Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus,...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • Phone Support
  • Chat
Folder Lock uses a hardware level driver to lock files, folders and drives on Windows, Android, and iOS devices. It offers features such as cloud backup, file sharing, password management, and secure note-taking, all with a focus on protecting user privacy.
Folder Lock uses a hardware level driver to lock files, folders and drives on Windows, Android, and iOS devices. It offers features such as cloud...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • Phone Support
  • Chat

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

US$39.95/year

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.2 /5
(1,807)

Ease of Use

4.2/ 5

Features

4.2/ 5

Customer Service

4.1/ 5

Value for Money

4.0/ 5

Overall rating

4.5 /5
(585)

Ease of Use

4.5/ 5

Features

4.4/ 5

Customer Service

4.1/ 5

Value for Money

4.5/ 5

Total features 8

  • Access Controls/Permissions
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Credential Management
  • Data Security
  • Device Management
  • Encrypted Password Storage
  • Encryption
  • Network Provisioning
  • Real-Time Monitoring
  • Secure Data Storage
  • Threat Intelligence
  • Threat Response

Total features 7

  • Access Controls/Permissions
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Credential Management
  • Data Security
  • Device Management
  • Encrypted Password Storage
  • Encryption
  • Network Provisioning
  • Real-Time Monitoring
  • Secure Data Storage
  • Threat Intelligence
  • Threat Response