Small improvements would make it an unbeatable product
November 04, 2021

Small improvements would make it an unbeatable product

David Delgado Déniz | TrustRadius Reviewer
Score 8 out of 10
Vetted Review

Overall Satisfaction with Adaptive Defense 360 / WatchGuard EPDR

It is being used by the whole company and by our customers. Currently, we manage it by [using] the multi-tenant console in which we can access the clients console as well.

We have identified performance issues with the current versions of Panda in MacOS. [In my experience], the agent practically crashes computers from minute one. [Also there's] no endpoint client for iOS, which is a problem.
  • Inventory everything with the agent
  • IOS: Indicators of attack and behavior
  • Scan exclusions
  • iOS mobile integrations
  • MacOS endpoint is not usable
  • Endpoint sometimes crashes while scanning files with memory dumps
  • Improved endpoint performance and security
  • Reduced staffing costs through centralized inventory
  • Having scheduled reports of all our customers
Best performance and a wide view of what happens in my organization. MSSP feature included as a reseller.

Do you think Watchguard Endpoint Security delivers good value for the price?

Yes

Are you happy with Watchguard Endpoint Security's feature set?

Yes

Did Watchguard Endpoint Security live up to sales and marketing promises?

Yes

Did implementation of Watchguard Endpoint Security go as expected?

Yes

Would you buy Watchguard Endpoint Security again?

Yes

It's the best I've tried, with the best GUI and user experience, compared to competitors.
Overview of which devices are protected and which are not, through which configuration templates and how this affects various subsets of users associated to templates - projects.
Well suited for Windows integrations with a quick deployment through Panda console having DC administrator's rights.

Less appropriate for macOS environment or iOS mobiles (unsupported).

Watchguard Endpoint Security Feature Ratings

Anti-Exploit Technology
8
Endpoint Detection and Response (EDR)
9
Centralized Management
9
Malware Detection
8