Compare Top Endpoint Security Solutions

Get to know the strength and weaknesses of top vendors in Endpoint Security Solutions market. Compare vendors against their competitors on the basis of criteria, the scores of which are derived by ratings from buyers, industry experts, MnM analysts and vendors. Set comparison preferences option allows you to decide features which are important to you and evaluate vendors considering them as your parameters.

EVALUATION CRITERIA

4.37
4.31
3.65
  • Insider Threat

  • Enterprise-wide Monitoring

  • Incident Response

  • Threat Hunting

  • Viability

    • Important Partnerships

    • Important Innovations

    • Marquee Clients

    • Financial Performance

      Total revenue for the last FY? | Percentage Increase | Number of End Point Security Customers | Average Customer Retention Rate YoY | Total revenue for the last FY | No. of End Point Security customers | % increase in revenue YoY for last FY | Average customer retention rate YoY |
  • Geographic Footprint

    • Geographies

      USA | Canada | Latin America | UK | Germany | Eastern Europe | Western Europe | Africa | UAE & Middle East | Israel | India & South Asia | China & HK | SEA & Singapore | Japan | Australia & New Zealand |
  • Channel Strategy and Fit

    • Source of Sales by percentage of contribution

      Direct | Distributors / VARs / OEMs | Agencies & Consultants | Managed Service Providers | System Integrators / Budlers |
    • Channels of Demand

      Web Search | Digital Marketing | Field Sales | Events |
  • Breadth of Applications Served

    • Industries

      Construction | Consumer & Commercial | Education | Energy and Utilities | Financial Services | Government | Healthcare | Industrial Control Systems | Manufacturing | Media & Communications | Military & Aerospace | Retail | Transportation |
  • Product Quality and Reliability

    • Deployment Type

      Web-Based | Installed | iOS | Android |
    • Deployment Model

      On-Premises | Cloud | Hybrid |
  • Product Features and Functionality

    • Respond

      Automated Malware Removal | Synchronized Security Heartbeat | Root Cause Analysis | Block targeted attacks |
    • Prevention

      Web Security | Web Control / Category-based URL Blocking | Peripheral Control (e.g. USB) | Application Control | Client Firewal | Deep Learning malware detection | Anti-Malware File Scanning | Live Protection | Pre-execution Behavior Analysis (HIPS) | Potentially Unwanted Application (PUA) Blocking | Stop fileless attacks | Prevent data breaches | Exploit Prevention |
    • Licensing

      Business | Enterprise |
    • Detection

      Runtime Behavior Analysis (HIPS) | Malicious Traffic Detection (MTD) | Active Adversary Mitigations | Ransomware File Protection (CryptoGuard) | Disk and Boot Record Protection (WipeGuard) | Man-in-the-Browser Protection (Safe Browsing) |
    • Data Security

      Segregation of Network | Encryption of Data | Prevent Data Loss | Control File Integrity | Monitor the Data access |
    • Costs & Units

      $ per Month/Yearly | $ per license |
  • Breadth and Depth of Product Offering

    • Use Cases

      Insider Threat | Enterprise-wide Monitoring | Incident Response | Threat Hunting |
    • Services

      Technical Support | Virus & Threat Help | Renewals & Registration | Education & Certification | Free Downloads | Free Clean-up Tools |
Can I help you with something?