Microsoft Defender for Endpoint for the MSP masses
September 20, 2023

Microsoft Defender for Endpoint for the MSP masses

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review

Overall Satisfaction with Microsoft Defender for Endpoint

Microsoft Defender for Endpoint is a key component in our cyber security practice. All of our (2500) managed endpoints have Microsoft Defender for Endpoint deployed as part of their protection scheme. The reporting capabilities help keep our IT services firm informed of the status of protection and the need to update any of the software.
  • Protecting desktops
  • Protecting laptops
  • Managing our cyber security technology stack
  • Tight integration with our RMM
  • Microsoft Defender for Endpoint has protected our clients from millions of dollars of ransomware exploits
  • Cloud Solutions
  • Integration with Other Systems
  • Ease of Use
Microsoft Defender for Endpoint is part of our overall security strategy and is closely integrated with our Microsoft software practice. Visibility of the tool among our clients is available in the Microsoft toolset, so it is easy to use for our technology team.
We are protecting (2500) endpoints

Do you think Microsoft Defender for Endpoint delivers good value for the price?

Yes

Are you happy with Microsoft Defender for Endpoint's feature set?

Yes

Did Microsoft Defender for Endpoint live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Microsoft Defender for Endpoint go as expected?

Yes

Would you buy Microsoft Defender for Endpoint again?

Yes

IT support divisions of corporate organizations should utilize Microsoft Defender for Endpoint as part of their deployed technology security stack. Microsoft Defender for Endpoint is a key component of Microsoft's security posture for endpoint devices.

Microsoft Defender for Endpoint Feature Ratings

Anti-Exploit Technology
8
Endpoint Detection and Response (EDR)
8
Centralized Management
9
Infection Remediation
8
Vulnerability Management
8
Malware Detection
8