost-efficient.
There are old processes that are really great for some people and look like pieces of artwork. However, the maintenance of them is really expensive.
It is a very good product but it's not the cheapest or cost-efficient.
There are old processes that are really great for some people and look like pieces of artwork. However, the maintenance of them is really expensive.
The RSA SecurID Suite combines the separate disciplines of access management and authentication with identity governance and user lifecycle management into one comprehensive suite. It goes way beyond the capabilities of traditional identity and access management systems by using risk analytics to provide identity and access assurance. This helps organizations solve two fundamental challenges:
I think the price of this solution is reasonable compared to YubiKey and Duo given that it offers the same similar features.
RSA SecurID Access is expensive.
I think the price of this solution is reasonable compared to YubiKey and Duo given that it offers the same similar features.
RSA SecurID Access is expensive.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record.
I think that it was in the range of $200,000 that had to get approved.
licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record.
I think that it was in the range of $200,000 that had to get approved.
Keeper Security is transforming the way businesses and individuals protect their passwords and sensitive digital assets to significantly reduce cyber theft. As the leading password manager and digital vault, Keeper helps millions of people and thousands of businesses substantially mitigate the risk of a data breach. Keeper is SOC 2 Certified and utilizes best-in-class encryption to safeguard its customers. Keeper protects industry-leading companies including Sony, Chipotle, and The University of Alabama at Birmingham. Keeper partners with global OEMs and mobile operators to preload Keeper on smartphones and tablets. Learn more at https://keepersecurity.com.
Free works unless the paid is absolutely necessary.
The more users, the better the price. Always opt for the live support.
Free works unless the paid is absolutely necessary.
The more users, the better the price. Always opt for the live support.
WALLIX offers cybersecurity and privileged access management solutions that secure and protect your most critical IT assets.
Pricing of this solution is good for the local market and is more affordable than CyberArk, BeyondTrust and One Identity.
The solution's price is mid-ranged.
Pricing of this solution is good for the local market and is more affordable than CyberArk, BeyondTrust and One Identity.
The solution's price is mid-ranged.
One Identity Safeguard is an integrated system that combines a secure, toughened password safe and a session management and monitoring solution with threat detection and analytics into one integrated solution. It stores, manages, records, and analyzes privileged access in a secure manner.
Setup cost, pricing and licensing are all very expensive.
The full license is expensive but if you plan to use it in a big organization then it is the best option because it is more flexible.
Setup cost, pricing and licensing are all very expensive.
The full license is expensive but if you plan to use it in a big organization then it is the best option because it is more flexible.
Beyond Trust Password Safe is an automated solution that combines password and privileged session management into a single platform. Password Safe delivers secure access control, auditing, alerting, recording, and monitoring.
It has subscription-based licensing. BeyondTrust is three times less expensive than CyberArk.
This solution is not cheap—it's a very expensive solution. Very, very expensive compared to the features and functions that they offer.
It has subscription-based licensing. BeyondTrust is three times less expensive than CyberArk.
This solution is not cheap—it's a very expensive solution. Very, very expensive compared to the features and functions that they offer.
BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.
The licensing cost for this solution is based on the number of endpoints.
The price is pretty expensive, but you get what you pay for and this is a great product.
The licensing cost for this solution is based on the number of endpoints.
The price is pretty expensive, but you get what you pay for and this is a great product.
Oracle Identity Governance (OIG) is a very versatile and robust enterprise identity management solution that offers functional and business performance competence by supplying centralized administration and total automation of identity and client provisioning events throughout the organization and user applications. Oracle Identity Governance monitors the complete identity and role process to satisfy rapidly changing business and complex compliance regulations and quickly delivers critical reporting and compliance capabilities.
Oracle licenses are expensive. I suggest making pricing and licensing decisions that align with architectural requirements and the project's budget.
The cost of support and upgrading to the next release are both expensive.
Oracle licenses are expensive. I suggest making pricing and licensing decisions that align with architectural requirements and the project's budget.
The cost of support and upgrading to the next release are both expensive.
Reduce risk and centrally manage user access across your enterprise – with SAP Identity Management. The software integrates with your business processes to provide robust data and application security. Keep your operations running smoothly – and boost productivity by providing role-based user access, self-service password reset, approval workflows, and more.
The licensing cost varies depending on the specific requirements and deployment size.
I rate the solution's pricing a four out of ten.
The licensing cost varies depending on the specific requirements and deployment size.
I rate the solution's pricing a four out of ten.
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.
On a scale of one to five, with one being expensive and five being competitive, I would rate the pricing of this solution as a five.
On a scale of one to five, with one being expensive and five being competitive, I would rate the pricing of this solution as a five.
ARCON PAM is a full blown Privileged Access Management solution. It has a robust password vaulting technology that comes with AES- 256 Database encryption. Dual Factor Authentication, 4Eye Authentication functionalities and Granular Access Control enables an enterprise to block any unauthorized access attempt to critical information assets. All access is based on “Need to know” and “Need to do” basis. It has the largest connector stack. Its Single Sign On enables seamless access to a host of devices with just a single click.
Pricing is low and licensing is flexible.
Pricing is reasonable.
Pricing is low and licensing is flexible.
Pricing is reasonable.
You just need to be aware that the more systems you connect, the more license fees you have to pay.
The price of the solution is a bit high and could be reduced.
You just need to be aware that the more systems you connect, the more license fees you have to pay.
The price of the solution is a bit high and could be reduced.
Delinea Privilege Service provides all of your IT administration teams with secure, granular access to infrastructure regardless of location, and without the hassles of a VPN.
Secure browser-based access Authorized IT users launch management sessions for resources directly from the Privilege Service portal. Sessions use SSH and RDP protocols, and are always protected end-to-end.
It is sad that people with a limited budget won't be able to afford it.
The price model is based on the number of devices and opposed to the number of users, and it is not very flexible.
It is sad that people with a limited budget won't be able to afford it.
The price model is based on the number of devices and opposed to the number of users, and it is not very flexible.
ZoneAlarm protects you by preventing hackers from remotely accessing and controlling your device, and lets you know which apps have excessive permissions so you can decide whether they threaten your privacy.
We use the free version of the software, but it can be upgraded to the paid Extreme Security edition.
This is a freeware product and I recommend using it.
We use the free version of the software, but it can be upgraded to the paid Extreme Security edition.
This is a freeware product and I recommend using it.
CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources. It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers
The prices are not low, but one can ask for a discount. It’s not the cheapest PAM solution.
Cost-wise, CA was better compared to others in the market.
The prices are not low, but one can ask for a discount. It’s not the cheapest PAM solution.
Cost-wise, CA was better compared to others in the market.
Check Point Antivirus is a robust software solution providing a dynamic next-generation group of applications that protect computers and devices by removing malicious software or code specifically created to corrupt computers or data.
The pricing is very expensive. You need to buy the appliance and subscription as well.
Check Point Antivirus is a good solution, but it's a little costly.
The pricing is very expensive. You need to buy the appliance and subscription as well.
Check Point Antivirus is a good solution, but it's a little costly.
The Symantec Identity Governance and Administration (formerly CA Identity Suite) provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the Symantec Identity Governance and Administration performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement.
Pricing and licensing models are adequate and reasonable.
Compared to other options, CA products are not that expensive.
Pricing and licensing models are adequate and reasonable.
Compared to other options, CA products are not that expensive.
Total Defense Anti-Virus provides a real-time protection for your PCs that detects and removes any threat, without negative impact on your speed and performance. It prevents your Windows desktops and laptops from being infected by viruses, malware, ransomware, and spyware. It offers free upgrades and automatically updates security multiple times a day so you're always protected from the latest online threats.
IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.
I would rate the price eight out of 10, with 10 as the best value for money.
I would rate the price eight out of 10, with 10 as the best value for money.
Privileged access management allows granular access control over privileged admin tasks in Office 365. It can help protect your organization from breaches that use existing privileged admin accounts with standing access to sensitive data or access to critical configuration settings. Privileged access management requires users to request just-in-time access to complete elevated and privileged tasks through a highly scoped and time-bounded approval workflow. This configuration gives users just-enough-access to perform the task at hand, without risking exposure of sensitive data or critical configuration settings. Enabling privileged access management in Microsoft 365 allows your organization to operate with zero standing privileges and provide a layer of defense against standing administrative access vulnerabilities.
Sectona is a Privileged Access Management company that helps enterprises mitigate risk of targeted attacks to privileged accounts spread across data centers and cloud. Sectona delivers integrated privilege management components for securing dynamic remote workforce access across on-premises or cloud workloads, endpoints and machine to machine communication.