We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The price is very good."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
"We can know if something bad is potentially happening instantaneously and prevent it from happening. We can go to a device and isolate it before it infects other devices. In our environment, that's millions of dollars saved in a matter of seconds."
Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.
ARCON EPM ensures that an end user privilege to any application is instantly revoked after the task is completed. Thus it helps implementing the principle of Least Privileges, the cornerstone to form a robust identity and access control framework.
Dell endpoint systems management (ESM) products provide a comprehensive and easy-to-use family of solutions that fulfills your systems management needs, regardless of your organization's size. Dell ESM solutions manage, maintain and secure your entire IT infrastructure - servers, Windows PCs, Macs, Chromebooks, mobile devices and connected noncomputing devices, such as printers, IP telephony and routers, in preparation for the Internet of Things. With a flexible suite of products and services, Dell ESM prepares companies to meet emerging systems management requirements, Preconfigured appliances, robust features, simple integrations with other software, fast deployment and rapid time to value.
ARCON Endpoint Privilege Management is ranked 57th in Endpoint Protection for Business (EPP) while Dell Data Protection - Endpoint Security Suite is ranked 41st in Endpoint Protection for Business (EPP). ARCON Endpoint Privilege Management is rated 0.0, while Dell Data Protection - Endpoint Security Suite is rated 0.0. On the other hand, ARCON Endpoint Privilege Management is most compared with , whereas Dell Data Protection - Endpoint Security Suite is most compared with Carbon Black CB Defense, McAfee Endpoint Security, CrowdStrike Falcon, SentinelOne and Cortex XDR by Palo Alto Networks.
See our list of best Endpoint Protection for Business (EPP) vendors.
We monitor all Endpoint Protection for Business (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.