Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus,...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Chat
Symantec Enterprise Cloud is a cybersecurity platform that provides integrated solutions for various challenges faced by organizations. The system offers data-centric hybrid security for organizations both on-premises and in the cloud. Symantec Enterprise Cloud is designed to provide consistent compliance, secure remote work, and data and threat protection.
Symantec Enterprise Cloud is a cybersecurity platform that provides integrated solutions for various challenges faced by organizations. The system...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Chat
No images available

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.2 /5
(1,807)

Ease of Use

4.2/ 5

Features

4.2/ 5

Customer Service

4.1/ 5

Value for Money

4.0/ 5

Overall rating

4.5 /5
(53)

Ease of Use

4.3/ 5

Features

4.4/ 5

Customer Service

4.1/ 5

Value for Money

4.4/ 5

Total features 8

  • Activity Monitoring
  • Activity Tracking
  • Application Security
  • Audit Management
  • Audit Trail
  • Compliance Tracking
  • Customizable Reports
  • Data Security
  • Device Management
  • Email Filtering
  • Endpoint Protection Software
  • Monitoring
  • Network Provisioning
  • Policy Management
  • Real-Time Monitoring
  • Threat Intelligence
  • Threat Protection
  • Threat Response

Total features 11

  • Activity Monitoring
  • Activity Tracking
  • Application Security
  • Audit Management
  • Audit Trail
  • Compliance Tracking
  • Customizable Reports
  • Data Security
  • Device Management
  • Email Filtering
  • Endpoint Protection Software
  • Monitoring
  • Network Provisioning
  • Policy Management
  • Real-Time Monitoring
  • Threat Intelligence
  • Threat Protection
  • Threat Response