The Best Hosted Endpoint Protection and Security Software for 2022 (2023)

The Best Hosted Endpoint Protection and Security Software for 2022 (1)

You Can Trust Our Reviews

Since 1982, PCMag has tested and rated thousands of products to help you make better buying decisions.(Read our editorial mission(Opens in a new window) & see how we test everything we review(Opens in a new window).)

Maybe you're getting a little bored with endpoint protection. Truth be told, it does seem more than a little reminiscent of the cold war.On the one side are malware producers, basically the bad guys, working hard at evolving their techniques to find and exploit even the smallest of vulnerabilities. On the other side are the endpoint protection developers, also working ceaselessly while looking for ever more intelligent ways to identify, block, and destroy malicious code in all its forms. The conflict is a never-ending struggle and, worse, it's one that's happening mostly in the background. At least until something awful happens.

(Video) Best Antivirus 2022 (our top antivirus tier list)

That's when endpoint protection becomes exciting real quick. But while those days tend to hit the headlines when they affect Fortune 500 companies and their clients, never forget that small to midsized businesses (SMBs) are just as vulnerable and subject to all the same exploits and attacks. And because they tend not to have the fat security budgets of larger organizations, SMBs actually seem like easier targets or low hanging fruit for hackers. This means that SMBs need sophisticated and responsive endpoint protection just as badly as enterprises, if not more so.

What Is a Hosted Endpoint Protection Solution?

A hosted endpoint protection solution amounts to a business-grade antivirus and anti-malware platform, the guts of which are hosted entirely in the cloud. That means administrators log into a web console to perform scans, register users, manage licenses, and perform other daily management tasks as well as reporting. This is a natural evolution as the benefits of a cloud-managed security service are just too many to ignore.

Sticking with an old fashioned endpoint protection suites means IT must create a server-based back-end on premises, then deploy scanning software and agents to every device they want to protect manually while taking on responsibility for scanning engine updates. Contrast that against a cloud managed service and most of those headaches are taken on by the service provider. The back-end is entirely managed by the vendor and your users get their device software and updates automatically, all while providing IT with clear reporting of any exceptions, problems, and threats. The cloud even helps vendors deploy more advanced solutions for the more difficult threats.

The challenge all these tools face is the ever-changing landscape of cybersecurity threats. They need to figure out exactly what's malicious and clamp down on it without flagging so much that protecting the business actually grinds it to a halt.This is a difficult problem to solve since maliciousness can be a very hazy thing.False positives, therefore, are an ongoing issue and handling them is one of the major aspects of how developers differentiate their products and compete for market share.

This is where the cloud has proven a boon in recent years. Any hosted endpoint protection solution will have at least part of its overall architecture resident in the cloud. With that comes the ability to leverage Big Data science and advanced analytics on the server side. This lets service providers build machine learning (ML) models that can significantly enhance detection rates, something that wasn't nearly so achievable when vendors had to rely on their customers' on-premises computing power.While signature-based detection certainly still plays a major role in clearing the field, machine learning is where most of our vendors see the future going and we saw big strides made here during this year's testing. Our reviews clearly surfaced ML as the year's hottest security component, driving many of the newest features, especially behavior-based detection.While these engines can still be fooled, that's rapidly becoming more difficult to do.

Still, with the right amount of tweaking, malware developers are still more than capable of cleverly disguising their malicious payloads and sneaking them past an IT department's defenses. Bad applications use all kinds of tricks to accomplish this, from digital disguises all the way to social engineering. For this reason, performing due diligence before deciding on an endpoint protection solution is critical. To help with that, this roundup puts ten of the top endpoint protection players through their paces. First, we examine deployment and management capabilities from an IT professional's perspective, and then we perform a four-part suite of detection tests to see just how these tools match up against one another.

How We Test Hosted Endpoint Protection Solutions

With threats and countermeasures constantly evolving, testing endpoint protection has become a tricky thing. The ML algorithms we saw vendors deploy are great at picking out known problems, which makes using known malware batches something of a token gesture.Everyone's prepared for it, so how effective of a test can it really be? Well, it's certainly a necessary test to establish a baseline of competence for every vendor, but it's also a good reason to take a multi-pronged approach to testing these solutions.

As a rule of thumb, the weakest security link in any organization's defense chain is always going to be the people that work there. So, PCMag Labs starts by testing phishing detection. Sometimes the fastest way to shut down an attack is to simply stop users from handing over their credentials, even if they're doing so innocently.To do this, we leverage a website called PhishTank(Opens in a new window), which posts an ever-growing list of validated phishing websites.There we randomly pick 10 sites that are still active, and use those as a barometer to check how well phishing detection works in our test candidate. We just navigate to all ten sites using a test machine running the candidate's software and recording what happens.

(Video) Best Antivirus 2022: Norton vs McAfee vs Bitdefender vs Kaspersky vs Avast vs AVG vs Malwarebytes

Another very popular attack vector is to trick users into downloading a seemingly legitimate application that's then used for nefarious purposes or even just waits for a time, behaving normally, and then detonating some kind of malicious payload.Being able to look under the hood of apps that may be carrying rogue code must be a significant area of focus for any winning endpoint protection solution.We focus on how each candidate performs such analysis, how those results are reported, what countermeasures can be taken, and how easily they might be defeated.

We also make sure each candidate is familiar with the current threat landscape. We do this by throwing a fresh database of known malware against our test system that's running the candidate's protection client. So far, we’ve not tested a system that doesn’t pick up at least 80 percent, and usually far more, of these known malware variants. However, sometimes there can be a delay until the system is able to perform to its best levels, which is important for potential buyers to know. Also, some systems rely on waiting until the malicious software executes before flagging it and then just aim to clean up the mess afterward.Still others rely on pure signature-based detection algorithms and ML to pick out commonalities. Each of these approaches, or even a judicious mix, means a different level of success, and buyers always want the percentage detected and cleaned to be as high and as early as possible.

Our more advanced testing is looking to see whether or not the system can be penetrated using browser or Microsoft Windows exploits as well as how easy it might be for an active attacker to compromise the system.We accomplish the first part by dropping malicious executables directly on our test system to see how the endpoint protection software reacts. We also enable a dummy website with a specific (and effective) browser-based exploit and also launch that against our test system.

We use the test system's remote desktop protocol (RDP) password and assume it's been compromised through a brute force attack. Then download a wide variety of malware samples to the system via RDP. This procedure relies heavily on both the Metasploit(Opens in a new window) framework and the Veil 3.1 framework to generate and encode attacks.How quickly the detection engine catches on is the paramount metric here, since in the wild these kinds of attacks can go undetected for some time.While we found that most systems will catch them on execution, some will allow the process to persist for a disturbing length of time.We score based on the amount of damage that can be done while the system is being compromised. We also attempt to delete documents, alter system files, and even uninstall or disable the antivirus package.

Other Key Features

Raw protective potential is certainly a key buying metric for an endpoint protection solution, but there are other features to consider. For one, support for mobile devices was a key feature, even when we tested hosted endpoint protection solutions last year, we certainly found that trend continuing this year. Making sure your chosen protection suite can protect all the devices in your organization's stable can mean the difference between having to learn and pay for multiple tools and being able to see your company's endpoint security health from a single control pane. Mobile features to look for include not only agents that can install on Google Android and Apple iOS, but also basic mobile device management (MDM) capabilities, like automated device registration, remote encryption policy enforcement, and remote device wipe.

Recommended by Our Editors

How to Succeed as a Cybersecurity Pro: Three Crucial Steps

Beyond the Perimeter: How to Address Layered Security

(Video) TOP 20 Endpoint Protection
(Video) What's New in Endpoint Security in 2022?

Patch management is another heavily-weighted component in this crop of protection products.Many of the issues that come from malware happen because the malicious software exploited a bug left on an unpatched system. Microsoft Windows is probably the most often cited culprit here, but in reality patch exploits happen on all kinds of systems and your endpoint protection solution should address this.That's especially true now that Microsoft has mostly forced users to automatically update its patches. This has bred a false sense of security among users who figure as long as Windows has its updates installed automatically, they're safe. But in reality, countless other applications often go unpatched and the bad guys often use one or more of these to accomplish just as much chaos.

Just knowing that the patch exists is the first step in communicating the dangers to the business owners and allowing for a patching process that needs to include not only downloading the patch, but first testing and only then deploying it. Being able to deploy and rollback those patches from a web console is something no business should be without, whether you get it as part of your endpoint solution or as a separate patch management tool.

Another key ability, and one upon which we placed great weight in our testing, is policy management.The ability to set customized policies on large or small groups of users or devices is not only a useful tool to have, it's practically a necessity in an age when users are commonly using multiple devices, even their own devices, to get work done.Power users and developers might require a bit more leeway with their operations, while standard end users might be locked down a bit more tightly. Having a clean way to do this is not only a management joy, it's often the only way to avoid significant nightmares in the future.

Evaluate In Your Environment

Finally, while we consider our testing methodology to be sound, we like to validate results against those of third-party resources. This year, that was primarily AV Comparatives(Opens in a new window) and the results of their 2019 testing. Comparing our results against those of AV Comparatives allows us to add an extra point of comparison to better represent the products from multiple viewpoints. It's also independent verification of our results across factors such as usability, detection accuracy, false positives, performance, and more.

All this adds up to an excellent buying guide for businesses looking for a new or updated endpoint protection solution. However, reading this guide shouldn't be the end of your research. Once you've narrowed down your options, finding out for sure which is best for your company means evaluating the solution in your own environment. This means it's a good idea to always look for products that provide the ability to initiate an evaluation period, whether that be after some conversation with a sales person or just using a free download link on the vendor's website.

(Editors' Note: Vipre is owned by Ziff Davis, PCMag's parent company.)

FAQs

What is the best endpoint protection software? ›

Top 10 Endpoint Protection Suites
  • Malwarebytes.
  • Symantec End-user Endpoint Security.
  • ESET PROTECT Advanced.
  • Crowdstrike Falcon Endpoint Protection Platform.
  • FortiClient.
  • Webroot.
  • Sophos Intercept X: Next-Gen Endpoint.
  • Harmony Endpoint.
13 Oct 2022

What is the best anti virus in 2022? ›

  • McAfee AntiVirus Plus. ...
  • ESET NOD32 Antivirus. ...
  • G Data Antivirus. ...
  • Malwarebytes Premium. Best for Speedy Scans. ...
  • Norton AntiVirus Plus. Best for Single-Desktop Protection. ...
  • Sophos Home Premium. Best for Thrifty Users. ...
  • F-Secure Anti-Virus. Best for No-Frills Protection. ...
  • Trend Micro Antivirus+ Security. Best for Single-PC Protection.

What is the number 1 antivirus software in the world today? ›

Our top choice for the best antivirus software is Norton 360 with LifeLock Select as it offers excellent malware protection and a ton of extra features, including an unlimited VPN and LifeLock identity protection.

Is endpoint protection enough? ›

Endpoint protection alone is not enough to protect your business against cyber threats and safeguard your data in this constantly evolving threat landscape. In fact, 70% of successful breaches begin on endpoint devices. While endpoint protection is vital, it cannot be relied upon alone.

What is endpoint security software? ›

Endpoint security is the practice of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited by malicious actors and campaigns. Endpoint security systems protect these endpoints on a network or in the cloud from cybersecurity threats.

Who is the leader in endpoint security? ›

2021 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. McAfee named a Leader in the 2021 Gartner Magic Quadrant for Endpoint Protection Platforms. Download the Magic Quadrant report, which evaluates the 19 vendors based on Ability to Execute and Completeness of Vision.

Which antivirus slows down computer the most? ›

Which antivirus software has the least system impact?
Passive slowdownFull-scan slowdown
AVG AntiVirus Free5.3%12.8%
Bitdefender Antivirus Free Edition2.2%29.2%
Bitdefender Total Security19.2%32.7%
ESET Smart Security Premium2.0%11.8%
6 more rows
29 Sept 2022

What are the 5 types of antivirus? ›

5 Best Antivirus Programs for 100% Protection | 2022 Reviews
  • Bitdefender Internet Security.
  • Norton Security.
  • McAfee.
  • Comodo Internet Security.
  • Malwarebytes.

Is Windows Defender enough in 2022? ›

Is Microsoft Defender enough for personal use? Yes, Microsoft Defender is a good enough choice for basic protection against malware.

Do I need endpoint protection? ›

There might be malicious software on your computer even if you don't see any symptoms. This type of software can collect information about you and your computer without your knowledge or consent. To help protect your privacy and your computer, you should run Windows Defender or Endpoint Protection at all times.

What is difference between endpoint security and network security? ›

As their names imply, endpoint security is deployed and operated directly on endpoints, while network security tools protect against threats traversing the corporate network. Ideally, network security products will find, block and alert on threats prior to them reaching endpoints connected to the corporate network.

Why your company uses a paid endpoint cybersecurity solution? ›

Endpoint security solutions are used by many enterprises to protect against cyber attacks. Securing endpoints is critical for keeping an enterprise's IT system safe because attackers commonly use end-user devices as an entry point to networks.

Which is best antivirus for PC? ›

  • Microsoft Defender. Best free Windows antivirus. ...
  • Sponsored - Surfshark Antivirus. Secures your device from all advanced threats. ...
  • Norton 360 With LifeLock Select. Best antivirus subscription for Windows. ...
  • Bitdefender Antivirus Free Edition. Best free antivirus alternative for Windows. ...
  • Malwarebytes.
7 Oct 2022

Is Bitdefender or Norton better? ›

Norton scored 100 percent and Bitdefender scored 99.7 percent in their online protection rates, putting Norton slightly higher than Bitdefender. Norton achieved first place out of every antivirus in this test; no other reached 100 percent.

Is Windows Defender better than McAfee? ›

In Usability, McAfee was again rated higher: 6/6 vs. 5.5/6. In the AV-Comparatives malware protection test, McAfee got the perfect “ADVANCED+” score; the Defender got the second-best with “ADVANCED.” In the real-world tests, McAfee attained the “ADVANCED” rating, while Microsoft's antivirus was rated “STANDARD.”

What is endpoint security examples? ›

Examples of endpoint security management include, but are not limited to: Managed antivirus software. Web filtering. Application/patch management.

Is endpoint security an antivirus? ›

Some products may include other features, such as anti-phishing protection or malicious URL blocking. Typically, endpoint security includes antivirus/antimalware protection, but is not limited to this level of protection.

What is host for endpoint security? ›

A hosted endpoint protection solution amounts to a business-grade antivirus and anti-malware platform, the guts of which are hosted entirely in the cloud. That means administrators log into a web console to perform scans, register users, manage licenses, and perform other daily management tasks as well as reporting.

Is Windows Defender better than Kaspersky? ›

Bottom Line: Kaspersky is a full-featured antivirus suite with a better malware scanner than Microsoft's Defender, as well as some really useful security tools. The parental controls, secure financial protections, and password manager are all surprisingly good.

Is CrowdStrike better than McAfee? ›

Choosing between CrowdStrike and McAfee

McAfee tends to have a lower learning curve and more simplified UI. Most small businesses will find that McAfee meets their needs well. CrowdStrike has a more complex system that is ideal for highly regulated industries or companies at higher risk of security attacks.

What is the best alternative to Kaspersky? ›

1. TotalAV – the best Kaspersky alternative overall. TotalAV is the best Kaspersky alternative on the market. That's because it even has a free version with an anti-malware scanner that will give you a basic level of protection.

Is Kaspersky Russian? ›

Kaspersky, one of the world's largest privately held cybersecurity companies, was founded in Russia in 1997 by Eugene Kaspersky. For the last 20 years, Kaspersky has been consistently ranked as a strong antivirus product. The company is headquartered in Moscow, Russia, with offices around the world.

Is there a better antivirus than McAfee? ›

If you don't have time to read the full McAfee vs Norton comparison, I can tell you that the winner is Norton. It boasts superior malware protection results from independent labs and better additional security features such as a VPN, cloud backup and webcam protection.

Which antivirus is best and doesn't slow down computer? ›

What's the best antivirus with low CPU and resource usage in 2022?
  1. Kaspersky. Available for Android, Mac, Windows, and iOS. ...
  2. Panda. Available for Mac, Windows, and Android. ...
  3. AVG. Free version available. ...
  4. Avast. Free version available. ...
  5. K7. One of the cheapest prices of all antiviruses on this list. ...
  6. ESET. ...
  7. Bitdefender. ...
  8. McAfee.
11 Oct 2022

What is the top 5 antivirus? ›

To help protect your Windows 11 or Windows 10 computer, here's our rating of the Best Antivirus Software of 2022:
  • #1 Bitdefender.
  • #2 Norton.
  • #3 Kaspersky.
  • #4 ESET.
  • #5 Webroot.
  • #5 Avast.
  • #5 McAfee.
  • #5 Trend Micro.
16 Sept 2022

What are 3 anti virus software? ›

The 6 Best Antivirus Software of 2022
  • Best Overall: Bitdefender Antivirus Plus.
  • Best for Windows: Norton 360 With LifeLock.
  • Best for Mac: Webroot SecureAnywhere for Mac.
  • Best for Multiple Devices: McAfee Antivirus Plus.
  • Best Premium Option: Trend Micro Antivirus+ Security.
  • Best Malware Scanning: Malwarebytes.

What are three types of antivirus? ›

What are the different types of antivirus protection?
  • Malware signature antivirus. Malware, or malicious software, installs viruses and spyware on your computer or device without your knowledge. ...
  • System monitoring antivirus. This is where system monitoring antivirus software comes into play. ...
  • Machine learning antivirus.
22 Feb 2019

Is Windows Defender enough or do I need an antivirus? ›

While it used to be terrible, over the past few years, Microsoft has really turned it around and Defender is now one of the best antivirus software solutions, free or paid, at detecting, blocking and neutralizing malware.

Can I use Windows Defender instead of antivirus? ›

Yes, Microsoft Defender can detect and remove malware, but it isn't a reliable choice for protection against zero-day threats. Microsoft Defender isn't updated regularly, meaning it isn't capable of detecting the newest malware and viruses. During my tests, Microsoft Defender detected 98% of real-time threats.

Is Windows Defender good enough for Windows 10? ›

High-quality free security products do exist, and Windows Defender is a good way to keep you and your computer safe. It is, however, not the best. For that, we recommend Bitdefender Antivirus Plus, Kaspersky Anti-Virus, and Webroot SecureAnywhere AntiVirus, among others.

Is CrowdStrike better than McAfee? ›

Choosing between CrowdStrike and McAfee

McAfee tends to have a lower learning curve and more simplified UI. Most small businesses will find that McAfee meets their needs well. CrowdStrike has a more complex system that is ideal for highly regulated industries or companies at higher risk of security attacks.

Is McAfee or ESET better? ›

McAfee has better malware detection, web protection, and customer support. If you're after some of the best web protection tools on the market, go for McAfee. ESET has advanced diagnostics tools. If you're a tech-savvy user wanting to troubleshoot your computer, go for ESET.

Which is better McAfee or Bitdefender? ›

Bitdefender is a better option compared to McAfee. It has better desktop apps, security features, and a higher VPN traffic allowance. However, McAfee is still a reliable antivirus suite which can offer great malware protection as well.

Which is better McAfee or Microsoft Defender? ›

Spoiler alert: McAfee is the best choice. Although it's not free like Microsoft Defender, McAfee ensures you get what you pay for, providing all-around protection from online threats to save you money in the longer term. Keep reading to find out how I tested both providers to select the ultimate antivirus solution.

Which is better CrowdStrike or carbon black? ›

The bottom line. Carbon Black and CrowdStrike are both solid EDR products offering comparable security. Users of both are happy, but CrowdStrike users are a little more effusive in their praise. The difference between the two is largely in CrowdStrike's wealth of advanced features – and potentially higher cost.

Is CrowdStrike better than Sophos? ›

CrowdStrike Falcon XDR is noted by MITRE testers in 2022 to have 100% performance rating in the Wizard Spider and Sandworm tests, while Sophos Intercept X edged out CrowdStrike Falcon in the 2022 SE Labs tests. While the performance ratings of both systems are exceptional, CrowdStrike does come at a higher price point.

Does CrowdStrike have antivirus? ›

CrowdStrike's cloud-native next-gen antivirus protects against all types of attacks from commodity malware to sophisticated attacks — even when offline. Falcon Prevent is fully operational in seconds, no need for signatures, fine-tuning, or costly infrastructure.

Which is better ESET or Norton? ›

Norton is well-priced and includes some great additional features. If you want the best antivirus in 2022, go with Norton. ESET has better diagnostics tools. If you're an advanced user and you often troubleshoot your PC, go with ESET.

Which is better McAfee or Kaspersky? ›

In the malware test, Kaspersky recorded a 99.90 percent success rate at protecting a PC from malware. This score ranks Kaspersky in the middle tier of all antivirus brands analyzed in this test. In the Real World Protection test, McAfee also came out on top, protecting against 99.8 percent of online threats.

What is better than ESET? ›

I also looked at AV-Comparatives latest Real-Time Protection test. In October 2021, Kaspersky was given a 99.9 percent score and ESET a 98.9 percent score, giving Kaspersky a slight edge.

Is Norton better than Bitdefender? ›

Norton scored 100 percent and Bitdefender scored 99.7 percent in their online protection rates, putting Norton slightly higher than Bitdefender. Norton achieved first place out of every antivirus in this test; no other reached 100 percent.

Which is the best total security antivirus? ›

Best Malware Scanning: Malwarebytes
  • Our Top Picks.
  • Bitdefender Antivirus Plus.
  • Norton 360 With LifeLock.
  • Webroot SecureAnywhere for Mac.
  • McAfee Antivirus Plus.
  • Trend Micro Antivirus+ Security.
  • Malwarebytes.
  • See More (3)

What country is Bitdefender from? ›

What Is Bitdefender? Bitdefender, at the top of our rating of the Best Antivirus Software of 2022 and tying for second in our rating of the Best Antivirus Software for Macs of 2022, was founded in Romania in 2001.

Is Windows Defender enough in 2022? ›

Is Microsoft Defender enough for personal use? Yes, Microsoft Defender is a good enough choice for basic protection against malware.

Is McAfee better than Norton? ›

While McAfee is a good all-round product, Norton comes in at a similar price point with better protection scores and slightly more useful security features such as a VPN, webcam protection, and ransomware protection, so I would give Norton the edge.

Does Microsoft own McAfee? ›

McAfee is part of the Intel Security division now after Intel bought McAfee in 2011. Formerly known as Microsoft Security Essentials, Windows Defender is the Microsoft proprietary antivirus and malware protection program which is a fully integrated part of the Windows 8/8.1/10 operating system.

Videos

1. Endpoint Security: Definition, Benefits, and Key Components
(Heimdal®)
2. Webinar - What's New With Endpoint Security Complete
(Symantec)
3. Best Antivirus 2022: Bitdefender vs Kaspersky vs Norton vs McAfee
(The Cyber Lab)
4. Why you should enroll your Symantec Endpoint Protection into the Cloud
(Symantec)
5. Best antivirus 2022 in 3 minutes [Recommended]
(CyberNews)
6. Top Endpoint Security Software’s in 2020 Year
(IT AMC Support Dubai)
Top Articles
Latest Posts
Article information

Author: Dan Stracke

Last Updated: 30/07/2023

Views: 6096

Rating: 4.2 / 5 (43 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Dan Stracke

Birthday: 1992-08-25

Address: 2253 Brown Springs, East Alla, OH 38634-0309

Phone: +398735162064

Job: Investor Government Associate

Hobby: Shopping, LARPing, Scrapbooking, Surfing, Slacklining, Dance, Glassblowing

Introduction: My name is Dan Stracke, I am a homely, gleaming, glamorous, inquisitive, homely, gorgeous, light person who loves writing and wants to share my knowledge and understanding with you.