Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes.
Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • Chat
AlienVault OSSIM is a open source security information and event management (SIEM) software.

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • Chat

Starting from

US$39.00/year

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.4 /5
(551)

Ease of Use

4.3/ 5

Features

4.3/ 5

Customer Service

4.1/ 5

Value for Money

4.2/ 5

Overall rating

4 /5
(6)

Ease of Use

3.8/ 5

Features

3.5/ 5

Customer Service

3.8/ 5

Value for Money

4/ 5

Total features 16

  • Access Controls/Permissions
  • Activity Tracking
  • Anti Virus
  • Application Security
  • Audit Trail
  • Authentication
  • Behavioral Analytics
  • Cloud Application Security
  • Compliance Management
  • Data Security
  • Incident Management
  • Real-Time Monitoring
  • Real-Time Notifications
  • Reporting/Analytics
  • Risk Analysis
  • Risk Assessment
  • SSL Security
  • Security Auditing
  • Threat Intelligence
  • Two-Factor Authentication

Total features 6

  • Access Controls/Permissions
  • Activity Tracking
  • Anti Virus
  • Application Security
  • Audit Trail
  • Authentication
  • Behavioral Analytics
  • Cloud Application Security
  • Compliance Management
  • Data Security
  • Incident Management
  • Real-Time Monitoring
  • Real-Time Notifications
  • Reporting/Analytics
  • Risk Analysis
  • Risk Assessment
  • SSL Security
  • Security Auditing
  • Threat Intelligence
  • Two-Factor Authentication