AIMultiple ResearchAIMultiple Research

Top 5 Kaspersky Alternatives in 2024 With 11K+ User Reviews

Updated on Apr 30
5 min read
Written by
Cem Dilmegani
Cem Dilmegani
Cem Dilmegani

Cem is the principal analyst at AIMultiple since 2017. AIMultiple informs hundreds of thousands of businesses (as per Similarweb) including 60% of Fortune 500 every month.

Cem's work has been cited by leading global publications including Business Insider, Forbes, Washington Post, global firms like Deloitte, HPE, NGOs like World Economic Forum and supranational organizations like European Commission. You can see more reputable companies and media that referenced AIMultiple.

View Full Profile

Kaspersky is headquartered in Moscow, Russia, and offers cybersecurity software with a focus on endpoint protection against ransomware, malware, and vulnerabilities that lead to data loss and breach. 

In 2017, the U.S. Security Department of Homeland Security banned Kaspersky products due to their alleged ties to Russian security services. In order to combat such allegations, the company made its source code open for verification.1

This article offers a comparison of top 5 alternatives to Kaspersky based on user reviews, ratings, prices, and features, including MDM, full-disk encryption, and more.

5 Kaspersky Endpoint Security Cloud Pro alternatives comparison

This section compares alternatives to Kaspersky Endpoint Security Cloud Pro in light of insights based on user reviews, user ratings, price, and software features.

Comparative table based on market presence and pricing

Software product# of reviews*Rating*Price**Multi-OSDeployment (on-prem&cloud)
Kaspersky Endpoint Security Cloud Pro3174.3$437cloud based
Trellix Endpoint Security3,5714.3n/a
Symantec Endpoint Security Complete3,1784.4n/a
CrowdStrike Falcon Endpoint Protection Pro1,9574.8$500cloud based
Eset Protect Complete1,1704.6$288cloud based
WeBroot Business Endpoint Protection1,0014.3$150Windows&macOScloud based

* Based on the total number of reviews and average ratings (on a 5-point scale) from Gartner, G2, Capterra, and TrustRadius software review platforms as of April 3, 2024.

** The price entails 5 devices/users per year. Other licensing terms, such as the minimum quantity of licenses needed, are not taken into account; features and prices are in accordance with the selected tiers/packages.

Comparative table based on features

Software productFDEDevice controlMDMWeb&email protectionMFA
Kaspersky Endpoint Security Cloud Pro
Trellix Endpoint Securityintegrated TrellixePOintegrated TrellixePOintegrated TrellixePO
Symantec Endpoint Security Completeintegration with Symantec DLPintegration Symantec Validation & ID Protection
CrowdStrike Falcon Endpoint Protection Prointegrated with Falcon Identity Protection
Eset Protect Completeadd-on
WeBroot Business Endpoint Protection

Notes

  • The table was created from publicly available and verifiable data.
  • The vendors are ranked based on the total number of reviews, with Kaspersky ranked at the top and sponsors following it.
  • Transparency statement: Vendors with links to their websites are sponsors of AIMultiple.

To present an objective assessment of vendors, we took into account verifiable information from the public, like the number of reviews and user ratings on software review portals. 

Vendor selection criteria

  • Number of reviews: We included vendors with more than 300 total user reviews.
  • Average rating: Above 4/5 rating on average across all software review platforms.
  • Price: Selected software products vary in price, and publicly available prices of products are added to the table. Potential users can compare products according to their price and pricing drivers.
  • Pricing driver: The price of products depends on multiple aspects, such as minimum licensing or admin user quantity, device quantity, or domain quantity. Businesses can choose between pricing driver options in accordance with the quantity and admin user. 

Common features

We selected the vendors that deliver malware protection and USB control features.

Differentiating features

  • Integration with operating systems: Requirements regarding operating systems. Multi-OS compatibility includes support for Windows, MacOS, and Linux based systems.
  • Deployment: Includes cloud-based and on-premises options.
  • Full-disk encryption (FDE): Encrypting the entire storage on endpoints. For more endpoint encryption
  • Device control: Management of devices such as USBs, printers, and Blueetooth devşces via established consoles offered in product features. For more on comparative table based on device control features
  • Mobile device management (MDM): Device control and management with a focus on mobile devices such as tablets, smartphones, laptops, and more.
  • Web & email protection: Protecting data against leakage on web and email, with a focus on security measures against phishing attacks.
  • Multi-factor authentication (MFA): Multi-factor authentication (MFA) is a security mechanism that requires multiple forms of verification from independent categories of credentials to authenticate a user’s identity. The purpose of multi-factor authentication is to provide an extra layer of security beyond just a username and password, which are susceptible to being stolen or guessed.

Kaspersky Endpoint Security Cloud Pro’s shortcomings

Reviewers have identified the following flaws, which have been raised multiple times:

1. Resource intensity

Multiple reviewers mention the program occupies storage space and lags the system.2 3 4

2. User interface and experience

The user interface has been found to be complicated by multiple reviewers. In addition, navigation on the console has been claimed to be cumbersome.5 6 7

Figure 1. User review on TrustRadius

Source: TrustRadius.8

Top 5 alternatives analyzed

This section provides a user-reviewed analysis from sites such as G2, Gartner, Capterra, and TrustRadius. Pros and cons from user reviews are only chosen if several users bring up the same issue.

1. Trellix Endpoint Security

Trellix offers its clients extended endpoint detection and security (XDR) together with data, network, and email security. Bryan Palma, the COO and president of BlackBerry, is currently the company’s CEO.

Pros

  • Threat prevention: Multiple reviewers are satisfied with the product’s threat prevention tools, including AV and malware detection.9 10

Cons

  • Configuration: Multiple reviewers claim the configuration process is cumbersome.11 12

2. Symantec Endpoint Security Complete

The Symantec brand, which provides a range of hardware and software choices, is owned by Broadcom, Inc. Symantec offers cybersecurity products for server and endpoint security.

Pros

  • Scalability: Multiple users like the scalability capacityof the product.13 14

Cons

  • Resource intensity: Multiple reviewers claim it slows down the system.15 16

Figure 2. Symantec Endpoint Security Complete vs Trellix Endpoint Security (ENS)

Source: Gartner.17

3. CrowdStrike Falcon Endpoint Protection Pro

Falcon by CrowdStrike is an endpoint protection platform that offers endpoint detection and response, exposure management, identity threat detection & response, IT automation, threat intelligence & hunting, cloud security, next-gen SIEM, generative AI, data protection, and workflow automation.

Pros

  • Endpoint visibility: Multiple users claimed to be content with the product’s endpoint monitoring capabilities.18 19

Cons

  • Ease of use: Multiple reviewers find the graphic user interface hard to navigate.20 21

Figure 3. Falcon Endpoint Protection platform features

Source: G2.22

4. Eset Protect Complete

Eset was founded in Bratislava, Slovakia, in 1992. The company  provides endpoint protection focused on zero-day threats, ransomware with a scope across web and cloud based applications.

Pros

Cons

  • Ease of use: Some reviewers claimed it failed to be user friendly.25 26

Figure 4. User review on Capterra

Source: Capterra.27

5. WeBroot Business Endpoint Protection

Webroot was founded in 2007. It produces security solutions for endpoints and e-mails, as well as DNS protection.

Pros

Cons

  • Malware protection: Multiple reviewers claim malware prevention has failed to work at times.31 32 33

Figure 5. WeBroot Business Endpoint Protection Pros & Cons

Source: Capterra.34

Further reading

If you need help finding a vendor or have any questions, feel free to contact us:

Find the Right Vendors

External resources

Access Cem's 2 decades of B2B tech experience as a tech consultant, enterprise leader, startup entrepreneur & industry analyst. Leverage insights informing top Fortune 500 every month.
Cem Dilmegani
Principal Analyst
Follow on
Cem Dilmegani
Principal Analyst

Cem is the principal analyst at AIMultiple since 2017. AIMultiple informs hundreds of thousands of businesses (as per Similarweb) including 60% of Fortune 500 every month.

Cem's work has been cited by leading global publications including Business Insider, Forbes, Washington Post, global firms like Deloitte, HPE, NGOs like World Economic Forum and supranational organizations like European Commission. You can see more reputable companies and media that referenced AIMultiple.

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider.

Cem regularly speaks at international technology conferences. He graduated from Bogazici University as a computer engineer and holds an MBA from Columbia Business School.

Sources:

AIMultiple.com Traffic Analytics, Ranking & Audience, Similarweb.
Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
Data management barriers to AI success, Deloitte.
Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
Science, Research and Innovation Performance of the EU, European Commission.
Public-sector digitization: The trillion-dollar challenge, McKinsey & Company.
Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.

To stay up-to-date on B2B tech & accelerate your enterprise:

Follow on

Next to Read

Comments

Your email address will not be published. All fields are required.

0 Comments