"I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
"One of the best features of AMP is its cloud feature. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. You don't have to be VPNed into the environment for AMP to work. AMP will work anywhere in the world, as long as it has an Internet connection. You get protection and reporting with it. No matter where the device is, AMP has still got coverage on it and is protecting it. You still have the ability to manage and remediate things. The cloud feature is the magic bullet. This is what makes the solution a valuable tool as far as I'm concerned."
"Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
"The visibility and insight this solution gives you into threats is pretty granular. It has constant monitoring. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. You can see what happened after the threat. You can see what other applications were incorporated into the execution of the threat. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. Then, after the event, something else was launched by whatever the threat was. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. This helps you understand and nail down what the threat is and how to fix it."
"The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."
"Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source."
"The solution offers very good endpoint security."
"The installation is pretty straightforward."
"Would benefit with the addition of DLP features."
"The most valuable features are reporting from the ePO console and the advanced threat protection (ATP)."
"The primary reason the solution is good is because of its ease-of-use."
"The endpoint protection and disk encryption features are the most valuable."
"We like the management of the ePO, and we like the management console."
"The most valuable feature is ease of use."
"The solution has many features. It is very easy to define and set the policies based on the user groups, it does not take up a lot of resources in operation, and has provided us with a good track record of protection."
"Webroot's tech support is pretty good; they've given me some pointers."
"They have a lot of features integrated from way back, which shows that the product developers know exactly what they're doing."
"There aren't any features that really stand out — I just want it to keep malware out of my system. To date, I haven't had any malware in my system."
"Their policy management, their cloud-based dashboard and user interface are very easy to navigate."
"The initial setup was straightforward. It took five minutes. I installed the solution myself."
"The initial setup is not complex at all. It's very straightforward."
"The solution is very simple and straightforward to use."
"They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need."
"The GUI needs improvement, it's not good."
"The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."
"We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way."
"...the greatest value of all, would be to make the security into a single pane of glass. Whilst these products are largely integrated from a Talos perspective, they're not integrated from a portal perspective. For example, we have to look at an Umbrella portal and a separate AMP portal. We also have to look at a separate portal for the firewalls. If I could wave a magic wand and have one thing, I would put all the Cisco products into one, simple management portal."
"The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time."
"It could be improved in connection with artificial intelligence and IoT."
"I would like to see integration with Cisco Analytics."
"Every time we open a ticket with McAfee, their response differs and they are not consistent."
"The local technical support could be better."
"An area of improvement for this solution is to make it easier to manage."
"The price of the solution is high in Asia."
"It can be quite complicated to learn McAfee Endpoint Security and to feel comfortable with the environment."
"Technical support is an area that can be improved because sometimes, the response time is a bit slow and the explanation is short."
"The solution needs to offer better local technical support."
"We have had some of our clients not happy with McAfee Endpoint Security because it blocks some of the applications they are trying to use. They should make it easier to unblock applications."
"I did notice that my OS slowed down, but I don't know if that's due to Webroot."
"I'm not happy with Webroot Business Endpoint Protection, for only one reason. It seems that it slows down my interface when I'm doing programming in Microsoft Access, tremendously."
"Since they're dealing with multi-core environments now, the best option would be for them to enhance the product so that the product can automatically do an assessment on the machine."
"One of the biggest pain points is that it's not really ransomware-oriented. They will be able to catch some, but that's where Sentinel One is a better player compared to Webroot."
"The solution could improve by providing better ransomware protection."
"We need to have a stronger defense against CryptoLock and other attackers."
"Reporting system could be improved."
"There should be a Webroot Business Endpoint Protection mobile app."
More Webroot Business Endpoint Protection Pricing and Cost Advice →
Trellix Endpoint Security is ranked 15th in Endpoint Protection for Business (EPP) with 38 reviews while Webroot Business Endpoint Protection is ranked 23rd in Endpoint Protection for Business (EPP) with 11 reviews. Trellix Endpoint Security is rated 8.0, while Webroot Business Endpoint Protection is rated 7.6. The top reviewer of Trellix Endpoint Security writes "Protect your business against a wide variety of threats". On the other hand, the top reviewer of Webroot Business Endpoint Protection writes "A scalable lightweight endpoint protection solution with good technical support". Trellix Endpoint Security is most compared with McAfee MVISION Endpoint, Microsoft Defender for Endpoint, Symantec Endpoint Security, Cortex XDR by Palo Alto Networks and CrowdStrike Falcon, whereas Webroot Business Endpoint Protection is most compared with Microsoft Defender for Endpoint, SentinelOne, Sophos Intercept X, Fortinet FortiEDR and Comodo Advanced Endpoint Protection. See our Trellix Endpoint Security vs. Webroot Business Endpoint Protection report.
See our list of best Endpoint Protection for Business (EPP) vendors.
We monitor all Endpoint Protection for Business (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.