Solved

recommended antivirus, anti spware solution

Posted on 2014-10-09
2
246 Views
Last Modified: 2014-11-13
read somewhere depending on just one corporate antivirus solution is not enough. read some good review about http://www.kaspersky.com/.
https://www.malwarebytes.org/ can be used as a complement to the existing endpoint security solution
Which would be some of the endpoint software that is known to be very dependable without needing additional security solution to complement it?
0
Comment
Question by:grnow
2 Comments
 
LVL 20

Accepted Solution

by:
netcmh earned 300 total points
ID: 40370870
Everyone will have their opinion on the product. Go with the one you feel comfortable deploying in your specific environment. That would depend on the number of endpoints, the reporting you need, the managment capabilities.

No matter what you deploy, I would recommend installing EMET along with the product: http://support.microsoft.com/kb/2458544. It is a behavioral analysis tool which will prevent vulnerabilities from being exploited.

We use Symantec Endpoint protection, but are looking to Forticlient from Fortinet, which has all that you've mentioned and more.
0
 
LVL 26

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 200 total points
ID: 40370991
If you only want Endpoint you might want to look at the comparative sites.  Are you looking for centralized control via a console?  If so, ESET has the best console, IMHO.

Like netcmh said, you will get as many different opinions here as people who answer the question.  We've used Vipre, ESET, Symantec, Comodo, and Malwarebytes.  They are all good.  I still install EMET and I like MVPS's hosts file.  I also tend to run WinPatrol Plus on some of my test machines (you can get it for almost nothing when it's on sale - I got a bunch of copies when it was on sale for .99 a piece).
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now