Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ESET PROTECT Advanced Reviews & Ratings
    2,051 Ratings
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    374 Ratings
  • ManageEngine EventLog Analyzer Reviews & Ratings
    159 Ratings
  • ConnectWise SIEM Reviews & Ratings
    186 Ratings
  • Safetica Reviews & Ratings
    358 Ratings
  • Criminal IP Reviews & Ratings
    11 Ratings
  • Fraud.net Reviews & Ratings
    56 Ratings
  • A10 Defend Threat Control Reviews & Ratings
    32 Ratings
  • Source Defense Reviews & Ratings
    7 Ratings
  • Omnilert Reviews & Ratings
    26 Ratings

What is Symantec Endpoint Protection Mobile?

To effectively protect mobile devices and applications from advanced threats, it is crucial to utilize threat defense solutions that amalgamate various technologies, including vulnerability management, anomaly detection, behavioral profiling, code emulation, intrusion prevention, host firewalling, and transport security. Mobile devices are not just compact computers; they are continuously active and permanently connected to the Internet, which calls for creative approaches to maintain data integrity while enhancing user productivity. In response to these specific challenges, Symantec created a risk-based mobile security framework within its Mobile Threat Defense, specifically designed to tackle a diverse range of threats that could endanger business data through exposure, theft, or manipulation—all while ensuring user privacy and a seamless mobile experience. By leveraging both on-device and cloud-based machine learning capabilities, this system can swiftly identify numerous threats. This innovative method facilitates real-time analysis, detection, and protection at a scale that aligns with the needs of contemporary mobile environments, thereby enabling users to operate with confidence without sacrificing security. Ultimately, the integration of these advanced technologies is vital for adapting to the evolving landscape of mobile cybersecurity.

What is Microsoft Defender for Endpoint?

Stay proactive against sophisticated threats like ransomware and state-sponsored attacks. Equip defenders with the tools necessary to effectively handle risks and refine their security strategies. Transition beyond standalone endpoint solutions to develop a more sophisticated security framework that is based on XDR and Zero Trust principles. Microsoft Defender for Endpoint offers exceptional protection for a wide array of platforms, including Windows, macOS, Linux, Android, iOS, and various network devices, allowing for rapid attack response, resource flexibility, and progressive defense mechanisms. By harnessing the power of cloud scalability and integrated AI, it taps into the most comprehensive threat intelligence available in the market. This all-inclusive solution aids in recognizing every endpoint and network device, such as routers, present in your operational environment. It includes features such as vulnerability management, endpoint protection, endpoint detection and response (EDR), mobile threat defense, and managed hunting, all seamlessly integrated into a single platform, thereby guaranteeing thorough security coverage. With this cohesive strategy, organizations are positioned to fortify their defenses while ensuring they maintain visibility over all their digital assets. Moreover, this integrated approach not only enhances security but also fosters a culture of continuous improvement in cybersecurity practices.

Media

Media

Integrations Supported

Armis
Axonius
Blackpoint Cyber
Blink
ContraForce
Cyber Triage
Google Digital Risk Protection
HivePro Uni5
Intezer Analyze
JupiterOne
Kroll Cyber Risk
Notus
OctoXLabs
Panaseer
Picus
Pillr
Q-scout
Query Federated Search
SOC Prime Platform
Symantec Advanced Threat Protection

Integrations Supported

Armis
Axonius
Blackpoint Cyber
Blink
ContraForce
Cyber Triage
Google Digital Risk Protection
HivePro Uni5
Intezer Analyze
JupiterOne
Kroll Cyber Risk
Notus
OctoXLabs
Panaseer
Picus
Pillr
Q-scout
Query Federated Search
SOC Prime Platform
Symantec Advanced Threat Protection

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Broadcom

Date Founded

1991

Company Location

United States

Company Website

www.broadcom.com/info/endpoint-security/protection-mobile

Company Facts

Organization Name

Microsoft

Date Founded

1975

Company Location

United States

Company Website

www.microsoft.com/en-us/security/business/threat-protection/endpoint-defender

Categories and Features

Categories and Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Popular Alternatives

CrowdStrike Falcon Reviews & Ratings

CrowdStrike Falcon

CrowdStrike

Popular Alternatives

zDefend Reviews & Ratings

zDefend

ZIMPERIUM
CrowdStrike Falcon Reviews & Ratings

CrowdStrike Falcon

CrowdStrike
Q-scout Reviews & Ratings

Q-scout

Quokka