![]() Overall, it has all the features that we need. "This is not an inventory solution, but it helps you take count of how many workstations you have, as well as what software is installed on each of them." "It comes included with the Windows license." "The antivirus features are very useful." "I like that it's easy to deploy because it already comes with Windows 10. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP." It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. What you would do otherwise would be very risky and tedious." "Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. If you can do that in a secure sandbox environment, that's an invaluable feature. We're trying, for example, to determine, when people send information in, if an attachment is legitimate or not. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source." "The ability to detonate a particular problem in a sandbox environment and understand what the effects are, is helpful. This is what makes the solution a valuable tool as far as I'm concerned." "The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great." "The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices." "Among the most valuable features are the exclusions. You still have the ability to manage and remediate things. No matter where the device is, AMP has still got coverage on it and is protecting it. You get protection and reporting with it. AMP will work anywhere in the world, as long as it has an Internet connection. You don't have to be VPNed into the environment for AMP to work. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. This helps you understand and nail down what the threat is and how to fix it." "One of the best features of AMP is its cloud feature. Therefore, it gives you great detail, a timeline, and continuity of events leading up to whatever the incident is, and then, after. Then, after the event, something else was launched by whatever the threat was. For example, you have the event, but you see that the event was launched by Google Chrome, which was launched by something else. You can see what other applications were incorporated into the execution of the threat. You can see what happened after the threat. You can get onto the device trajectory to look at a threat, but you can also see what happened prior to the threat. "The most valuable feature is signature-based malware detection." "The visibility and insight this solution gives you into threats is pretty granular. Defender for Endpoint did come out on top in the Ease of Deployment category. It is high performing with a good interface and has excellent customer support. Service and Support: All Kaspersky Endpoint Security users and most Defender for Endpoint users are satisfied with the level of support they receive.Ĭomparison Results: Kaspersky Endpoint Security comes out on top in this comparison.ROI: Users of both solutions report seeing an ROI.Defender for Endpoint does offer a free version. ![]() Most Defender for Endpoint users feel it is an expensive product. Some users of each feel that the price is too high. Pricing: Kaspersky Endpoint Security received mixed reviews in the pricing category.Defender for Endpoint users like its EDR feature but say its interface needs improvement. Kaspersky Endpoint Security users say it is user-friendly, flexible, and has good machine learning features, but that it consumes a lot of resources. Features: Users of both products are happy with their security, stability, and scalability.Most Defender for Endpoint users say that its initial setup is straightforward. Some say the setup is straightforward, while others say it is complex. Ease of Deployment: Kaspersky Endpoint Security users give mixed reviews regarding its setup.After reading all of the collected data, you can find our conclusion below. We performed a comparison between Kaspersky Endpoint Security for Business and Microsoft Defender for Endpoint based on our users’ reviews in five categories.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |