Protection. At its finest.
Software Version
Panda Security for Desktops (legacy product)
Modules Used
- WatchGuard Network Security
- WatchGuard AuthPoint
- WatchGuard Endpoint Security
- WatchGuard Secure Wi-Fi
Overall Satisfaction with Watchguard Endpoint Security
WatchGuard Endpoint Security provides zero trust. It AI system automatically classifies 99.98% of all running processes with the remaining percentage manually classified by product cybersecurity experts. There is no need for a separate NOC to do this for me. These features are very important in today's threat landscape.
- 100% classification of all running applications
- AI based antivirus/antimalware software
- Heuristic analysis
- Next generation antivirus solution
- And more features!
- Eventually XDR!
- Computers can enter into a limited protection state rather easily when updates have occurred to the product.
- Better security position.
- Integrations to the rest of the WatchGuard product portfolio.
- Best protection you can get.
I am a partner and I deploy the products.
One pane of glass is very nice. Especially if other products from WatchGuard are being used.
Layered security is very important. WatchGuard believes this as well.
- Webroot Antivirus + Internet Security Complete (SecureAnywhere)
WatchGuard Endpoint Security products have more features and provide better protection.
Do you think Watchguard Endpoint Security delivers good value for the price?
Yes
Are you happy with Watchguard Endpoint Security's feature set?
Yes
Did Watchguard Endpoint Security live up to sales and marketing promises?
Yes
Did implementation of Watchguard Endpoint Security go as expected?
Yes
Would you buy Watchguard Endpoint Security again?
Yes
Watchguard Endpoint Security Feature Ratings
Watchguard Endpoint Security Support
Pros | Cons |
---|---|
Quick Resolution Good followup Knowledgeable team Problems get solved Kept well informed No escalation required Immediate help available Support understands my problem Support cares about my success Quick Initial Response | None |
I use the standard support that I have at my disposal. It has always come through for me.
Endpoint Security can enforce disk encryption and keep track of the keys. I need to enable this feature. Support walked me through a few steps. It was very easy and was accomplished in a matter of minutes.