Microsoft Defender for Endpoint is a comprehensive security solution that provides advanced threat protection for organizations. It offers real-time protection against various types of cyber threats, including malware, viruses, ransomware, and phishing attacks.
The product is free of charge and comes integrated into Windows.
The solution is free.
The product is free of charge and comes integrated into Windows.
The solution is free.
CrowdStrike Falcon is a comprehensive endpoint protection solution that offers threat detection, incident response, and threat intelligence capabilities. Users praise its effectiveness in defending against malware and ransomware attacks, stopping advanced threats in real-time, and providing actionable insights through threat intelligence. The platform's valuable features include advanced threat detection, real-time visibility into endpoint activities, easy-to-use interface, responsive customer support, detailed incident response options, customizable alerting settings, machine learning algorithms for proactive threat hunting, and seamless integration with other security tools. Users also note that CrowdStrike Falcon has greatly improved workflow efficiency, collaboration, and productivity within organizations.
I do not have experience with the cost or licensing of the product.
The pricing will depend upon your volume of usage.
I do not have experience with the cost or licensing of the product.
The pricing will depend upon your volume of usage.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Pricing can be more expensive than similar software that does less functionality, but not recognized by customers.
The costs of 50 licenses of AMP for three years is around $9,360.
Pricing can be more expensive than similar software that does less functionality, but not recognized by customers.
The costs of 50 licenses of AMP for three years is around $9,360.
SentinelOne is a leading comprehensive enterprise-level autonomous security solution that is very popular in today’s marketplace. SentinelOne will ensure that today’s aggressive dynamic enterprises are able to defend themselves more rapidly, at any scale, and with improved precision, by providing comprehensive, thorough security across the entire organizational threat surface.
The price is competitive, if you compare it with other solutions on the market.
The price for it is very competitive compared to other Next Gen EPP.
The price is competitive, if you compare it with other solutions on the market.
The price for it is very competitive compared to other Next Gen EPP.
Zabbix is a comprehensive monitoring solution that is widely used across various industries. Its primary use case is for monitoring infrastructure, including physical, virtual, and network aspects.
Zabbix helps organizations by providing valuable metrics for preventive maintenance and capacity planning, proactive monitoring and alerting, monitoring a wide range of hardware equipment, optimizing work processes, improving customer experiences, enabling remote appointments with visual communication, and providing an overview of bandwidth consumption.
With Zabbix, organizations can conveniently monitor network metrics in one place, saving time and improving efficiency.
It’s free of cost.
It is a true open-source solution, so there are no licensing costs.
It’s free of cost.
It is a true open-source solution, so there are no licensing costs.
Fortinet FortiEDR is a real-time endpoint protection, detection, and automated response solution. Its primary purpose is to detect advanced threats to stop breaches and ransomware damage. It is designed to do so in real time, even on an already compromised device, allowing you to respond and remediate incidents automatically so your data can remain protected.
I know it is tough to get big budget additions up front, but I highly recommend deploying environment wide and adding the forensic service.
There are no issues with the pricing.
I know it is tough to get big budget additions up front, but I highly recommend deploying environment wide and adding the forensic service.
There are no issues with the pricing.
Darktrace is a leading cybersecurity solution that leverages artificial intelligence and machine learning to provide advanced threat detection, response, and risk management capabilities. Many reviewers find Darktrace's AI and machine-learning capabilities to be valuable. They appreciate its ability to detect anomalies and threats that might go unnoticed by traditional security tools. Overall, the general sentiment towards Darktrace from reviewers is positive. Users seem to appreciate its scalability, stability, AI capabilities, visibility, and ease of use.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
Tanium and Wiz deliver significant value in terms of ROI and security measures, with Tanium excelling in quick issue identification and remediation while Wiz stands out for data security and exposure prevention. Tanium offers robust reporting and analytics, and streamlined management of endpoints, while Wiz focuses on actionable insights. Tanium users praise its customer support and integration capabilities, while Wiz users appreciate its smooth installation process.
The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing.
I wish the pricing was more transparent.
The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing.
I wish the pricing was more transparent.
FortiClient is a fabric agent that delivers endpoint protection, endpoint compliance, and secure access in a single, lightweight, lightweight client, providing visibility, information, and control to your endpoints. In addition, it enables secure, remote connectivity to the security fabric. It also integrates network and endpoint with segmentation and automation. FortiClient enables unified endpoint awareness by sharing endpoint telemetry with the security fabric. It is compatible with third-party EDR (endpoint detection and response and anti-malware solutions.
Licensing was free up to ten users and after that, it was pretty reasonable.
Anyone can download this product for free, but you have to have a FortiGate gateway that you are connecting to.
Licensing was free up to ten users and after that, it was pretty reasonable.
Anyone can download this product for free, but you have to have a FortiGate gateway that you are connecting to.
Cortex XDR by Palo Alto Networks is the first threat detection and response software to combine both visibility across all types of data as well as autonomous machine learning analytics. Threat detection very often requires analysts to divide their attention among many different data streams. This platform unifies a vast variety of data flows, which allows analysts to assess threats from a single location. Users can now maintain a level of visibility that other threat detection programs simply cannot offer. This level of transparency lends itself to both quick identification of problems that arise and the equally quick development of a potential solution.
I feel it is fairly priced.
The pricing seems fair, and I do like the licensing model. You use wherever they are, and it is elastic.
I feel it is fairly priced.
The pricing seems fair, and I do like the licensing model. You use wherever they are, and it is elastic.
Microsoft Configuration Manager helps IT manage PCs and servers, keeping software up-to-date, setting configuration and security policies, and monitoring system status while giving employees access to corporate applications on the devices that they choose. When Configuration Manager is integrated with Microsoft Intune, you can manage corporate-connected PCs and Macs along with cloud-based mobile devices running Windows, iOS, and Android, all from a single management console.
Overall, I think it's fine. It's pretty much in-line because there are ways to offset it with the Office 365 licensing.
The licensing is good because they have various options, depending on what you are looking for.
Overall, I think it's fine. It's pretty much in-line because there are ways to offset it with the Office 365 licensing.
The licensing is good because they have various options, depending on what you are looking for.
Sophos Intercept X Endpoint is a comprehensive cybersecurity solution that combines the power of artificial intelligence (AI) with Sophos' deep expertise in cybersecurity to provide unmatched protection against sophisticated cyber threats, including ransomware, malware, exploits, and zero-day vulnerabilities. Sophos Intercept X Endpoint stands out for its innovative approach to endpoint security, leveraging advanced technologies and expert services to provide comprehensive protection. Its focus on prevention, detection, and response, combined with ease of use and scalability, makes it a preferred choice for organizations looking to strengthen their cybersecurity defenses.
We renew the license for one year at $10,000.
The price is pretty good.
We renew the license for one year at $10,000.
The price is pretty good.
Elastic Security combines the features of a security information and event management (SIEM) system with endpoint protection, allowing organizations to detect, investigate, and respond to threats in real time. This unified approach helps reduce complexity and improve the efficiency of security operations.
We are using the free, open-source version of this solution.
We use the open-source version, so there is no charge for this solution.
We are using the free, open-source version of this solution.
We use the open-source version, so there is no charge for this solution.
Vulnerability Management, Detection, and Response (VMDR) is a cornerstone product of the Qualys TruRisk Platform and a global leader in the enterprise-grade vulnerability management (VM) vendor space. With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure their actual risk exposure over time.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Tenable Nessus is a vulnerability management solution that aims to empower organizations to be aware of threats that both they and their customers face. It is the most deployed scanner in the vulnerability management industry. Organizations that use this product have access to the largest continuously updated global library of vulnerability and configuration checks. They can stay ahead of threats that Tenable Nessus’s competitors may be unable to spot. Additionally, Tenable Nessus supports a greater number of technologies than its competitors.
The pricing is much more manageable versus other products.
The price of Tenable Nessus is much more competitive versus other solutions on the market.
The pricing is much more manageable versus other products.
The price of Tenable Nessus is much more competitive versus other solutions on the market.
Symantec Endpoint Security is a robust and reliable product that provides complete protection against viruses, malware, Trojans, and malicious files. It offers application and device control, ease of use in deploying and updating, a central control console, stability, scalability, auto-discovery capabilities, patch management, endpoint detection and response capabilities, intrusion detection module.
I’d say SEP deserves the money.
Regarding the licensing, it was important negotiate a long contract to get a more attractive price, including advanced support in case of crisis.
I’d say SEP deserves the money.
Regarding the licensing, it was important negotiate a long contract to get a more attractive price, including advanced support in case of crisis.
Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize your most critical assets and vulnerabilities.
It is slightly more expensive than other solutions in the same sphere.
The licensing costs for this solution are approximately $100,000 US, and I think that covers everything.
It is slightly more expensive than other solutions in the same sphere.
The licensing costs for this solution are approximately $100,000 US, and I think that covers everything.
Powered by the Trend Micro™ Smart Protection Network™, Trend Micro Apex One™ is a highly-regarded, popular, locally-managed anti-malware solution that keeps endpoints secure from a diverse assortment of internet threats. Trend Micro Apex One™ is an integrated solution consisting of the Security Agent that resides at the endpoint and the Apex One server that manages all Security Agents.
Pricing and licensing are competitive with other solutions on the market.
On a yearly basis, it's about $50,000. There are no costs in addition to the standard licensing fees.
Pricing and licensing are competitive with other solutions on the market.
On a yearly basis, it's about $50,000. There are no costs in addition to the standard licensing fees.
VMware Carbon Black Endpoint Security is a comprehensive endpoint protection platform (EPP) designed to safeguard enterprises from advanced cyber threats, malware, ransomware, and other forms of malicious attacks. Leveraging cloud-native architecture, it provides a robust set of tools to detect, prevent, investigate, and respond to cybersecurity incidents across environment. The solution stands out for its advanced behavioral analytics, real-time threat hunting, and customizable policies, making it a preferred choice for businesses seeking to fortify their defenses in the evolving cybersecurity landscape.
The cost/benefit factor has great relevance in Cb Defense implementations.
I am not really involved in the pricing of this product. But, from my understanding, it is OK for us.
The cost/benefit factor has great relevance in Cb Defense implementations.
I am not really involved in the pricing of this product. But, from my understanding, it is OK for us.
Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.
The initial price is very good as they give good initial discounts, but it seems a little expensive once you renew the license.
Pricing is fair.
The initial price is very good as they give good initial discounts, but it seems a little expensive once you renew the license.
Pricing is fair.
Managed in the cloud and powered by Tenable Nessus, Tenable Vulnerability Management (formerly Tenable.io) provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your organization. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and proactively prioritize remediations.
There are additional features that can be licensed for an additional cost.
The solution is not too expensive.
There are additional features that can be licensed for an additional cost.
The solution is not too expensive.
Kaspersky Endpoint Security for Business is a cybersecurity solution that is designed to protect small and large business networks and devices from all types of cyber security threats by implementing machine learning algorithms for real-time threat detection and response. The solution offers antivirus protection, firewall, network attack protection, web control, device control, data encryption, reporting tools, and more. Kaspersky integrates with a wide variety of external systems and platforms and is easy to customize to meet your organization’s specific security needs.
Pricing is very competitive and licensing is very much ethical.
The licensing is based per agent. You can get discounts if you have more agents.
Pricing is very competitive and licensing is very much ethical.
The licensing is based per agent. You can get discounts if you have more agents.
ESET Endpoint Protection Platform (EPP) is a cybersecurity solution designed to protect businesses of all sizes against a wide array of cyber threats. Its advanced technologies and user-friendly interface provide robust security for endpoint devices, such as desktops, laptops, and mobile devices, without compromising performance. ESET's approach combines multiple layers of protection, including traditional signature-based detection with advanced heuristic analysis, behavioral monitoring, and machine learning, to effectively counter both known and emerging threats.
Pricing per month, for security services as apps in CEE pricing: up to €2 monthly is OK.
ESET is perfect, if you can afford it.
Pricing per month, for security services as apps in CEE pricing: up to €2 monthly is OK.
ESET is perfect, if you can afford it.
Rapid7 InsightVM is a comprehensive vulnerability management platform that protects your systems from attackers and is easy to scale. The solution provides easy access to vulnerability management, application security, detection and response, external threat intelligence, orchestration and automation, and more. Rapid7 InsightVM is ideal for security, IT, and DevOps teams, helping them reduce risk by enabling them to detect and respond to attacks quickly.
The price of the solution is less than the competitors.
I do not have experience with the pricing of the solution.
The price of the solution is less than the competitors.
I do not have experience with the pricing of the solution.
HCL BigFix is a powerful patch management tool that enables organizations to simply control their patch management operations. It is designed so that IT security and operations teams can collaborate in the most effective way possible. Users that employ BigFix can find and fix issues with their endpoints faster than those that employ its competitors. It comes with thousands of security checks that can be deployed quickly and easily. These enable users to safeguard themselves from a wide variety of digital threats.
When purchasing, buying with other IBM tools provided us with a very good discount in pricing.
I can estimate the reduced cost of servers maintenance to approximatively $500,000.
When purchasing, buying with other IBM tools provided us with a very good discount in pricing.
I can estimate the reduced cost of servers maintenance to approximatively $500,000.
Nagios XI provides monitoring of all mission-critical infrastructure components, including applications, services, operating systems, network protocols, systems metrics, and network infrastructure. Third-party add-ons provide tools for monitoring virtually all in-house and external applications, services, and systems.
You can grow into the higher-priced scale as they learn how to utilize the features for Nagios XI.
The pricing is really cost efficient. The licensing is perpetual and can be renewed very easily.
You can grow into the higher-priced scale as they learn how to utilize the features for Nagios XI.
The pricing is really cost efficient. The licensing is perpetual and can be renewed very easily.
Trellix Endpoint Security (ENS) is a comprehensive solution designed to protect organizations from advanced cyber threats. With its advanced threat detection capabilities, ENS provides real-time visibility into endpoint activities, enabling proactive threat hunting and response.
The pricing is mid-ranged and quite reasonable compared to other similar products.
Licensing fees are billed on a yearly basis.
The pricing is mid-ranged and quite reasonable compared to other similar products.
Licensing fees are billed on a yearly basis.
Check Point Harmony Endpoint is a robust security solution that enables users to use a single piece of software to accomplish tasks that often require the use of multiple pieces of software. It prevents impending threats from doing harm while at the same time enabling users to identify and deal with any harm that results from breaches.
In addition to the standard licensing fees, there is a cost for support.
We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it.
In addition to the standard licensing fees, there is a cost for support.
We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it.
Palo Alto Networks delivers a complete solution that helps Tier-1 through Tier-3 analysts and SOC managers to optimize the entire incident life cycle while auto documenting and journaling all the evidence. More than 100+ integrations enable security orchestration workflows for incident management and other critical security operation tasks.
There is a perception that it is priced very high compared to other solutions.
From the cost perspective, I have heard that its price is a bit high as compared to other similar products.
There is a perception that it is priced very high compared to other solutions.
From the cost perspective, I have heard that its price is a bit high as compared to other similar products.
Trend Vision One is a cloud-native security operations platform, serving cloud, hybrid, and on-premises environments. It combines ASM and XDR in a single console to effectively manage cyber risk across your organization. The platform provides powerful risk insights, earlier threat detection, and automated risk and threat response options. Utilize the platform’s predictive machine learning and advanced security analytics for a broader perspective and advanced context. Trend Vision One integrates with its own expansive protection platform portfolio and industry-leading global threat intelligence, in addition to a broad ecosystem of purpose-built and API-driven third-party integrations.
It would be nice if it was a little bit cheaper, but I think it has a fair price. It is comparable to others in the market.
The price is reasonable. It's not exorbitant. CrowdStrike and other players are on the higher side.
It would be nice if it was a little bit cheaper, but I think it has a fair price. It is comparable to others in the market.
The price is reasonable. It's not exorbitant. CrowdStrike and other players are on the higher side.
Bitdefender GravityZone Ultra is an endpoint security solution that offers protection against even the most elusive cyber threats. The solution provides a full range of security capabilities, including threat detection, pre- and post- compromise visibility, alert triage, automatic response, advanced search, investigation, and more. It is designed with a single agent/single consoler architecture, is cloud-native, and also supports on-premises deployments.
The price is per license per endpoint. The price is different for everyone, but we find the price is cheap for us.
Licensing is done on a yearly basis and it's workstation-based.
The price is per license per endpoint. The price is different for everyone, but we find the price is cheap for us.
Licensing is done on a yearly basis and it's workstation-based.
Cynet has pioneered the security industry’s first all-in-one security platform purposely built for organizations that need the ability to effortlessly identify, block and respond to all types of attacks inside the perimeter - defending endpoints, network, files and users - without the heavy burden of deep cyber expertise and the overhead of integrating and managing multiple products. Our approach converges and brings synergy with technology: endpoint protection, EDR, vulnerability management, deception, threat intelligence and network and end-user analytics, and expertise: a 24/7 cyber SWAT team for incident response, malware analysis, threat hunting and forensics. Cynet deploys in hours and simplifies management with automated monitoring to complement any sized staff.
It gives you a high level of protection at a very good price.
Everything is included in this one solution and the pricing is pretty competitive.
It gives you a high level of protection at a very good price.
Everything is included in this one solution and the pricing is pretty competitive.
Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.
I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.
The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.
I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.
The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.
Cybereason's Endpoint Detection and Response platform detects in real-time both signature and non-signature-based attacks and accelerates incident investigation and response. Cybereason connects together individual pieces of evidence to form a complete picture of a malicious operation.
I do not have experience with the licensing of the product.
In terms of cost, this is a good choice for our needs.
I do not have experience with the licensing of the product.
In terms of cost, this is a good choice for our needs.
Blackberry Protect is a next generation artificial intelligence (AI) based endpoint protection platform (EPP) that prevents breaches and provides added controls for safeguarding against sophisticated cyberthreats. It uses predictive analysis to quickly and accurately find even the most advanced threats before they ever take place. Blackberry Protect’s cloud-based supercomputer mines hundreds of millions of files from all over the cloud, allowing it to predict and stop any hacker dead in their tracks.
Review closely how many endpoints you actually need before buying into a pricing level. Deal and deal with the VAR of your choice.
Our licensing cost for the solution is around $4,000 for six months. There are no costs in addition to the standard licensing fees.
Review closely how many endpoints you actually need before buying into a pricing level. Deal and deal with the VAR of your choice.
Our licensing cost for the solution is around $4,000 for six months. There are no costs in addition to the standard licensing fees.
SolarWinds Server & Application Monitor (SAM) delivers powerful application and server monitoring capabilities for IT pros, enabling them to diagnose and troubleshoot performance issues faster. Do not let slow applications and downtime impact your end-users and business services. Pinpoint the root cause of application issues across various layers of the IT stack. SolarWinds SAM is affordable and easy to deploy, use, and customize. You can automatically discover your system's environment and start monitoring in about an hour. No professional services or consultation needed.
Pricing and licensing is fair for what you get. It does have a great bang-for-the-buck appeal.
The product might cost you $30,000 USD to buy, but scaling this solution requires the purchase of additional polling engines at $20,000 USD each.
Pricing and licensing is fair for what you get. It does have a great bang-for-the-buck appeal.
The product might cost you $30,000 USD to buy, but scaling this solution requires the purchase of additional polling engines at $20,000 USD each.
Oracle Enterprise Manager is an on-premises management platform that provides a comprehensive integrated solution for managing and automating your various Oracle products, including applications, databases, middleware, hardware, and engineered systems located either in your Oracle data center or in the cloud.
Based upon 3 days of implementation by a single person, plus licensing costs would be approximately $60,000, including the virtualized hosts.
It is part of Real Application Testing, so no new investment is necessary for clients who already are already using RAT.
Based upon 3 days of implementation by a single person, plus licensing costs would be approximately $60,000, including the virtualized hosts.
It is part of Real Application Testing, so no new investment is necessary for clients who already are already using RAT.
ScienceLogic is a hybrid IT infrastructure monitoring tool that is designed to help organizations digitally transform their companies by making the management of complex, distributed IT services easier. Using the solution’s discovery techniques, users can find everything they need in a network, gaining visibility across all vendors and technologies that are run in the cloud or data centers. In addition, the ScienceLogic solution can help users seamlessly monitor and manage cloud environments, monitor network resources, manage storage, and monitor app health and performance.
Pricing between the two is quiet large therefore you can save some money if you don't require to collect all info on each device.
Decide what you want to monitor and only monitor those items. Absorb other elements as you grow.
Pricing between the two is quiet large therefore you can save some money if you don't require to collect all info on each device.
Decide what you want to monitor and only monitor those items. Absorb other elements as you grow.
Hackers are constantly evolving, exploiting new vulnerabilities and dwelling in small business environments—until they meet Huntress. Discover the power of managed detection and response backed by ThreatOps.
The tool’s price is very good. You just need to pay for the standard license. However, you need to pay the additional cost for Microsoft Defender.
I rate the product's price a five or six on a scale of one to ten, where one is cheap, and ten is expensive since it is a fairly priced product.
The tool’s price is very good. You just need to pay for the standard license. However, you need to pay the additional cost for Microsoft Defender.
I rate the product's price a five or six on a scale of one to ten, where one is cheap, and ten is expensive since it is a fairly priced product.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record.
I think that it was in the range of $200,000 that had to get approved.
licensing for this solution is based on the number of APV (privileged users), and the number of sessions that you want to record.
I think that it was in the range of $200,000 that had to get approved.
Digital Guardian is proud to be part of Fortra’s comprehensive cybersecurity portfolio, and one of the Data Protection family of products. Fortra simplifies today’s complex cybersecurity landscape by bringing complementary products together to solve problems in innovative ways. These integrated, scalable solutions address the fast-changing challenges you face in safeguarding your organization. With the help of the powerful protection from Digital Guardian and others, Fortra is your relentless ally, here for you every step of the way throughout your cybersecurity journey.
The cost was around $300,000.
The price of Digital Guardian is expensive.
The cost was around $300,000.
The price of Digital Guardian is expensive.
BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.
I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions.
PowerBroker for a Mac client is three times the price of the Windows version.
I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions.
PowerBroker for a Mac client is three times the price of the Windows version.
Deep Instinct PREVENTS >99% of UNKNOWN threats like ransomware and zero-days before they land inside your environment – not after. With both an agentless and agent-based approach, we ensure file-based and fileless attacks are prevented. To achieve this, Deep Instinct is pioneering the use of deep learning AI to prevent threats in <20ms, without requiring calls to the cloud for threat intelligence. Our ability to scale to the needs of the enterprise is unprecedented as is our delivery of the industry’s lowest false positive rate of <0.1%.
If I include the false positive rate and the detection rate in the comparison, Deep Instinct is worth its price.
The pricing is a little bit expensive but we are satisfied with DI's performance.
If I include the false positive rate and the detection rate in the comparison, Deep Instinct is worth its price.
The pricing is a little bit expensive but we are satisfied with DI's performance.
ServiceNow Discovery finds applications and devices on your network, and then updates the CMDB with the information it finds. Discovery is available as a separate subscription from the rest of the Now Platform.
This solution is a paid option within the ServiceNow framework.
There is a subscription for ServiceNow Discovery. It's expensive, but I think it's one of the best solutions on the market, so it's worth it.
This solution is a paid option within the ServiceNow framework.
There is a subscription for ServiceNow Discovery. It's expensive, but I think it's one of the best solutions on the market, so it's worth it.
ConnectWise Automate is an IT management tool that helps deliver IT services at the speed of business. Our remote monitoring and management (RMM) platform provides powerful automation to discover & manage devices, monitor for problems, and automate action. Deliver streamlined reactive and proactive managed services, stop putting out fires, and start focusing on what matters most. See why over 5,500 partners worldwide chose ConnectWise Automate by visiting ConnectWise.com or calling 877-522-8323.
Pricing and licensing are reasonable.
From what I've overheard, it is pretty comparable to other solutions in terms of price.
Pricing and licensing are reasonable.
From what I've overheard, it is pretty comparable to other solutions in terms of price.
Facing growing threats and a rapidly expanding attack surface, understaffed and alert-fatigued organizations need more efficient ways to eliminate their exposure to vulnerabilities. Automox is a modern cyber hygiene platform that closes the aperture of attack by more than 80% with just half the effort of traditional solutions.
We are on the premium licensing, which is the one that has the API capability that we use.
The product is a great value.
We are on the premium licensing, which is the one that has the API capability that we use.
The product is a great value.
Traditional security solutions can’t keep up with your users. Turning to multiple point products to address the myriad of challenges only increases complexity and may leave gaps in your security. Plus, you need a flexible solution that can grow and change with you as you migrate from on-premises to the cloud. To effectively counter today’s evolving threat landscape, you need integrated security that consolidates your view across all layers of protection and all deployment models.
Trend Micro™ Smart Protection Complete is a connected suite of security capabilities that protects
your users no matter where they go or what they do. This modern security delivers the best protection at multiple layers: endpoint, application, and network, using the broadest range of threat protection techniques available. Plus, you can evolve your protection along with your business using flexible on-premises, cloud, and hybrid deployment models that fit your IT environment today and tomorrow. In addition, you can manage users across multiple threat vectors from a single “pane of glass,” giving you complete visibility of the security of your environment.
We pay for the solution on a yearly basis. We pay approximately 100 Euros a year per user. There are no additional fees above this.
This solution provides good value for the price.
We pay for the solution on a yearly basis. We pay approximately 100 Euros a year per user. There are no additional fees above this.
This solution provides good value for the price.
Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization – without the need for policies, proxies or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices.
They were the best solution and surprisingly enough, the cheapest.
It is 100% worth the cost to get and keep the support, especially when setting it up.
They were the best solution and surprisingly enough, the cheapest.
It is 100% worth the cost to get and keep the support, especially when setting it up.
Ivanti Endpoint Security for Endpoint Manager is a comprehensive security solution designed to protect endpoints and ensure the overall security of an organization's network. It combines the power of Ivanti Endpoint Manager with advanced security features to provide a robust defense against cyber threats.
With Ivanti Endpoint Security, organizations can effectively manage and secure all endpoints, including desktops, laptops, servers, and mobile devices, from a single console. This centralized management approach simplifies security operations and allows for better visibility and control over the entire endpoint environment.
One of the key features of Ivanti Endpoint Security is its advanced threat detection and prevention capabilities. It employs a multi-layered approach to identify and block known and unknown threats, including malware, ransomware, and zero-day attacks. Real-time threat intelligence and behavioral analysis help to proactively detect and mitigate potential security risks.
In addition to threat detection, Ivanti Endpoint Security offers robust endpoint protection features. It includes advanced antivirus and anti-malware capabilities, as well as web filtering and application control, to prevent unauthorized access and ensure compliance with security policies. It also provides data encryption and secure remote access to protect sensitive information and enable secure remote work.
Ivanti Endpoint Security also includes vulnerability management features to identify and remediate security vulnerabilities across endpoints. It scans for missing patches and updates, and automates the patching process to ensure endpoints are up-to-date and protected against known vulnerabilities.
Furthermore, Ivanti Endpoint Security offers comprehensive endpoint compliance and auditing capabilities. It helps organizations meet regulatory requirements by providing detailed reports and audits on endpoint security posture. It also enables organizations to enforce security policies and configurations consistently across all endpoints.
Ivanti Endpoint Security for Endpoint Manager is a powerful security solution that combines endpoint management and advanced security features to protect organizations from a wide range of cyber threats. Its centralized management approach, advanced threat detection capabilities, and comprehensive endpoint protection features make it an ideal choice for organizations looking to enhance their endpoint security posture.
On a scale of one to ten, where ten is the highest, and one is the cheapest, I rate its pricing a five.
The licensing is based on assets for MDM or EM, where you need one license per asset. The license is annual, and it is not very expensive.
On a scale of one to ten, where ten is the highest, and one is the cheapest, I rate its pricing a five.
The licensing is based on assets for MDM or EM, where you need one license per asset. The license is annual, and it is not very expensive.
Using a centralized combination of network and endpoint analysis, behavioral analysis, data science techniques and threat intelligence, NetWitness XDR helps analysts detect and resolve known and unknown attacks while automating and orchestrating the incident response lifecycle. With these capabilities on one platform, security teams can collapse disparate tools and data into a powerful, blazingly fast user interface.
They can easily adjust if you have the requirements which are required. If you have a budget cut or a budget constraint, they can bend.
It is highly scalable. It can be bought based on your requirements.
They can easily adjust if you have the requirements which are required. If you have a budget cut or a budget constraint, they can bend.
It is highly scalable. It can be bought based on your requirements.