[Adaptive Defense 360 / WatchGuard EPDR] (new Panda) helps keep us secure
November 19, 2021

[Adaptive Defense 360 / WatchGuard EPDR] (new Panda) helps keep us secure

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review

Overall Satisfaction with Adaptive Defense 360 / WatchGuard EPDR

We use it across the organization. Workstations and servers. We like it since it has a single dashboard, where I can monitor and react to threats, etc. We have used Panda/Watchguard for over 20 years and we're glad to see a more comprehensive product with [Adaptive Defense 360 / WatchGuard EPDR]
  • Alerts on malware threats.
  • Allows device access control for many levels of device (phone, cam, USB, etc).
  • Web Access control can be controlled and monitored and organized by groups of PC's.
  • Details on malware alerts. Sometimes the alert is just that one happened, but doesn't name the PC.
  • Malware threat should specify the source (email, website).
  • Central management has improved my personal productivity with threat assessment.
  • Reports help me outline problem areas to the business owners.

Do you think Watchguard Endpoint Security delivers good value for the price?

Yes

Are you happy with Watchguard Endpoint Security's feature set?

Yes

Did Watchguard Endpoint Security live up to sales and marketing promises?

Yes

Did implementation of Watchguard Endpoint Security go as expected?

Yes

Would you buy Watchguard Endpoint Security again?

Yes

The dashboard is very clear and useful. We can also allow or exclude endpoint PCs from getting threat alerts (some users want to know, some users just want the threats squashed and to leave them out of the alert).
We feel much more aware and on top of security, with the central management dashboards.
I would say that it's more suited for organizations 10 and larger. But the central dashboard could be used with any size company I imagine (mine range from 15 to 40 computers/servers).

Watchguard Endpoint Security Feature Ratings

Anti-Exploit Technology
9
Endpoint Detection and Response (EDR)
9
Centralized Management
8
Malware Detection
9