Great Protection Solution
November 20, 2019

Great Protection Solution

Jorge Vasconcelos | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Panda Adaptive Defense 360

We came from Panda Endpoint Protection and switched Panda Adaptive Defense 360 a couple of years back and been our defense, antivirus, antimalware systems of choice to protect our network infrastructure since. Been a great tool to use, pretty intuitive (as long as you follow the self-system learning procedure properly) and been doing the job very well!
  • Easy of use.
  • Effective.
  • Not resource intensive on workstations.
  • Takes a few weeks to learn your systems.
  • GUI could use some revamping.
  • ROI is great, our techs used to spend a lot more time managing systems with our products.
  • No major exploits to report in years.
  • No downtime, means users are working and doing their job.
Panda just works flawlessly and we don't have issues such as over-complicated management policies and decrease performance of system caused by over usage of systems resources.
Support is the one thing Panda could really improve. Being a European majorly based company US support is sometimes limited and not always available when needed. A few times we had to wait a few hours to get a call back from an agent issue we had that was causing problems on a workstation.

Do you think Watchguard Endpoint Security delivers good value for the price?


Are you happy with Watchguard Endpoint Security's feature set?


Did Watchguard Endpoint Security live up to sales and marketing promises?


Did implementation of Watchguard Endpoint Security go as expected?


Would you buy Watchguard Endpoint Security again?


Well suited for business of all sizes and the centralized management console is pretty intuitive allow for a quick glance of problematic systems. Fingers crossed, in a good number of years using Panda have yet to come across any major issues.

Watchguard Endpoint Security Feature Ratings

Anti-Exploit Technology
Endpoint Detection and Response (EDR)
Centralized Management
Infection Remediation
Vulnerability Management
Malware Detection