Likelihood to Recommend I think Kaspersky is well suited for large and small companies. Larger companies can take advantage of the KSC (Kaspersky Security Center) servers to help manage a large network. The KSC has many good features to help monitor the health of the organization. It does a good job with updating and deploying remotely. It has inventory features, and can even deploy non-Kaspersky software packages uploaded to the center. KSC can become a source of good information about [your] network that can be seen at a glance. IT departments are normally smaller than they need to be. KSC helps with larger and smaller companies because of this. A small company would appreciate the amount of information and management that can be done through KSC without needing extra help. If the company is small enough that they don't have servers on-site, there is a cloud version. I have not used that to know how it differs from the local KSC.
Read full review We are able to check if any phishing link was visited by the user or not. To check for the whether any file is executed on the machine or not. To check on which port connections are being made by the machine. To create custom watchlist for alert to be investigated by an analyst. To check every process executed in the machine for a specified range.
Read full review Pros The Security Center is laid out very well and makes it easy to install and manage the client endpoint protection on servers and workstations. The way security policies are defined and managed is very easy to understand. The client programs seem to be lighter and smaller on the client systems than others I have used in the past. Using fewer resources is always an advantage. Read full review Process tree view of endpoint activity Ability to pull files from host Threat Intelligence integration Isolate a host Read full review Cons The PC imaging tools are difficult to set up and use Device Encryption tools are getting better, but are difficult to manage. The policies are powerful, but could be broken up. More help can be provided in what the policy element does within the policy setup Read full review Number of false positive which are triggered due to threat feeds are sometimes more needs to be fine tuned by the client. In very rare scenarios processes are not captured properly. Read full review Likelihood to Renew The product is stable and accurate in detecting security threats. There are very few or no false positives in detecting security threats or unusual behavior and has very sharp heuristics. The product does the job very well including saving us money in getting 3rd party patch management tools as the business is already using Microsoft System Center Configuration Manager which is Microsoft product specific and the product patches these third party products e.g Adobe Flash Player
Read full review Usability The integration with a known solution is not good (Cisco ISE), product (10.x) does not automate remediation, however security is great and detects security threats with accuracy including heuristics, very few or no false positives
Read full review Reliability and Availability I've used the on-premise server. I've only experienced one time that we couldn't open the console, and that was a server issue. It seems to be a dependable solution. It's there, and it's stable.
Read full review Performance Users don't notice any slowdown with the antivirus running on their systems. There have been issues when the systems have missed a scheduled scan, and it was checked to run at [a] first available time, they will start a full scan at startup. This has caused some lag. Normally there are also some issues with the workstation, but it is something to note.
Read full review Support Rating I give the maximum grade because we have no complaints; we never had any failure, serious error, and serious threat to the company. All of its features work very well. The great advantage of having a product supported by an industry-leading security company is that regularly updated security protocols will protect the system against all emerging threats.
Read full review Implementation Rating Make sure to provide awareness campaigns on changes that will be implemented and WHY the business is doing it and the benefits reaped. Benefits reaped is very important for the justification of why things have to change and emphasizing the importance of security. This will reduce user disgruntlement and total bitterness on use of their workstation or laptop
Read full review Alternatives Considered Kaspersky is a leader in endpoint protection, but its ties to potential adversaries are unsettling. Kaspersky has a great threat research team and quickly identifies malicious software and its signature. Its web-based protection is also top notch. This is a great product but as with everything has its place.
Read full review CB Response allows for a better view of what happened on the endpoint and provides more functionality out of the box then the
FireEye Endpoint Security Product. CB Response allows you to basically have a remote connection into the CLI of an endpoint. This allows you to view the file system, run programs/scripts on the host, etc.
FireEye Endpoint Security does not have this functionality.
Read full review Scalability You can create groups and create different policies for each group. You can customize many parts of the software before it is deployed. You can create different tasks and schedules based on the groups. It is customizable.
Read full review Return on Investment It reduced the incidents of infections and so reduced the efforts needed by the IT department to mitigate problems. It made it difficult to manage the security of our growing mobile user base due to infrequent contact with our on-premise management server. Read full review It is helping to protect us from potential loss of revenue that would be caused by malware or a compromised account. It took some time in deploying in the environment , but that time is much worth it because of the results we are getting now. It helps in hunting, which help us check and protect our environment from any cyber attacks. Read full review ScreenShots