Home > Awards > Endpoint Protection - Midmarket

Data Quadrant Awards 2024

Endpoint Protection - Midmarket


SoftwareReviews names ThreatLocker, WithSecure Elements Endpoint Protection, Symantec Endpoint Security, and Acronis Cyber Protect Cloud as Endpoint Protection - Midmarket Data Quadrant Award Winners.


View Category

Endpoint Protection - Midmarket

Data Quadrant

Data Quadrants are proudly founded in 100% user review data and are free of traditional "magical" components such as market presence and analyst opinion, which are opaque in nature and may be influenced by vendor pressure, financial or otherwise.

The SoftwareReviews Data Quadrant evaluates and ranks products based on feedback from IT and business professionals. The placement of a software in the Data Quadrant indicates its relative ranking as well as its categorization.

Read The In-Depth Report

A thorough evaluation and ranking of all software in an individual category to compare software across every dimension.

  • user satisfaction rankings
  • |
  • vendor capability comparisons
  • |
  • business value scores
  • |
  • individual feature evaluations
  • |
  • emotional connection to products
Download Now

30+ pages

Endpoint Protection - Midmarket Data Quadrant

Note Software product placement is based on the scores provided by users, recency of the reviews, and review volume. Axes are dynamically adjusted based on the minimum and maximum values in the data set.

Evaluate the Complete

Software Experience

When distilled down, the software experience is shaped by both the experience with the software and the relationship with the vendor. Evaluating enterprise software along these two dimensions provides a comprehensive understanding of the product and helps identify vendors that can deliver on both.

Product Features and Satisfaction

The satisfaction is captured in the overall satisfaction score, which is driven by the likelihood of users to recommend the software, combined with user satisfaction across top product features.

Vendor Experience and Capabilities

The vendor relationship is calculated in a weighted average of the satisfaction scores tied to vendor capabilities (e.g. software implementation, training, customer support, product roadmap) as well as emotional response ratings toward the vendor (e.g. trustworthy, respectful, fair).

Gold Medalists


ThreatLocker

ThreatLocker

ThreatLocker is an endpoint protection platform (EPP) offering cybersecurity controls to protect businesses from zero-day attacks. Enabling a Zero Trust posture, ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities.

9.2

Composite
Score

Composite
Score

+97

Emotional
Footprint

Emotional
Footprint

96%

Likeliness to
Recommend

Likeliness
to Recommend

Badge Winner
63Reviews

WithSecure

WithSecure Elements Endpoint Protection

WithSecure™ (formerly F-Secure) Elements Endpoint Protection is cloud-native, AI-powered endpoint protection that you can deploy instantly from your browser and manage easily from a single console. It integrates across all your endpoints, keeping your organization fenced in from attacks.

9.2

Composite
Score

Composite
Score

+99

Emotional
Footprint

Emotional
Footprint

93%

Likeliness to
Recommend

Likeliness
to Recommend

Badge Winner
72Reviews

Broadcom

Symantec Endpoint Security

Symantec protects all your traditional and mobile endpoint devices with innovative technologies for attack surface reduction, attack prevention, breach prevention, and detection and response. All this protection is powered by our Global Intelligence Network, one of the largest in the world. Symantec’s single-agent solution delivers flexible management/deployment options, including fully cloud-based, on-premises, and hybrid.

8.7

Composite
Score

Composite
Score

+91

Emotional
Footprint

Emotional
Footprint

87%

Likeliness to
Recommend

Likeliness
to Recommend

Badge Winner
137Reviews

Acronis

Acronis Cyber Protect Cloud

With Acronis Cyber Protect Cloud, you can deliver integrated backup, disaster recovery, cybersecurity, and endpoint management at scale, while preserving your margins and streamlining your business operations with powerful automation capabilities and broad integrations.

8.4

Composite
Score

Composite
Score

+91

Emotional
Footprint

Emotional
Footprint

89%

Likeliness to
Recommend

Likeliness
to Recommend

Badge Winner
88Reviews

Vendor Capability Awards


Availability and Quality of Training

ThreatLocker

Badge Winner

Breadth of Features

ThreatLocker

Badge Winner

Business Value Created

ThreatLocker

Badge Winner

Ease of Customization

Webroot Business Endpoint Protection

Badge Winner

Ease of Data Integration

WithSecure Elements Endpoint Protection

Badge Winner

Ease of IT Administration

Webroot Business Endpoint Protection

Badge Winner

Ease of Implementation

Webroot Business Endpoint Protection

Badge Winner

Product Strategy and Rate of Improvement

ThreatLocker

Badge Winner

Quality of Features

WithSecure Elements Endpoint Protection

Badge Winner

Usability and Intuitiveness

Webroot Business Endpoint Protection

Badge Winner

Vendor Support

ThreatLocker

Badge Winner

Vendor Capability Awards


Availability and Quality of Training

ThreatLocker


Breadth of Features

ThreatLocker


Business Value Created

ThreatLocker


Ease of Customization

Webroot Business Endpoint Protection


Ease of Data Integration

WithSecure Elements Endpoint Protection


Ease of IT Administration

Webroot Business Endpoint Protection


Ease of Implementation

Webroot Business Endpoint Protection


Product Strategy and Rate of Improvement

ThreatLocker


Quality of Features

WithSecure Elements Endpoint Protection


Usability and Intuitiveness

Webroot Business Endpoint Protection


Vendor Support

ThreatLocker


Other Evaluated Vendors


OpenText Corporation

Webroot Business Endpoint Protection

Webroot® Business Endpoint Protection is a next-generation, fully cloud-based endpoint security solution that harness the power of machine learning to continuously monitor and adapt endpoint threat detection, protection, and prevention.

8.3

Composite
Score

Composite
Score

+90

Emotional
Footprint

Emotional
Footprint

89%

Likeliness to
Recommend

Likeliness
to Recommend

66Reviews

Crowdstrike

Crowdstrike Falcon Platform

Detect, prevent and respond to attacks with next-generation endpoint protection delivered via the Falcon Platform.

8.2

Composite
Score

Composite
Score

+91

Emotional
Footprint

Emotional
Footprint

89%

Likeliness to
Recommend

Likeliness
to Recommend

59Reviews

Avast Software s.r.o.

Avast Business Security

Defend against malware, phishing and virus attacks that expose your company to risk. Protect what matters most with on-premise or cloud-managed endpoint security.

8.0

Composite
Score

Composite
Score

+88

Emotional
Footprint

Emotional
Footprint

83%

Likeliness to
Recommend

Likeliness
to Recommend

91Reviews

Check Point Software Technologies Ltd.

Check Point Endpoint Security

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

7.9

Composite
Score

Composite
Score

+91

Emotional
Footprint

Emotional
Footprint

88%

Likeliness to
Recommend

Likeliness
to Recommend

60Reviews

Fortinet

FortiClient

FortiClient is an all-in-one comprehensive endpoint security solution that extends the power of Fortinet’s Advanced Threat Protection to end user devices. With the endpoint the ultimate destination for malware seeking credentials, network access and sensitive information, ensuring that your endpoint security combines strong prevention with detection and mitigation is critical.

7.8

Composite
Score

Composite
Score

+87

Emotional
Footprint

Emotional
Footprint

85%

Likeliness to
Recommend

Likeliness
to Recommend

38Reviews

Trellix

Trellix Endpoint Security

Protect and empower your workforce with an integrated security framework that protects every endpoint. Trellix (formerly McAfee Mvision) endpoint security solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep your organization safer and more resilient.

7.8

Composite
Score

Composite
Score

+83

Emotional
Footprint

Emotional
Footprint

84%

Likeliness to
Recommend

Likeliness
to Recommend

142Reviews

WatchGuard Technologies

Panda Endpoint Security

Our Cloud-native endpoint security integrates the technology and intelligence needed for advanced prevention, detection, containment and response to threats. It includes a full stack of integrated product options including encryption, patching, remote monitoring and management, and more.

7.6

Composite
Score

Composite
Score

+81

Emotional
Footprint

Emotional
Footprint

79%

Likeliness to
Recommend

Likeliness
to Recommend

37Reviews

For the full list of vendors in this space, click here.

About Gold Medal Awards and Software Reports

SoftwareReviews Gold Medal Awards recognize outstanding vendors in the technology marketplace as evaluated by their users. Gold Medals are the capstone of an in-depth software evaluation report, and awarded using a proprietary, transparent methodology based on a composite satisfaction score that averages four different areas of evaluation: Net Emotional Footprint, Vendor Capabilities, Product Features, and Likeliness to Recommend. The Net Emotional Footprint Score measures user emotional response ratings of the vendor (e.g. trustworthy, respectful, fair).

Software Reports present comprehensive evaluations of software vendors on the above elements. Software buyers can use this data to make more informed, data-driven software purchasing and renewal decisions.

Contact Us

* Starred fields are required

Or, email us at hello@softwarereviews.com