Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus,...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • Knowledge Base
  • Phone Support
  • Chat
Harmony Endpoint is a cloud-based and on-premise security platform designed to help enterprises protect the remote workforce from potential threats such as malware, ransomware, or phishing attack.
Harmony Endpoint is a cloud-based and on-premise security platform designed to help enterprises protect the remote workforce from potential threats...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • Knowledge Base
  • Phone Support
  • Chat

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.2 /5
(1,807)

Ease of Use

4.2/ 5

Features

4.2/ 5

Customer Service

4.1/ 5

Value for Money

4.0/ 5

Overall rating

4 /5
(2)

Ease of Use

4/ 5

Features

4.5/ 5

Customer Service

4.5/ 5

Value for Money

4/ 5

Total features 8

  • Activity Tracking
  • Application Security
  • Data Security
  • Device Management
  • Endpoint Protection Software
  • IT Incident Management
  • Incident Reporting
  • Investigation Management
  • Network Monitoring
  • Network Provisioning
  • Real-Time Monitoring
  • Reporting/Analytics
  • Threat Intelligence
  • Threat Protection
  • Threat Response

Total features 9

  • Activity Tracking
  • Application Security
  • Data Security
  • Device Management
  • Endpoint Protection Software
  • IT Incident Management
  • Incident Reporting
  • Investigation Management
  • Network Monitoring
  • Network Provisioning
  • Real-Time Monitoring
  • Reporting/Analytics
  • Threat Intelligence
  • Threat Protection
  • Threat Response