Microsoft Defender for Endpoint and Kaspersky Endpoint Security Cloud are key contenders in the endpoint security market. While Microsoft Defender offers better integration with Microsoft products, Kaspersky's superior threat detection and user satisfaction suggest it has the upper hand.
Features: Microsoft Defender stands out for its integration with Windows environments, real-time threat detection, and seamless deployment within Microsoft ecosystems. Kaspersky Endpoint Security Cloud offers multi-layered protection, user-friendly setup, and detailed reporting, addressing a broader range of security needs.
Room for Improvement: Microsoft Defender needs better performance with large-scale updates, clearer documentation, and enhanced scalability. Kaspersky could improve customer support, optimize system resource usage, and enhance documentation clarity.
Ease of Deployment and Customer Service: Microsoft Defender is known for its straightforward deployment within Microsoft environments, though it could benefit from more detailed deployment guidance. Kaspersky offers a user-friendly setup and efficient integration, but its customer service is an area needing improvement.
Pricing and ROI: Microsoft Defender's competitive pricing is advantageous for organizations using Microsoft products, providing significant ROI through seamless integration. Kaspersky's pricing is reasonable, with users reporting high ROI due to its robust threat detection and extensive features.
The return on investment is primarily in time savings and better observability of what's happening.
I rate Microsoft support 10 out of 10.
Due to our size, we don't have access to direct technical support, but the knowledge base, Microsoft Learn, and the articles available are really good.
The level-one support seems disconnected from subject matter experts.
We managed to scale it out in a short amount of time, with two months of planning and three months of implementation on 10,000 computers.
Defender's scalability is phenomenal, and it's going to be one of the keys to resolving issues for the SOC.
It's pretty easy to scale with Microsoft, as they make it easy if you look into the documentation.
I rate Defender 10 out of 10 for stability.
Defender for Endpoint is extremely stable.
I haven't seen any outages with Microsoft.
Repeated interactions are necessary due to Level One's lack of tools and knowledge, hindering efficient problem-solving and negatively impacting our experience with Microsoft support.
We have multiple endpoints, and we want to look for signals across tenants.
An additional feature that could be included in the next release is free Copilot.
Given our extensive Microsoft licensing, transitioning to Defender for Endpoint did not affect licensing costs.
The pricing, setup, and licensing were very easy and simple.
Defender for Endpoint's coverage across different platforms in our environment is pretty good. We have devices running Linux, Mac OS, Windows, iOS, and Android. It covers all of them.
Attack surface reduction and limiting attack surface vectors are valuable features.
The notification and reporting features are most valuable because we are part of a compliance project, and maintaining SOC 2 compliance is critical.
All you need to protect Windows desktops and file servers, Mac OS devices, iOS and Android mobiles and even Microsoft Office 365.
Just sign up for an account instead of getting tied up in hardware and software provisioning.
Pre-defined policies are automatically applied to each newly connected device, delivering immediate protection.
Be anywhere and protect anywhere using a cloud-based console.
Secure geographically separated offices, home or field-based workers, at their desks or on the go regardless of device type.
Enable remote encryption to make sure your corporate data is safe, even if a device gets lost or stolen.
Shadow IT discovery manages uncontrolled sharing of corporate data in the cloud and reveals users wasting time on social media and messengers.
Ensure compliance readiness with a Data Discovery audit of your personal and financial data in the cloud.
Enable safe collaboration and communication in Microsoft Office 365 - protection for all its major apps is already included in the Kaspersky Endpoint Security Cloud Plus and Pro tiers.
Root Cause Analysis provides an attack visualization so you can see the cause and path of an attack.
Endpoint Detection and Response (EDR) provides simple investigation tools an effortless response to evasive threats.
Advance your skills with online cybersecurity training included in Kaspersky Endpoint Security Pro.
Microsoft Defender for Endpoint is a comprehensive security solution that provides advanced threat protection for organizations. It offers real-time protection against various types of cyber threats, including malware, viruses, ransomware, and phishing attacks.
With its powerful machine-learning capabilities, it can detect and block sophisticated attacks before they can cause any harm. The solution also includes endpoint detection and response (EDR) capabilities, allowing organizations to quickly investigate and respond to security incidents. It provides detailed insights into the attack timeline, enabling security teams to understand the scope and impact of an incident.
Microsoft Defender for Endpoint also offers proactive threat hunting, allowing organizations to proactively search for and identify potential threats within their network. It integrates seamlessly with other Microsoft security solutions, such as Microsoft Defender XDR, to provide a unified and holistic security approach. With its centralized management console, organizations can easily deploy, configure, and monitor the security solution across their entire network.
Microsoft Defender for Endpoint is a robust and scalable security solution that helps organizations protect their endpoints and data from evolving cyber threats.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.