Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation and remediation, managed hunting services, rich APIs, and unified security management.
$2.50
per user/per month
Trend Micro Worry-Free Services Suite
Score 9.0 out of 10
N/A
Trend Micro offers an end-to-end hosted security solution which they call the Worry-Free Business Security suite for midsize and larger enterprises, which provides a wide range of services such as endpoint protection, email encryption, general antivirus and threat detection and prevention, as well as protection of cloud applications as well, with no maintenance.
We choose Microsoft Defender for Endpoint as an additional solution to fill gaps and also to keep more of our solutions under one pane of glass (Microsoft 365).
Because of its integration with Windows, it is very easy to deploy and manage. Any IT department should be able to leverage the software and interface. The admin portal provides weighted recommendations that comprise the Secure Store, offering admins, security teams, and business owners valuable insights into their security footprint without requiring a strong security background. The software would be ideal for small and mid-sized businesses that cannot dedicate resources to security. Larger enterprises would also benefit, but may require the enhanced license.
With around 80 users and 150 devices (including 6 server instances), this solution served us very well, with instant admin notifications and scheduled overall reports. Detection appears extremely reliable, and the memory and CPU footprint of the service seemed less intrusive than Panda, which we had issues running on Terminal Services instances, as it seems to hog excessive memory allocation. Rollout was smooth and we never had an instance of a corrupt installation.
One, it's crazy lightweight, so compared to some of the competitors that we also have used with our security services, it's really lightweight and so I don't have a lot of overhead on the system that it's running on.
So the fact that Defender for Endpoint still works with signatures is actually, I don't know, a little difficult for us because, I mean, since Microsoft trusts those signatures, you can easily inject code. And we've done it many times. To show that you can inject code through vulnerabilities like CV 2013, 99, and 33 but still keep the signature. So because of the trust of those signatures, the malware just kind of slides into the environment without Defender knowing. That's the first part. The second part is that the behavioral analysis is not precisely its Prime. It's not Defender's best capability for endpoints. So, Defender does not identify all behaviors considered by other EDRs in the market.
It would be better if there were an unload password for each policy instead of one for the whole organization.
We have one app that gets blocked with no log of any reason why, there should be a better way to troubleshoot that other than just closing the AV every time. Allow listing has not worked in this case.
When something is blocked it should specify exactly which setting or feature blocked it to make it easier to use the allow list or adjust.
Cost add-ons for Security features is nickel and diming the process to keep pace with cybercrime. Limited Education budgets require us to be more pro-active in finding cost-effective measures to protect our devices, staff and students. Defender is a strong, well-featured product that is pricing itself out of the education market
It offers multiple security features and integrates well with Microsoft ecosystems. A workflow for threat detection, investigation, automated remediation, and a centralized dashboard is an added advantage. This application is mainly designed for experienced users; new users may feel challenged.
Installation and administration tools are fantastic. I found the endpoint policies to be not intuitive and clunky. The endpoint client was difficult to disable when trying to troubleshoot Apple issues and I often had to uninstall and then reinstall which was very time-consuming. Reporting is very useful and I was impressed with the reports I received.
Microsoft Defender for Endpoint chugs along just fine no matter what we throw at it and what systems it's running on. It doesn't take up a lot of resources either, so that's welcomed.
The first time I tried to onboard my macOS endpoints to MDE I struggled for quite a bit. I had to reach out to Microsoft's MDE support team. The tech was very helpful in walking me through the steps during a screen share session
The few times I needed to contact support I was fully satisfied. They worked all the way through the issue, no matter how long it took, and made sure I had a permanent solution. I was pleased with the professionalism, courteousness, and knowledge of the product they were supporting.
Deployment was handled by our team here and everything went pretty smoothly. We did have a few hiccups in our test group, but that only took a bit to get ironed out.
Cylance's policy is to block everything and requires an active person to monitor and unblock legitimate processes. As updates and software continue to evolve, it is a full-time job to be a Cylance administrator. Microsoft Defender for Endpoint is a set-and-forget solution that catches threats when they occur and leaves you to focus on your work unimpeded.
Avast was clunky, difficult to roll out, missed loads of malware on machines, and required that we purchase a separate license to install AV on our servers. Trend Micro could not have been any different. You just contact their sales department and get a demo, or even ask for a trial of sorts to test policy creations and client installation. You'll be obsessed with the whole process and the admin dashboard you have access to.