Avanan - Review - 2022
Updated July 13, 2022

Avanan - Review - 2022

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Avanan

We used this Avanan checkpoint tool to validate its functionality and email protection and to be able to compare it against other security tools on the market, it really is good, it was better than expected. With the acquisition of this tool, checkpoint manages to have a great first-line security coverage worldwide. It really is a very complete tool.
  • A very important feature is that it protects all the collaborative tools of the mail solution, such as office 365.
  • It has protection against ransonware.
  • An easy tool to implement.
  • I would like to find more documentation to implement and learn about the tool without the need to do a trial.
  • I would also like to be integrated into the infinity checkpoint portal.
  • They should pay attention to improving the level of support.
  • The tool is complete for email protection and administrative tools, which makes it not depend on other features.
  • Easy to implement really.
  • The impact is very positive, complete security, to avoid loss of information or ransomware attacks, which would cause a great problem of loss of information for the company.
  • It is so complete that investing in it really is not painful.

Do you think Avanan delivers good value for the price?

Not sure

Are you happy with Avanan's feature set?

Yes

Did Avanan live up to sales and marketing promises?

Yes

Did implementation of Avanan go as expected?

Yes

Would you buy Avanan again?

Yes

It really is a fairly advanced tool against modern threats, ideal for banking companies. Its ease of implementation is perfect for companies with small IT departments that use tools with full security power and little administration. Ideal for companies, the cost can prevent small companies from being able to acquire it.

Avanan Feature Ratings

Anti-malware
8
Customizability
8
Data Loss Protection
8
Threat Detection
8
Sandboxing
8
End-to-End Encryption
7
Management Tools
8