Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack.

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus,...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

US$150.00/year

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.5 /5
(214)

Ease of Use

4.6/ 5

Features

4.4/ 5

Customer Service

4.3/ 5

Value for Money

4.4/ 5

Overall rating

4.2 /5
(1,807)

Ease of Use

4.2/ 5

Features

4.2/ 5

Customer Service

4.1/ 5

Value for Money

4.0/ 5

Total features 29

  • AI/Machine Learning
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Behavioral Analytics
  • Data Security
  • Device Management
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Firewalls
  • IOC Verification
  • Monitoring
  • Network Provisioning
  • Network Security Software
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remediation Management
  • Threat Intelligence
  • Threat Response
  • VPN Software
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting

Total features 8

  • AI/Machine Learning
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Behavioral Analytics
  • Data Security
  • Device Management
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Firewalls
  • IOC Verification
  • Monitoring
  • Network Provisioning
  • Network Security Software
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remediation Management
  • Threat Intelligence
  • Threat Response
  • VPN Software
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Atera
  • BrightGauge
  • ConnectWise Automate
  • Datto RMM
  • Pulseway
Not provided by vendor