Features
Top Performing Features
Endpoint Detection and Response (EDR)
Continuous monitoring and response to advanced internet threats by endpoint agents.
Category average: 9.1
Infection Remediation
Capability to quarantine infected endpoint and terminate malicious processes.
Category average: 8.8
Centralized Management
Centralized management supporting multi-factor authentication, customized views, and role-based access control.
Category average: 8.5
Malware Detection
Detection and blocking of zero-day file and fileless malware.
Category average: 9
Endpoint Security
Endpoint security software protects enterprise connected devices from malware and cyber attacks.
Anti-Exploit Technology
In-memory and application layer attack blocking (e.g. ransomeware)
Category average: 8.6
Endpoint Detection and Response (EDR)
Continuous monitoring and response to advanced internet threats by endpoint agents.
Category average: 9.1
Centralized Management
Centralized management supporting multi-factor authentication, customized views, and role-based access control.
Category average: 8.5
Hybrid Deployment Support
Administrators should be able to choose endpoint security on-premise, cloud, or hybrid.
Category average: 8.3
Infection Remediation
Capability to quarantine infected endpoint and terminate malicious processes.
Category average: 8.8
Vulnerability Management
Vulnerability prioritization for fixes.
Category average: 8.3
Malware Detection
Detection and blocking of zero-day file and fileless malware.
Category average: 9