IT Officer at a manufacturing company with 201-500 employees
Real User
2019-09-26T04:12:00Z
Sep 26, 2019
I'm using the cloud and on-premises deployment solutions. The cloud model is a cloud from their own server. In terms of advice I have for others, I'd say for on-premises deployment models, the user needs to have a good server, especially for newly upgraded size increases. If a new user doesn't have too many resources on-premises they can also go with the cloud version which is quite simple and user-friendly. I would rate the solution 9.5 out of ten.
IT Security at a media company with 51-200 employees
Real User
2019-08-18T07:52:00Z
Aug 18, 2019
I will definitely recommended this program to others, because you can run it in a segregated environment to have a proper test plan. You can also run it from the perspective that you've already been compromised, like how good its alerting capabilities are and how good it responds to events. I rate this an eight out of ten.
Find out what your peers are saying about Bitdefender, CrowdStrike, Palo Alto Networks and others in Endpoint Protection Platform (EPP). Updated: October 2024.
A business endpoint is any device (such as mobile phone, desktop, laptop, tablet, server, or any virtual environment) that is physically an endpoint on a business’s enterprise computer network.
We're using the on-premises deployment model. I'd rate the solution five out of ten.
I'm using the cloud and on-premises deployment solutions. The cloud model is a cloud from their own server. In terms of advice I have for others, I'd say for on-premises deployment models, the user needs to have a good server, especially for newly upgraded size increases. If a new user doesn't have too many resources on-premises they can also go with the cloud version which is quite simple and user-friendly. I would rate the solution 9.5 out of ten.
I will definitely recommended this program to others, because you can run it in a segregated environment to have a proper test plan. You can also run it from the perspective that you've already been compromised, like how good its alerting capabilities are and how good it responds to events. I rate this an eight out of ten.