"Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts."
"Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
"The most valuable feature is signature-based malware detection."
"I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."
"I like the Panda Security Adaptive Defense cloud usages. Everything is on a single plane of glass like the dashboards. I also like the information I can get about the computers itself."
"Great technical support staff."
"The protection from malware is the most important feature. It has some endpoint information about the vehicle of the virus, malware, etc. It is also stable and easy to install, and they also provide good technical support."
"It allows us to stop activation windows."
"The most valuable features of Panda Security Adaptive Defense are the useful hardware information it provides, light on resources, controllable from the console, remote scan functionality, and the blocking of a lot of URL malware."
"The product so far has been good at protecting us. We haven't faced a breach."
"It prevents our users from circumventing security. Everything is password protected so they can't get into it. They can't uninstall it. They can't do anything."
"The most valuable feature Sophos EPP Suite is that it protects the computer beyond the premise. Whether the user is at home, in the office, or traveling, you are able to apply the policies as the user moves."
"Great cloud management."
"Synchronized security is a great feature. My firewall knows exactly what is happening in my endpoint."
"The most valuable feature is data loss prevention."
"The solution's most valuable aspect, for us, is the DLP portion of the product."
"The most valuable feature is the central administration and management."
"This product is quite stable and there are no problems with it."
"It is doing its job. We use it for standard antivirus purposes and for making sure that people aren't downloading infected attachments. Because we use the cloud version, it is easy to maintain. We don't have to do anything to really maintain it. It gets updated automatically."
"The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time."
"We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way."
"We had a lot of noise at the beginning, and we had to turn it down based on exclusions, application whitelisting, and excluding unknown benign applications. Cisco should understand the need for continuous updates on the custom Cisco exclusions and the custom applications that come out-of-the-box with the AMP for Endpoints."
"They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need."
"The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."
"The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself."
"I would like to see integration with Cisco Analytics."
"It could be improved in connection with artificial intelligence and IoT."
"They need to offer a clear dashboard so you can see everything everywhere all at once."
"It needs some improvements in the DNS security feature. Currently, it does not have full DNS security. It only has semi-DNS security, which can be improved. It is an important feature for us, and it would be really good if they can improve the DNS security feature. Our group has some plans to change to Cisco AMP, which has features such as DNS, Umbrella. We are trying to learn about Cisco AMP and compare it with Panda."
"It would be nice if Panda Security Adaptive Defense could come out with remote desktop usage."
"Panda Security Adaptive Defense can improve by including the intrusion and prevention system not only on their most expensive platform. Additionally, it blocks software that is legitimate from users. They complain and then we have to manually unblock the software, by hash, or we receive a message. Some of the prevention features are not available and this might cause us to need a separate firewall or something to protect the company."
"Needs a better way to scan the hardware to detect whether it's valid."
"Occasionally, we suffer from little bugs that give us the wrong message."
"It needs improvements in its EDR and its ability to manage all the nodes. I'd like better communication between the console and the nodes, so I don't have to remote into each individual machine that's having an issue with the protection."
"In the future, I would like to see better third-party integration so that it can work in conjunction with our ticket system."
"If we could bypass the first couple of levels of support when we have a problem then it would be easier and quicker when we need an issue resolved."
"In my country, having an on-premises deployment model is preferred. In this part of the world, on-premises is still the way many companies want to go. Therefore, they should supply some sort of option that allows for that reality."
"Sophos is lacking in the granularity of optimization, so having more control would be better."
"There are also issues with the compatibility of the OS. When using Sophos with Windows and devices, most of them work well, but as soon as we work with macOS and Linux, many issues arise that we do not want to have."
"The solution could improve on the resource management, it is a bit heavy on the resources."
"It would be ideal if the price could be lowered a little bit."
"Technical support needs to be improved."
More Panda Security Adaptive Defense Pricing and Cost Advice →
Panda Security Adaptive Defense is ranked 29th in EPP (Endpoint Protection for Business) with 7 reviews while Sophos EPP Suite is ranked 18th in EPP (Endpoint Protection for Business) with 12 reviews. Panda Security Adaptive Defense is rated 7.6, while Sophos EPP Suite is rated 8.2. The top reviewer of Panda Security Adaptive Defense writes "Managing multiple machines is a pain, but support is top notch". On the other hand, the top reviewer of Sophos EPP Suite writes "Great DLP, very easy initial setup, and quite stable". Panda Security Adaptive Defense is most compared with Microsoft Defender for Endpoint, ESET Endpoint Security, Sophos Intercept X, Kaspersky Endpoint Security for Business and CrowdStrike Falcon, whereas Sophos EPP Suite is most compared with Microsoft Defender for Endpoint, Trend Micro Deep Security, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon and Seqrite Endpoint Security. See our Panda Security Adaptive Defense vs. Sophos EPP Suite report.
See our list of best EPP (Endpoint Protection for Business) vendors.
We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.