Kaspersky Endpoint Security - Your Guardian
July 21, 2021

Kaspersky Endpoint Security - Your Guardian

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Kaspersky Endpoint Security

Kaspersky Endpoint Security protects our network almost for 8 years now. It is used organization-wide both in Headquarters and branches. Kaspersky helps to protect the endpoints from not only viruses, But we are controlling Device management, Web Control, Application whitelisting, encryption, and even third-party patch management through Kaspersky
  • Out of office policies can be configured
  • Easy deployment
  • External devices can be allowed user wise
  • DLP solution is not available with Kaspersky
  • Device Control
  • Application Whitelisting
  • Disk and File Encryption
  • Web Control
  • Endpoint Protection
  • Zero security breaches
Kaspersky was chosen over other competitors for it's benefits. As Kaspersky is a fully fledge solution for encryption, patch management, OS deployment, Device control, web control, application whitelisting and endpoint protection.

Do you think Kaspersky Endpoint Security delivers good value for the price?

Yes

Are you happy with Kaspersky Endpoint Security's feature set?

Yes

Did Kaspersky Endpoint Security live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Kaspersky Endpoint Security go as expected?

Yes

Would you buy Kaspersky Endpoint Security again?

Yes

Application whitelisting feature is used in our ATMs and it is a great success. We have enabled only a set of applications to be run on ATMs and all other applications that run on ATMs are blocked through an application whitelisting policy. We as IT Admins can sleep at night knowing that our network is well secured with Kaspersky.

Kaspersky Endpoint Security Feature Ratings

Anti-Exploit Technology
8
Endpoint Detection and Response (EDR)
7
Centralized Management
9
Hybrid Deployment Support
6
Infection Remediation
8
Vulnerability Management
8
Malware Detection
9