Endpoint Protection
SoftwareReviews names Malwarebytes Endpoint Detection and Response, Webroot® Business Endpoint Protection, Avast Business Antivirus, Sophos Endpoint Protection, and Microsoft Defender as Endpoint Protection Data Quadrant Award Winners.
View Category
Data Quadrant
Data Quadrants are proudly founded in 100% user review data and are free of traditional
"magical" components such as market presence and analyst opinion, which are opaque in nature
and may be influenced by vendor pressure, financial or otherwise.
The SoftwareReviews Data Quadrant evaluates and ranks products based on feedback from IT
and business professionals. The placement of a software in the Data Quadrant indicates its
relative ranking as well as its categorization.
Read The In-Depth Report
A thorough evaluation and ranking of all software in an individual category to compare
software across every dimension.
- user satisfaction rankings
- |
- vendor capability comparisons
- |
- business value scores
- |
- individual feature evaluations
- |
- emotional connection to products
Note The axes ranges are dynamically adjusted based on minimum and maximum values in the dataset
Software Experience
When distilled down, the software experience is shaped by both the experience with the software
and the relationship with the vendor. Evaluating enterprise software along these two dimensions
provides a comprehensive understanding of the product and helps identify vendors that can deliver on both.
Product Features and Satisfaction
The satisfaction is captured in the overall satisfaction score, which is driven by the likelihood
of users to recommend the software, combined with user satisfaction across top product features.
Vendor Experience and Capabilities
The vendor relationship is calculated in a weighted average of the satisfaction scores tied to vendor
capabilities (e.g. software implementation, training, customer support, product roadmap) as well as
emotional response ratings toward the vendor (e.g. trustworthy, respectful, fair).
Malwarebytes
Malwarebytes Endpoint Protection (Cloud-managed) and Malwarebytes Endpoint Security (On-Premises) Protect your endpoints against cyberattacks with a multi-layered approach that leverages static and dynamic techniques at every stage of the attack chain.
8.8
Composite
Score
Composite
Score
+91
Emotional
Footprint
Emotional
Footprint
92%
Likeliness to
Recommend
Likeliness
to Recommend
Webroot Software
Webroot® Business Endpoint Protection is a next-generation, fully cloud-based endpoint security solution that harness the power of machine learning to continuously monitor and adapt endpoint threat detection, protection, and prevention.
8.3
Composite
Score
Composite
Score
+84
Emotional
Footprint
Emotional
Footprint
86%
Likeliness to
Recommend
Likeliness
to Recommend
Sophos
Next-generation endpoint security for today’s businesses—and tomorrow’s threats. Sophisticated yet simple advanced threat protection, web filtering, policy enforcement and antivirus combined.
8.3
Composite
Score
Composite
Score
+83
Emotional
Footprint
Emotional
Footprint
85%
Likeliness to
Recommend
Likeliness
to Recommend
Avast
Defend against malware, phishing and virus attacks that expose your company to risk. Protect what matters most with on-premise or cloud-managed endpoint security.
8.2
Composite
Score
Composite
Score
+85
Emotional
Footprint
Emotional
Footprint
84%
Likeliness to
Recommend
Likeliness
to Recommend
Microsoft
Microsoft Defender
Built on System Center Configuration Manager, System Center Endpoint Protection provides a single, integrated platform that reduces your IT management and operating costs, in many cases using your existing client management infrastructure to deploy and manage your endpoint protection. The unified infrastructure also provides improved visibility into the security and compliance of your client systems.
8.2
Composite
Score
Composite
Score
+82
Emotional
Footprint
Emotional
Footprint
84%
Likeliness to
Recommend
Likeliness
to Recommend
Availability and Quality of Training
Microsoft Defender
Breadth of Features
Avast Business Antivirus
Business Value Created
Malwarebytes Endpoint Detection and Response
Ease of Customization
Avast Business Antivirus
Ease of Data Integration
Sophos Endpoint Protection
Ease of IT Administration
Malwarebytes Endpoint Detection and Response
Ease of Implementation
Webroot® Business Endpoint Protection
Product Strategy and Rate of Improvement
Malwarebytes Endpoint Detection and Response
Quality of Features
Malwarebytes Endpoint Detection and Response
Usability and Intuitiveness
Malwarebytes Endpoint Detection and Response
Vendor Support
Malwarebytes Endpoint Detection and Response
Availability and Quality of Training
Microsoft Defender
Breadth of Features
Avast Business Antivirus
Business Value Created
Malwarebytes Endpoint Detection and Response
Ease of Customization
Avast Business Antivirus
Ease of Data Integration
Sophos Endpoint Protection
Ease of IT Administration
Malwarebytes Endpoint Detection and Response
Ease of Implementation
Webroot® Business Endpoint Protection
Product Strategy and Rate of Improvement
Malwarebytes Endpoint Detection and Response
Quality of Features
Malwarebytes Endpoint Detection and Response
Usability and Intuitiveness
Malwarebytes Endpoint Detection and Response
Vendor Support
Malwarebytes Endpoint Detection and Response
Kaspersky
The most important factor in a corporate security strategy is a next-generation endpoint security platform, powered by a global intelligence network (Kaspersky Security Network), which provides a higher level of business processes and data protection together with a wide range of security capabilities to fight advanced threats.
7.9
Composite
Score
Composite
Score
+80
Emotional
Footprint
Emotional
Footprint
82%
Likeliness to
Recommend
Likeliness
to Recommend
Symantec
Symantec Endpoint Security
The most integrated endpoint security solution delivers innovative protections across the entire attack chain: attack surface reduction, attack prevention, breach prevention, detection and response. Deep protections are available for all key device types (including mobile devices) and all key Operating Systems (including iOS and Android). And these advance security technologies are available on-premises, in the cloud, or via hybrid management.
7.7
Composite
Score
Composite
Score
+77
Emotional
Footprint
Emotional
Footprint
78%
Likeliness to
Recommend
Likeliness
to Recommend
Check Point Software Technologies
Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.
7.5
Composite
Score
Composite
Score
+68
Emotional
Footprint
Emotional
Footprint
79%
Likeliness to
Recommend
Likeliness
to Recommend
Crowdstrike
Detect, prevent and respond to attacks with next-generation endpoint protection delivered via the Falcon Platform.
7.5
Composite
Score
Composite
Score
+73
Emotional
Footprint
Emotional
Footprint
75%
Likeliness to
Recommend
Likeliness
to Recommend
Trend Micro
You need smarter security that follows your users. You need connected security that shares intelligence across security layers so you can consolidate your view of user activity across all threat vectors. And you need security that seamlessly moves from on-premises to cloud without impacting licensing or commercial agreements. You need User Protection from Trend Micro..
7.4
Composite
Score
Composite
Score
+71
Emotional
Footprint
Emotional
Footprint
77%
Likeliness to
Recommend
Likeliness
to Recommend
McAfee
Today’s advanced attacks require more than traditional antivirus defenses. The good news is that it doesn’t have to be overwhelming thanks to McAfee Complete Endpoint Protection solutions. Our enterprise endpoint security solutions are centrally managed and defend against the full threat spectrum from zero-day exploits to advanced targeted attacks, protecting Windows, Macs, and Linux systems.
7.3
Composite
Score
Composite
Score
+70
Emotional
Footprint
Emotional
Footprint
77%
Likeliness to
Recommend
Likeliness
to Recommend
For the full list of vendors in this space, click here.
SoftwareReviews Gold Medal Awards recognize outstanding vendors in the technology marketplace as evaluated by their users. Gold Medals are the capstone of an in-depth software evaluation report, and awarded using a proprietary, transparent methodology based on a composite satisfaction score that averages four different areas of evaluation: Net Emotional Footprint, Vendor Capabilities, Product Features, and Likeliness to Recommend. The Net Emotional Footprint Score measures user emotional response ratings of the vendor (e.g. trustworthy, respectful, fair).
Software Reports present comprehensive evaluations of software vendors on the above elements. Software buyers can use this data to make more informed, data-driven software purchasing and renewal decisions.
Get Instant Access
to this Report
Unlock your first report with just a business email. Register to access our entire library.