Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
​Pricing can be more expensive than similar software that does less functionality, but not recognized by customers.​
The costs of 50 licenses of AMP for three years is around $9,360.
​Pricing can be more expensive than similar software that does less functionality, but not recognized by customers.​
The costs of 50 licenses of AMP for three years is around $9,360.
Digital Guardian is proud to be part of Fortra’s comprehensive cybersecurity portfolio, and one of the Data Protection family of products. Fortra simplifies today’s complex cybersecurity landscape by bringing complementary products together to solve problems in innovative ways. These integrated, scalable solutions address the fast-changing challenges you face in safeguarding your organization. With the help of the powerful protection from Digital Guardian and others, Fortra is your relentless ally, here for you every step of the way throughout your cybersecurity journey.
The cost was around $300,000.
The price of Digital Guardian is expensive.
The cost was around $300,000.
The price of Digital Guardian is expensive.
HP Wolf Security is a comprehensive cybersecurity solution that bolsters your organization's cyber-resilience on multiple fronts. With its full-stack security approach, it ensures layered protection from hardware to the cloud, providing a robust defense against cyber threats. HP Wolf Security introduces endpoint isolation, a cutting-edge feature that effectively halts threats that may go unnoticed by Next-Generation Antivirus (NGAV) and Endpoint Detection and Response (EDR) systems. Moreover, it extends its security coverage to printers, equipping them with advanced detection and self-healing capabilities to further safeguard your digital ecosystem. This integrated solution streamlines IT and security risk management, resulting in fewer alerts and false positives, and reduces the time and effort required for endpoint incident analysis and remediation. Notably, HP Wolf Security prioritizes productivity, allowing you to manage risk without disrupting the user experience, enabling worry-free work from anywhere, and offering rapid IT disaster recovery at scale.Â
Pricing is reasonable.
The pricing is very fair compared to the competition. The licensing is straightforward.
Pricing is reasonable.
The pricing is very fair compared to the competition. The licensing is straightforward.
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. CyberArk Identity users have expressed satisfaction with various aspects, highlighting its quality, functionality, and value for money. They appreciate its user-friendly interface and the convenience it offers. Overall, the user reviews indicate a positive experience with the product or service.
We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market.
There is an initial license and then there is a subscription needed.
We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market.
There is an initial license and then there is a subscription needed.
Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and often internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority. McAfee Complete Data Protection Suites address all of these concerns and many more.
The price of this solution needs to be improved.
The price is good, it's a low-cost solution.
The price of this solution needs to be improved.
The price is good, it's a low-cost solution.
It can be expensive. However, if you plan to scale or are at a large enterprise company, this product could be what you need.
The licensing costs yearly are $5000.
It can be expensive. However, if you plan to scale or are at a large enterprise company, this product could be what you need.
The licensing costs yearly are $5000.
Sophos Mobile is a Unified Endpoint Management (UEM) and security solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile supports managementof Windows 10, macOS, iOS, and Android devices.
The licensing is paid on a yearly basis.
Sophos Mobile is inexpensive.
The licensing is paid on a yearly basis.
Sophos Mobile is inexpensive.
Based on user reviews, Microsoft BitLocker is preferred over ESET Endpoint Encryption due to its seamless integration with Windows operating systems, user-friendly interface, and robust encryption capabilities. Users appreciate the peace of mind provided by BitLocker's encryption and its ability to protect sensitive data from unauthorized access. Additionally, Microsoft BitLocker's customer service and support have been praised for their helpfulness and responsiveness. While ESET Endpoint Encryption also received positive feedback, Microsoft BitLocker's integration and ease of use make it the preferred choice.
Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness.
You have to pay for the license annually.
One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness.
You have to pay for the license annually.
The pricing seems expensive both for the license and the support.
The price is high for this type of product.
The pricing seems expensive both for the license and the support.
The price is high for this type of product.
We have a yearly license with Sophos which is around $1000-$1200 or so per annum. There are no additional costs beyond the standard licensing fee.
Licensing for this solution is on a yearly basis.
We have a yearly license with Sophos which is around $1000-$1200 or so per annum. There are no additional costs beyond the standard licensing fee.
Licensing for this solution is on a yearly basis.
Oracle Advanced Security provides data encryption and strong authentication services to the Oracle database, safeguarding sensitive data against unauthorized access from the network and the operating system. It also protects against theft, loss, and improper decommissioning of storage media and database backups.
Across industries-from compliance mandates such as PCI and GDPR to new IT initiatives such as data analytics and cloud migration-businesses rely on Voltage SecureData to secure their information at its core while at rest, in motion, and in use for comprehensive protection without gaps.
I found some of their licensing is a bit complex. I am also finding that some of their cloud solutions are quite expensive.
I found some of their licensing is a bit complex. I am also finding that some of their cloud solutions are quite expensive.
Licensing and pricing is on par with the market.
Licensing and pricing is on par with the market.
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Learn more about Full disk encryption.
Very cheap in cost
We have a license that we renew yearly.
Very cheap in cost
We have a license that we renew yearly.
Boxcryptor is file-encryption software designed and created specifically for cloud use, with support for all major cloud-storage providers, as well as any cloud-storage provider that follows the Web Distributed Authoring and Versioning (WebDAV) standard. With the increasing number of security threats, data and identity privacy are becoming more critical. Whether for personal or professional use, Boxcryptor has a solution. After installing Boxcryptor, the user has the ability to encrypt, decrypt, share, and add and remove files from cloud storage directly through his/her personal computer (PC) or device, simplifying all file-management tasks. End users are able to protect files by encrypting them locally before those files are posted to a cloud-storage provider, ensuring file security and file-data privacy throughout the process.
Nearly every company in the world incorporates a Mac endpoint into the organization. Without a device control solution to manage these stations we see a real possibility for data leakage risk. This loss happens mainly because of insider threats:
A unified data security platform powered by confidential computing that delivers a wide-range of data security services, including encryption, multi-cloud key management, tokenization, TDE and multiple other capabilities— from one single console.