Nice traditional AV evolved to EDR
Updated March 25, 2024
Nice traditional AV evolved to EDR

Score 7 out of 10
Vetted Review
Verified User
Overall Satisfaction with Kaspersky EDR Optimum
Kaspersky was our corporate antivirus. As far as we did not want to take any risks, we wanted a powerfull one. No doubt, Kaspersky is a great product, it works fine, although it needs some tunning for some applications, as many other antivirus products. However, we managed to get it working smoothly
Pros
- Prevention
- Self-update client
- AD integration
Cons
- Console (not cloud version)
- Resource management
- Remote connection
- Prevention
- EDR capabilities
- AD integration
- Threat visibility
- Easy management
- Great support
I do not currently use Kaspersky any more (it was a business decision, not a technical one). However, having the knowledge now, I believe it would not be the winner.
However, it will be definetly above Trend Micro (for many reasons). However, it might be a balance between performance and price.
However, it will be definetly above Trend Micro (for many reasons). However, it might be a balance between performance and price.
Do you think Kaspersky EDR Optimum delivers good value for the price?
Yes
Are you happy with Kaspersky EDR Optimum's feature set?
Yes
Did Kaspersky EDR Optimum live up to sales and marketing promises?
Yes
Did implementation of Kaspersky EDR Optimum go as expected?
Yes
Would you buy Kaspersky EDR Optimum again?
Yes
Using Kaspersky EDR Optimum
5000 - The main function for the product is protecting the endpoint, as it was the antivirus and EDR on the hosts. We used to add another functionalities to it, as shadow IT management, vulnerability management, USB device control, some kind of web filtering when out of office (no proxy deployed), and so on.
3 - In order to be able to manage the product, you should have at least minimum knowledge of the operating systems you're going to protect (for example, windows or linux), and some basic system administrator skills. The product is not hard to manage, as long as you have all your equipment organized, you can be as granular as you want on the configurations made.
- Endpoint Protection
- Endpoint detect and response tool
- USB device control
- Web filtering (Out of Office)
- Host firewall
- Installed application inventory
- Maybe identity protection
- Managed detection and response
- Updates management
Comments
Please log in to join the conversation