Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes.
Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

US$39.00/year

  • Free Version
  • Free Trial
  • Subscription

Starting from

US$8.99/month

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.4 /5
(551)

Ease of Use

4.3/ 5

Features

4.3/ 5

Customer Service

4.1/ 5

Value for Money

4.2/ 5

Overall rating

4.7 /5
(41)

Ease of Use

4.3/ 5

Features

4.6/ 5

Customer Service

4.2/ 5

Value for Money

4.2/ 5

Total features 16

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Audit Trail
  • Authentication
  • Bandwidth Monitoring
  • Behavioral Analytics
  • Cloud Application Security
  • Compliance Management
  • Container Scanning
  • Continuous Integration
  • Continuous Monitoring
  • Credential Management
  • Dashboard
  • Data Security
  • Data Visualization
  • Device Management
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • Event Tracking
  • IOC Verification
  • IP Filtering
  • IT Incident Management
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Investigation Management
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Resource Management
  • Network Security Software
  • Performance Monitoring
  • Policy Management
  • Prioritization
  • Real-Time Monitoring
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Root Cause Analysis
  • Runtime Container Security
  • SSL Security
  • Security Auditing
  • Server Monitoring
  • Status Tracking
  • Task Management
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Whitelisting/Blacklisting

Total features 68

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Audit Trail
  • Authentication
  • Bandwidth Monitoring
  • Behavioral Analytics
  • Cloud Application Security
  • Compliance Management
  • Container Scanning
  • Continuous Integration
  • Continuous Monitoring
  • Credential Management
  • Dashboard
  • Data Security
  • Data Visualization
  • Device Management
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • Event Tracking
  • IOC Verification
  • IP Filtering
  • IT Incident Management
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Investigation Management
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Resource Management
  • Network Security Software
  • Performance Monitoring
  • Policy Management
  • Prioritization
  • Real-Time Monitoring
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Root Cause Analysis
  • Runtime Container Security
  • SSL Security
  • Security Auditing
  • Server Monitoring
  • Status Tracking
  • Task Management
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Whitelisting/Blacklisting
Not provided by vendor
  • Cloudflare
  • Netskope Active Platform
  • Okta
  • Siemplify