Kaspersky - Not to be trusted.
April 14, 2022

Kaspersky - Not to be trusted.

Hunter Bonner | TrustRadius Reviewer
Score 2 out of 10
Vetted Review
Verified User

Overall Satisfaction with Kaspersky Endpoint Security

Kaspersky was solving the problem of antivirus protection, as well as malware and other endpoint protection strategies.
  • Deployment was easy through various RMM vendors.
  • Installs fast.
  • Rarely, if ever crashes.
  • Privacy concerns, as it related to their business being tied so close to the Russian government.
  • Concerns that software was acting as a listening agent for a foreign entity.
  • Too aggressive and at times, made it very difficult to get programs to passthrough that were authorized for use.
  • Antivirus
  • Antimalware
  • crypto prevent
  • Negative because we had to rollback after US Government declared it suspect.
  • Was positive in a way that it was clearly visible to the end user, and they appreciated it.
  • Spent way too much time having to remediate it.
  • Webroot Antivirus + Internet Security Complete (SecureAnywhere)
In terms of management, it it much more difficult to cloud manage Kaspersky versus Webroot. Also, as stated before, much easier to make exceptions to virus definitions and scanning.

Do you think Kaspersky Endpoint Security delivers good value for the price?

No

Are you happy with Kaspersky Endpoint Security's feature set?

No

Did Kaspersky Endpoint Security live up to sales and marketing promises?

No

Did implementation of Kaspersky Endpoint Security go as expected?

Yes

Would you buy Kaspersky Endpoint Security again?

No

Webroot Antivirus + Internet Security Complete (SecureAnywhere), Fortinet FortiGate, Pulseway
Given that the US Government has declared that they are not to be trusted, this was a deal breaker with all our customers. We had to pull the software.

Kaspersky Endpoint Security Feature Ratings

Anti-Exploit Technology
4
Endpoint Detection and Response (EDR)
4
Centralized Management
7
Hybrid Deployment Support
7
Infection Remediation
5
Vulnerability Management
2
Malware Detection
7