Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus,...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Chat
AVG Internet Security Business Edition is a complete protection solution that helps small and midsize businesses keep their systems and devices safe from external threats.
AVG Internet Security Business Edition is a complete protection solution that helps small and midsize businesses keep their systems and devices safe...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Chat

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

US$42.74/year

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.2 /5
(1,807)

Ease of Use

4.2/ 5

Features

4.2/ 5

Customer Service

4.1/ 5

Value for Money

4.0/ 5

Overall rating

4.3 /5
(287)

Ease of Use

4.5/ 5

Features

4.3/ 5

Customer Service

4.2/ 5

Value for Money

4.3/ 5

Total features 8

  • Access Controls/Permissions
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Application Security
  • Data Security
  • Device Management
  • Email Attachment Protection
  • Email Filtering
  • Email Monitoring
  • Encryption
  • Event Logs
  • Firewalls
  • Intrusion Detection System
  • Network Provisioning
  • Real-Time Monitoring
  • Reporting/Analytics
  • Scheduling
  • Server Monitoring
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Vulnerability Scanning
  • Whitelisting/Blacklisting

Total features 22

  • Access Controls/Permissions
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Application Security
  • Data Security
  • Device Management
  • Email Attachment Protection
  • Email Filtering
  • Email Monitoring
  • Encryption
  • Event Logs
  • Firewalls
  • Intrusion Detection System
  • Network Provisioning
  • Real-Time Monitoring
  • Reporting/Analytics
  • Scheduling
  • Server Monitoring
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Vulnerability Scanning
  • Whitelisting/Blacklisting