Try our new research platform with insights from 80,000+ expert users

WatchGuard EPDR Valuable Features

NJ
Section Head, Information Technology at a transportation company with 201-500 employees

What is really great about Panda Adaptive Defense 360 is its console in the cloud, and it can keep the inventory of software in the PC. We collect the inventory, software inventory, and collect what we install in the computer. It can track what software is in the computer.

I use this function the same as with other antivirus. This function helps to detect what software is installed in the computer.

Monitoring in Panda Adaptive Defense 360 is good; if anything suspicious occurs, they will send an email to the administrator.

Automation is present in Panda Adaptive Defense 360.

View full review »
VM
Solution Architect at Simvicitsolutions

First of all, the product itself is very hardy. I can put tons of load on it. Whether it is a small box or a high-end box, the small box will not give up in any case. It will function until its RAM or CPU are fully utilized. In terms of hardware, I would say WatchGuard is one of the best compared to Sophos and FortiGate, among all the firewalls. 

I have not used much of Palo Alto and Check Point, so I can't say much about them. However, leaving out Palo Alto and Check Point, compared to all other devices, WatchGuard is the leader from my perspective. Ransomware is one of its handled threats. 

Application-based configurations work excellently. The cloud of WatchGuard lets me see all my devices, updating me to minute levels with detailed information, such as patch status and vulnerabilities. This functionality is among my favorites in endpoint protection and Doctor.

View full review »
SW
IT Manager at Redeemer Baptist School

What I appreciate the most about WatchGuard EPDR is that with the managed detection and response system, when there is an alert about the product running, the turnaround time for enabling it is less than two hours.

Real-time insights powered by advanced machine learning are helpful to me.

Being a managed detection and response system, the distinctive telemetry feature works effectively. The threat assessment operates 24/7, with people working in the background on any alerts from our endpoints. They might be using AI because their turnaround time is impressive. For example, we recently updated a piece of CAD software on one of our CAD machines. During the process of running it after the update, the computer, which was a couple of versions behind the hotfix update, sparked concerns for the WatchGuard endpoint which blocked programs. Over the space of 25 minutes, as I sat there, I watched those blocked components become allowable by a pop-up window in the bottom right of the computer I was working on. All I had to do was open it and close it until I saw that it was functioning correctly and I was getting no more alerts. That process took less than 25 minutes.

View full review »
Buyer's Guide
WatchGuard EPDR
August 2025
Learn what your peers think about WatchGuard EPDR. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
867,370 professionals have used our research since 2012.
reviewer2649315 - PeerSpot reviewer
Works

The EDR has a high accuracy rate with only a few false positives. I have never had an incident since using the product. 

Additionally, I can book events, use data control and full encryption, and access advanced reporting tools. It effectively monitors everything, reducing the need for extensive security staff. It prevents issues with Trojans and encryption Trojans, providing efficiency in network oversight.

View full review »
reviewer2562924 - PeerSpot reviewer
IT System Support Administrator at a non-profit with 501-1,000 employees

The detection capabilities for malicious activities are effective.

View full review »
PaolaLamura - PeerSpot reviewer
SOC & Incident Manager at Retelit

The most valuable features of the solution stem from the fact that I like the tool's UI, ease of management, ease of making reports, and the ability to export information easily.

View full review »
Phillip Evely - PeerSpot reviewer
Network Administrator at Cape Breton Regional Municipality

The AI monitors what is normal behavior for a person while they're using an endpoint. I get an alert if an application does something other than what is considered ordinary. For instance, if someone hasn’t been using their computer for the last two months and hasn't uploaded anything to OneDrive and suddenly uploads 5 GB of data to OneDrive, I get an alert. The reporting feature is valuable. The integration with the firewall is useful.

View full review »
Isaac Shemaria - PeerSpot reviewer
Co-Founder at OptiSec Zero Trust Security

The product's most valuable features are the zero-trust application service and its capability to detect threats and attacks.

View full review »
CarlosArdila - PeerSpot reviewer
Project Manager, Information Technology at Telelago

The way it quickly applies configurations to our endpoints is genuinely amazing. For example, if we have a web filter configured and need access to a site that the filter is blocking, a customer calls us, and we can add it. Within five seconds, everybody has a connection to it. Also, the intrusion information, such as the Mitra Tech database, helps us measure the attack surface, pinpoint where the attack is happening, or identify the stage of intrusion within the network or device. It's beneficial. For instance, we could monitor lateral movements of intrusions inside a customer's network. Just about a month ago, we had a case where a customer with 80 devices detected that a kiosk had malware installed. They were using it as a satellite device within the network. We were able to identify and neutralize the threat promptly.

View full review »
Juan Ramón López Ruiz - PeerSpot reviewer
IT Managing Partner at Estrategia y Tecnologia Tho

The solution provides protection, including ransomware and mail protection. It can recognize and mitigate a wide array of spam and phishing attempts. The software is adept at distinguishing legitimate emails from malicious ones, ensuring that users receive genuine communications while being protected. Additionally, it is lightweight and unobtrusive to users, providing adequate protection without impacting system performance. While advancements such as cheaper data processors may enhance its capabilities, maintaining its agility and transparency remains paramount.

View full review »
reviewer1196313 - PeerSpot reviewer
IT Security & Data Protection Manager at a healthcare company with 201-500 employees

The most valuable feature of Panda Security Adaptive Defense is we don't have to have dedicated infrastructure on-premise because it is cloud-based.

View full review »
reviewer1673310 - PeerSpot reviewer
Technical Analyst - Desktop at a manufacturing company with 501-1,000 employees

It prevents our users from circumventing security. Everything is password protected so they can't get into it. They can't uninstall it. They can't do anything. 

View full review »
SB
CTO at Gandalf

Adaptive Defense is pretty easy to use, and Panda support is excellent. 

View full review »
Amjad Edris - PeerSpot reviewer
Technical Support Engineer at Netco Security Solutions

Panda is a very good and important antivirus. It allows us to stop activation windows. Users can't activate anything as Panda will crack down on it. 

It's very easy to set up.

The solution has been quite stable. 

View full review »
Christoph Schmalisch - PeerSpot reviewer
IT Datenbankprogrammierer at Schmalisch IT & Cloud Lösungen

It is a very progressive and innovative software that does a good job of protecting the end user. 

It is easy to manage.

The product has very good protection.

We've never had an issue with it, however, if we do run into issues, they have a good hotline. We can talk directly to them.

It is stable.

The solution can scale.

View full review »
SA
Founder & CEO at Technomatters

What I like about it is the cloud console. It offers centralized management, and users can push the agents through one management machine. Other products require you to pay to have a separate premium for managing the endpoints with a central console, or it is a standalone product. With this one in the cloud, the cloud-based console comes as part of the suite.

They have different packages. At the moment, we have an implementation for Endpoint Protection and Systems Management.

The remote control we achieve is the most useful aspect. In the systems management component, which is a separate license, there's this remote control feature, and you have something called privacy mode, where you can remote to a certain user system. The user can approve it or reject the request, and every action is audited. 

It offers an easy initial setup. 

The solution is stable. 

We can scale the solution.

The pricing is decent. 

View full review »
JL
Business Development at Lisa Communications Limited

I like the Panda Security Adaptive Defense cloud usages. Everything is on a single plane of glass like the dashboards. I also like the information I can get about the computers itself.

Our customers like the solution. 

View full review »
reviewer1864449 - PeerSpot reviewer
Information Technology Support Specialist at a financial services firm with 51-200 employees

The most valuable features of Panda Security Adaptive Defense are the useful hardware information it provides, light on resources, controllable from the console, remote scan functionality, and the blocking of a lot of URL malware.

View full review »
Minos Pitsillides - PeerSpot reviewer
IT Director at IT-Flow ltd

They have great technical support staff. 

View full review »
FH
IT-Leiter at Spiekermann GmbH

If ever something goes wrong, we get information from the panel or from tech on your PC. It alerts us to call support.

The system is automatically cleaned.

The product so far has been good at protecting us. We haven't faced a breach.

The initial setup is pretty straightforward. It's something that any company should be able to handle with ease.

View full review »
Kevin Mabry - PeerSpot reviewer
CEO at Sentree Systems, Corp.

Overall, I find the entire solution valuable.

Their remote management (RMM) is very good.

I use a portion of their advanced protection tool. It's great for monitoring and taking a deeper look at various scenarios.

I love the function of it and what it does. I love the graphics, the view. The actual dashboard is good. It has a lot of information. It's very useful.

View full review »
RR
IT Infrastructure at 4 Seniors Brasil

WatchGuard EPDR improves organization primarily by supporting the IT team rather than the end users directly. It helps IT teams accomplish more with fewer people. One of its standout features is the patch management solution, which allows companies without up-to-date services like WSUS to manage patches for Windows and Linux systems. Additionally, it provides the usual endpoint protection features such as virus and malware protection, application control, and website control.

The tool's most valuable feature is patch management. Patch management is particularly valuable because few other companies, like Trend Micro and Kaspersky, offer integrated patch management solutions within their endpoint protection products.

View full review »
Mauro Ferreira - PeerSpot reviewer
Director of Information Technology at MFAL LDA

The most valuable feature of the solution is its device control.

View full review »
Carlos Coris - PeerSpot reviewer
Network and System Technician at MFAL LDA

Firstly, we can manage it on the cloud. Secondly, we have control over our devices, specifically USB ports, allowing us to block or control the traffic. In cases where clients cannot afford a Firebox, they can use Panda Security as a cost-effective solution to protect their devices. It enables widespread usage.

View full review »
reviewer1864449 - PeerSpot reviewer
Information Technology Support Specialist at a financial services firm with 51-200 employees

The solution makes it easy to unblock software. 

I like the way they show inventory and the serial number of devices. 

The initial setup is very straightforward.

It is stable, and the performance is good.

It is scalable.

The cost is not too high. 

View full review »
Katyan Roach - PeerSpot reviewer
Network Administrator at a government with 51-200 employees

The dashboard management feature is valuable.

View full review »
reviewer913587 - PeerSpot reviewer
Director at a tech services company with 11-50 employees

It's quite easy to manage, which is a good thing. I've found it's got excellent web protection. It just adds a little bit more to the product, including antivirus, application, and white-listing, which is good.

It seems to be faring quite well.

It's pretty simple to set up.

So far, the solution has been stable enough. It does the job. 

The product can scale. 

It's got a pretty full feature set.

View full review »
reviewer1488816 - PeerSpot reviewer
Senior IT Administrator for Global Group at a manufacturing company with 501-1,000 employees

The protection from malware is the most important feature. It has some endpoint information about the vehicle of the virus, malware, etc. It is also stable and easy to install, and they also provide good technical support.

View full review »
reviewer956412 - PeerSpot reviewer
Competitive Engineer at a tech vendor with 1,001-5,000 employees

It's very easy to deploy, we don't have any problem or issues with it. It's almost full automatic. It basically makes the assumption that everything is supposed to be suspicious; files, processes, URL accesses, and so on. Everything is checked once in the cloud and it's assessed as malware or safe. You're free to use it. It's simple enough to be used by a non-specialist, by regular users. You don't need a large security team to manage it. 

View full review »
RR
Cloud Solutions Architect at a tech services company with 1-10 employees

The most valuable feature is the web filter application control.

This solution is very easy to implement.

The granularity of security is very good because we can create different groups that are categorized, for example, by the department. There are policies in place to assist with this.

The reports are good and help us to better manage our system.

View full review »
it_user1317609 - PeerSpot reviewer
Managing Director (BsC Computer Science) at Bontle ICT Solutions

This solution has different modules.

The most valuable module is antivirus, which has a whitelist mode that will block everything other than approved transactions. This gives us the ability to define different profiles in terms of the level of protection.

The patch management module is very important.

The systems management module, which can be used for asset inventory and for remote support, is very good.

This solution can scan the entire network and discover all of the systems where it is not installed.

View full review »
SJ
System Engineer at a tech services company with 11-50 employees

In essence, Panda Security is a lot like every other antivirus product. It has protection from zero-day exploits which is the most important feature out of any of the solutions. It is similar to zero-day malware or ransomware protection in that it can protect you from anything that you need protection from that is yet unknown. 

Panda Security has a feature to block any unknown process and that is what is best about it.  

Another valuable feature is the ease-of-use. We have one big client — big for our country — that has 250 licenses. I think they are very satisfied with Panda Security because it is quite simple to use. Users just want to have something that is more easy-to-use and that is it. They don't care a lot about everything else.  

View full review »
FH
Consultant at DNS a.s.

The feature I find most valuable is the advanced search engine. It is really easy to drill down by the logs to search for any connection from any user station. It allows us to easily figure out if any station is, for instance, connecting to Russia, China, Korea or any other place. So one can easily drill down and get a good overview of which applications you are using that are connecting a player to the next local operation center. It is then very easy for the security operation center to figure out if they are under any threats. 

View full review »
it_user388242 - PeerSpot reviewer
ICT Manager at a engineering company with 51-200 employees
  • Ease of setup and deployment
  • Support readily available
View full review »
Buyer's Guide
WatchGuard EPDR
August 2025
Learn what your peers think about WatchGuard EPDR. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
867,370 professionals have used our research since 2012.