Nice traditional AV evolved to EDR
Updated March 25, 2024
Nice traditional AV evolved to EDR
Score 7 out of 10
Vetted Review
Verified User
Overall Satisfaction with Kaspersky EDR Optimum
Kaspersky was our corporate antivirus. As far as we did not want to take any risks, we wanted a powerfull one. No doubt, Kaspersky is a great product, it works fine, although it needs some tunning for some applications, as many other antivirus products. However, we managed to get it working smoothly
- Prevention
- Self-update client
- AD integration
- Console (not cloud version)
- Resource management
- Remote connection
- Prevention
- EDR capabilities
- AD integration
- Threat visibility
- Easy management
- Great support
As far as I could see (year ago more or less), detection was great. However, I am not sure that analyzing or automating threat response was so easy. Many times the detection name was... a little bit extrange, some kind of "default" detection or name. Also as I have tested other products, I have find automation much easier
I do not currently use Kaspersky any more (it was a business decision, not a technical one). However, having the knowledge now, I believe it would not be the winner.
However, it will be definetly above Trend Micro (for many reasons). However, it might be a balance between performance and price.
However, it will be definetly above Trend Micro (for many reasons). However, it might be a balance between performance and price.
Do you think Kaspersky EDR Optimum delivers good value for the price?
Yes
Are you happy with Kaspersky EDR Optimum's feature set?
Yes
Did Kaspersky EDR Optimum live up to sales and marketing promises?
Yes
Did implementation of Kaspersky EDR Optimum go as expected?
Yes
Would you buy Kaspersky EDR Optimum again?
Yes
Using Kaspersky EDR Optimum
5000 - The main function for the product is protecting the endpoint, as it was the antivirus and EDR on the hosts. We used to add another functionalities to it, as shadow IT management, vulnerability management, USB device control, some kind of web filtering when out of office (no proxy deployed), and so on.
3 - In order to be able to manage the product, you should have at least minimum knowledge of the operating systems you're going to protect (for example, windows or linux), and some basic system administrator skills. The product is not hard to manage, as long as you have all your equipment organized, you can be as granular as you want on the configurations made.
- Endpoint Protection
- Endpoint detect and response tool
- USB device control
- Web filtering (Out of Office)
- Host firewall
- Installed application inventory
- Maybe identity protection
- Managed detection and response
- Updates management