WatchGuard EPDR Valuable Features
NJ
Norlia Jalani
Section Head, Information Technology at a transportation company with 201-500 employees
What is really great about Panda Adaptive Defense 360 is its console in the cloud, and it can keep the inventory of software in the PC. We collect the inventory, software inventory, and collect what we install in the computer. It can track what software is in the computer.
I use this function the same as with other antivirus. This function helps to detect what software is installed in the computer.
Monitoring in Panda Adaptive Defense 360 is good; if anything suspicious occurs, they will send an email to the administrator.
Automation is present in Panda Adaptive Defense 360.
View full review »VM
Victor Massey
Solution Architect at Simvicitsolutions
First of all, the product itself is very hardy. I can put tons of load on it. Whether it is a small box or a high-end box, the small box will not give up in any case. It will function until its RAM or CPU are fully utilized. In terms of hardware, I would say WatchGuard is one of the best compared to Sophos and FortiGate, among all the firewalls.
I have not used much of Palo Alto and Check Point, so I can't say much about them. However, leaving out Palo Alto and Check Point, compared to all other devices, WatchGuard is the leader from my perspective. Ransomware is one of its handled threats.
Application-based configurations work excellently. The cloud of WatchGuard lets me see all my devices, updating me to minute levels with detailed information, such as patch status and vulnerabilities. This functionality is among my favorites in endpoint protection and Doctor.
View full review »SW
Simon-Walker
IT Manager at Redeemer Baptist School
What I appreciate the most about WatchGuard EPDR is that with the managed detection and response system, when there is an alert about the product running, the turnaround time for enabling it is less than two hours.
Real-time insights powered by advanced machine learning are helpful to me.
Being a managed detection and response system, the distinctive telemetry feature works effectively. The threat assessment operates 24/7, with people working in the background on any alerts from our endpoints. They might be using AI because their turnaround time is impressive. For example, we recently updated a piece of CAD software on one of our CAD machines. During the process of running it after the update, the computer, which was a couple of versions behind the hotfix update, sparked concerns for the WatchGuard endpoint which blocked programs. Over the space of 25 minutes, as I sat there, I watched those blocked components become allowable by a pop-up window in the bottom right of the computer I was working on. All I had to do was open it and close it until I saw that it was functioning correctly and I was getting no more alerts. That process took less than 25 minutes.
View full review »Buyer's Guide
WatchGuard EPDR
August 2025

Learn what your peers think about WatchGuard EPDR. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
867,370 professionals have used our research since 2012.
The EDR has a high accuracy rate with only a few false positives. I have never had an incident since using the product.
Additionally, I can book events, use data control and full encryption, and access advanced reporting tools. It effectively monitors everything, reducing the need for extensive security staff. It prevents issues with Trojans and encryption Trojans, providing efficiency in network oversight.
View full review »The detection capabilities for malicious activities are effective.
View full review »The most valuable features of the solution stem from the fact that I like the tool's UI, ease of management, ease of making reports, and the ability to export information easily.
View full review »The AI monitors what is normal behavior for a person while they're using an endpoint. I get an alert if an application does something other than what is considered ordinary. For instance, if someone hasn’t been using their computer for the last two months and hasn't uploaded anything to OneDrive and suddenly uploads 5 GB of data to OneDrive, I get an alert. The reporting feature is valuable. The integration with the firewall is useful.
View full review »The product's most valuable features are the zero-trust application service and its capability to detect threats and attacks.
View full review »The way it quickly applies configurations to our endpoints is genuinely amazing. For example, if we have a web filter configured and need access to a site that the filter is blocking, a customer calls us, and we can add it. Within five seconds, everybody has a connection to it. Also, the intrusion information, such as the Mitra Tech database, helps us measure the attack surface, pinpoint where the attack is happening, or identify the stage of intrusion within the network or device. It's beneficial. For instance, we could monitor lateral movements of intrusions inside a customer's network. Just about a month ago, we had a case where a customer with 80 devices detected that a kiosk had malware installed. They were using it as a satellite device within the network. We were able to identify and neutralize the threat promptly.
View full review »The solution provides protection, including ransomware and mail protection. It can recognize and mitigate a wide array of spam and phishing attempts. The software is adept at distinguishing legitimate emails from malicious ones, ensuring that users receive genuine communications while being protected. Additionally, it is lightweight and unobtrusive to users, providing adequate protection without impacting system performance. While advancements such as cheaper data processors may enhance its capabilities, maintaining its agility and transparency remains paramount.
View full review »The most valuable feature of Panda Security Adaptive Defense is we don't have to have dedicated infrastructure on-premise because it is cloud-based.
View full review »It prevents our users from circumventing security. Everything is password protected so they can't get into it. They can't uninstall it. They can't do anything.
View full review »SB
Stefan Bryskhe
CTO at Gandalf
Adaptive Defense is pretty easy to use, and Panda support is excellent.
View full review »Panda is a very good and important antivirus. It allows us to stop activation windows. Users can't activate anything as Panda will crack down on it.
It's very easy to set up.
The solution has been quite stable.
View full review »It is a very progressive and innovative software that does a good job of protecting the end user.
It is easy to manage.
The product has very good protection.
We've never had an issue with it, however, if we do run into issues, they have a good hotline. We can talk directly to them.
It is stable.
The solution can scale.
View full review »SA
Shiraz Ahmed
Founder & CEO at Technomatters
What I like about it is the cloud console. It offers centralized management, and users can push the agents through one management machine. Other products require you to pay to have a separate premium for managing the endpoints with a central console, or it is a standalone product. With this one in the cloud, the cloud-based console comes as part of the suite.
They have different packages. At the moment, we have an implementation for Endpoint Protection and Systems Management.
The remote control we achieve is the most useful aspect. In the systems management component, which is a separate license, there's this remote control feature, and you have something called privacy mode, where you can remote to a certain user system. The user can approve it or reject the request, and every action is audited.
It offers an easy initial setup.
The solution is stable.
We can scale the solution.
The pricing is decent.
View full review »JL
Jason Lau Quan
Business Development at Lisa Communications Limited
I like the Panda Security Adaptive Defense cloud usages. Everything is on a single plane of glass like the dashboards. I also like the information I can get about the computers itself.
Our customers like the solution.
View full review »The most valuable features of Panda Security Adaptive Defense are the useful hardware information it provides, light on resources, controllable from the console, remote scan functionality, and the blocking of a lot of URL malware.
View full review »They have great technical support staff.
View full review »FH
Frank Hubrach
IT-Leiter at Spiekermann GmbH
If ever something goes wrong, we get information from the panel or from tech on your PC. It alerts us to call support.
The system is automatically cleaned.
The product so far has been good at protecting us. We haven't faced a breach.
The initial setup is pretty straightforward. It's something that any company should be able to handle with ease.
Overall, I find the entire solution valuable.
Their remote management (RMM) is very good.
I use a portion of their advanced protection tool. It's great for monitoring and taking a deeper look at various scenarios.
I love the function of it and what it does. I love the graphics, the view. The actual dashboard is good. It has a lot of information. It's very useful.
View full review »RR
Renan Ruivo
IT Infrastructure at 4 Seniors Brasil
WatchGuard EPDR improves organization primarily by supporting the IT team rather than the end users directly. It helps IT teams accomplish more with fewer people. One of its standout features is the patch management solution, which allows companies without up-to-date services like WSUS to manage patches for Windows and Linux systems. Additionally, it provides the usual endpoint protection features such as virus and malware protection, application control, and website control.
The tool's most valuable feature is patch management. Patch management is particularly valuable because few other companies, like Trend Micro and Kaspersky, offer integrated patch management solutions within their endpoint protection products.
View full review »The most valuable feature of the solution is its device control.
View full review »Firstly, we can manage it on the cloud. Secondly, we have control over our devices, specifically USB ports, allowing us to block or control the traffic. In cases where clients cannot afford a Firebox, they can use Panda Security as a cost-effective solution to protect their devices. It enables widespread usage.
View full review »The solution makes it easy to unblock software.
I like the way they show inventory and the serial number of devices.
The initial setup is very straightforward.
It is stable, and the performance is good.
It is scalable.
The cost is not too high.
View full review »The dashboard management feature is valuable.
View full review »It's quite easy to manage, which is a good thing. I've found it's got excellent web protection. It just adds a little bit more to the product, including antivirus, application, and white-listing, which is good.
It seems to be faring quite well.
It's pretty simple to set up.
So far, the solution has been stable enough. It does the job.
The product can scale.
It's got a pretty full feature set.
View full review »The protection from malware is the most important feature. It has some endpoint information about the vehicle of the virus, malware, etc. It is also stable and easy to install, and they also provide good technical support.
It's very easy to deploy, we don't have any problem or issues with it. It's almost full automatic. It basically makes the assumption that everything is supposed to be suspicious; files, processes, URL accesses, and so on. Everything is checked once in the cloud and it's assessed as malware or safe. You're free to use it. It's simple enough to be used by a non-specialist, by regular users. You don't need a large security team to manage it.
View full review »RR
RedieRamos
Cloud Solutions Architect at a tech services company with 1-10 employees
The most valuable feature is the web filter application control.
This solution is very easy to implement.
The granularity of security is very good because we can create different groups that are categorized, for example, by the department. There are policies in place to assist with this.
The reports are good and help us to better manage our system.
View full review »This solution has different modules.
The most valuable module is antivirus, which has a whitelist mode that will block everything other than approved transactions. This gives us the ability to define different profiles in terms of the level of protection.
The patch management module is very important.
The systems management module, which can be used for asset inventory and for remote support, is very good.
This solution can scan the entire network and discover all of the systems where it is not installed.
View full review »SJ
Senko Juki?
System Engineer at a tech services company with 11-50 employees
In essence, Panda Security is a lot like every other antivirus product. It has protection from zero-day exploits which is the most important feature out of any of the solutions. It is similar to zero-day malware or ransomware protection in that it can protect you from anything that you need protection from that is yet unknown.
Panda Security has a feature to block any unknown process and that is what is best about it.
Another valuable feature is the ease-of-use. We have one big client — big for our country — that has 250 licenses. I think they are very satisfied with Panda Security because it is quite simple to use. Users just want to have something that is more easy-to-use and that is it. They don't care a lot about everything else.
View full review »FH
Filip Hajek
Consultant at DNS a.s.
The feature I find most valuable is the advanced search engine. It is really easy to drill down by the logs to search for any connection from any user station. It allows us to easily figure out if any station is, for instance, connecting to Russia, China, Korea or any other place. So one can easily drill down and get a good overview of which applications you are using that are connecting a player to the next local operation center. It is then very easy for the security operation center to figure out if they are under any threats.
- Ease of setup and deployment
- Support readily available
Buyer's Guide
WatchGuard EPDR
August 2025

Learn what your peers think about WatchGuard EPDR. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
867,370 professionals have used our research since 2012.