Add to compare

Add to compare

User Ratings & Reviews

Reviews are generated by real users. When reviewing a product, users are asked to assess the product’s overall quality, which includes assigning specific ratings for ease of use, value for money, customer support, and functionality.

Overall Rating

4.61 / 5 (56)

Ease-of-Use

4.5 / 5

Value for Money

4.5 / 5

Customer Support

4.5 / 5

Functionality

4.5 / 5

Last Review Written

November 17, 2020

Pros/Cons

  • Pros

  • Seems very effective so far. I like being able to manage and monitor suspicious activity or whitelist for all the machines that I admin. Not too intrusive and resource friendly

  • Works incredibly well minuscule resource consumption on end-points no definition files great administrator visibility

  • Cons

  • There are quite a few initial false positives, and it can take some time to develop your whitelists & tweak your configurations. But once that’s done, administration is quite simple.

  • The device policies are highly configurable but the options are not terribly straight forward. The process for putting in waivers for memory protection and execution control is a bit confusing.

Pricing

Pricing Range

Have a question about pricing?

Connect with Software Advice to learn about potential unexpected costs, price ranges, pricing for other recommended alternatives, and more!

Product Demo & Screenshots

Product Demo

Explore product images

Advisor Recommendations & User Awards

FrontRunners

The top products based on usability and customer satisfaction, as rated by user reviews. Check out our full methodology description for more detail.

N/A

Advisor Recommendations

Our industry-specific advisors recommend products based on specific business needs. Connect with us to get your personalized recommendations.

N/A

Additional Info

Ideal Customer Size

Small

Medium

Large

Operating Systems

Windows

Mac

Linux