Microsoft Defender Antivirus Competitors and Alternatives

Get our free report covering Broadcom, CrowdStrike, ESET, and other competitors of Microsoft Defender Antivirus. Updated: January 2021.
455,536 professionals have used our research since 2012.

Read reviews of Microsoft Defender Antivirus competitors and alternatives

reviewer1384002
Security Officer at a healthcare company with 51-200 employees
Real User
Jul 15, 2020
Gives great network visibility by showing how a file interacts with other systems, devices, and files

What is our primary use case?

AMP for Endpoints has Endpoint Connectors, which are agents on the endpoints, providing security against malware and intrusion detection. It also provides intrusion prevention. We install the Connector on all the endpoints before they're deployed and also on our virtual desktop images. They provide constant monitoring and alerting on any events or potential threats to let us know when there is something going on that we can further investigate. AMP intersects with a bunch of other Cisco tools, such as Threat Grid, Threat Response, and Talos Intelligence to identify threats, then automatically… more »

Pros and Cons

  • "The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it."
  • "One of the best features of AMP is its cloud feature. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. You don't have to be VPNed into the environment for AMP to work. AMP will work anywhere in the world, as long as it has an Internet connection. You get protection and reporting with it. No matter where the device is, AMP has still got coverage on it and is protecting it. You still have the ability to manage and remediate things. The cloud feature is the magic bullet. This is what makes the solution a valuable tool as far as I'm concerned."
  • "The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."

What other advice do I have?

You need to look at your exclusions. You need to understand everything you have in your environment that needs to be able to operate. Because one thing AMP does, if doesn't know what a file is, it will go get that file and isolate/quarantine it. That file might be part of another software platform that's needed to function for whatever it is you do. Chances are you won't have any visibility into whatever that platform is until it stops working, because AMP has quarantined one of the central files for it. Knowing what you have in your environment, what the exclusions are, and how to create and…
reviewer1237689
Network Designer at a computer software company with 1,001-5,000 employees
Real User
Oct 23, 2020
Easy to set up with excellent trend analytics and isolation feature

What is our primary use case?

We primarily use the product as endpoint security which we have deployed on all servers and locations. This is not limited to the endpoint, however, as it has further integration with the firewalls and email solutions. Therefore, it can give us quick visibility in case there is any malicious or suspicious activity happening.

Pros and Cons

  • "The initial setup is pretty easy."
  • "In reporting they should have a customizable dashboard due to the fact that C-level people don't like reporting to the IT department. They prefer to have a real-time dashboard. That kind of dashboard needs to have various customizations."

What other advice do I have?

While we deal with the cloud deployment model, we've also often used the on-premises deployment. I'd advise other companies to use the solution. It really is the best one out there. Overall, I'd rate the solution nine out of ten. The reporting is a bit weak, and it's my understanding they are working on that. However, performance-wise and security-wise, this is the best product.
reviewer1382439
Director at a consultancy with 201-500 employees
Real User
Jul 14, 2020
Great administrative control, reliable technical support, and easy to implement

What is our primary use case?

We basically use the solution for endpoint protection.

Pros and Cons

  • "The single-pane management is the solution's most valuable feature. It makes administrative control very easy."
  • "I know they were just bought out by Broadcom and there have been some difficulties with Broadcom as far as getting license renewals, etc. Mostly, due to the fact that it's confusing, even for the vendor, people are turned off by it. The vendors are telling us that it can take weeks for them to get a renewal quote, nevermind the actual renewal."

What other advice do I have?

We're just a Symantec customer. We aren't a partner or reseller. We're currently using the latest version of the solution. Overall, we're pretty happy with the product. I would tell other organizations considering implementing it that it's a great tool. My concern again would be if Broadcom doesn't really invest in the product's success. Often companies will buy out their competitors and/or they'll buy out a product line thinking that they want to get into that field. Then they turn around and they dump the product line after a year or two and decide, "Well, I guess we don't want to go this…
reviewer1148256
Manager Cyber Security (Technical) at a government with 11-50 employees
Real User
Jul 23, 2020
Good as a general anti-virus but needs more depth and sophistication

What is our primary use case?

We primarily use the solution for our endpoints. We do occasionally use it for some servers as well.

Pros and Cons

  • "The general anti-virus on offer is the solution's most valuable aspect."
  • "We're actually looking to upgrade to more sophisticated ADL products. We need a more sophisticated endpoint. We need to have the ability to automate those instant response processes."

What other advice do I have?

We're just a customer. We don't have a business relationship with Trend Micro. We're using the latest version of the solution. OfficeScan offers basic anti-virus security, but if you're looking for more advanced security features, you really need to look at more sophisticated and modern services. I'd rate the solution five out of ten.
ShreekumarNair
Chief Executive Officer at a tech services company with 11-50 employees
Real User
Top 5Leaderboard
Feb 10, 2020
Easy to set up and use, good customer support, and can be managed from mobile devices

What is our primary use case?

We are a technical services company and we provide this solution to our customers, as well as use it ourselves. Cynet is a breach protection platform.

Pros and Cons

  • "This solution requires less management and is very easy to use."
  • "A support center in Asia is needed."

What other advice do I have?

This is a brilliant solution. I recommend it and my advice is simply to go ahead and implement it. I would rate this solution a ten out of ten.
Get our free report covering Broadcom, CrowdStrike, ESET, and other competitors of Microsoft Defender Antivirus. Updated: January 2021.
455,536 professionals have used our research since 2012.