Company Phone Number

877-332-3250

Open Source Solutions

Which AV to Choose?

Each of the endpoint security solutions sold and supported by ICE Systems was carefullly selected becuase it can provide effective protection for our customers.

The criteria for inclusion in our list is based on a combination of internal testing, qualified independent research and technical feedback. More info ...

While all these brands are capable, each posses strenths in specific areas. Some features, functionality or behavior may be of greater importance to certain users. With this in mind, we would like to offer some general guidelines for selecting the right product for your company.

Under each product logo you will find some bulleted items that designate the key strengths of the software. We have focused on attributes such as detection rates, centralized management, resource utilization and value / pricing.


 

  • Excellent Detection Rates
  • Excellent Centralized Management
  • Powerful heuristics and machine learning
  • Available Enterprise Inspector w/EDR
  • Scalable to Large Installations
  • Device Control
  • Data Encryption

 

  • Advanced new protection using AI
  • Complete visibility in to all activity
  • Single, Llightweight Autonomous Agent
  • Pre-excution Defense, White / Blacklisting
  • Real-time Forensic Analysis, Mitigation and Remediation
  • Robust, Cloud-based, Centralized Mangement

  • Good detection Rates
  • Excellent Centralized Management
  • Cloud edition available
  • Intercept X Advanced Protecion
  • Deep Integration w/Perimeter Defense
  • Device Control
  • Data Encryption
  • DLP

 

  •  
  • Excellent Detection Rates
  • Strong Centralized Management
  • ATC / IDS Ransomware Defense
  • Cloud Support
  • Scalable to Large Installations
  • Device Control
  • Support for Virtualized Infrastructure
  • Offload Scanning Option

  • Excellent Detection Rates
  • Excellent Centralized Management
  • Ransomware Protection & Remediation
  • Scalable to Large Installations
  • Unique Virtualization Technology
  • Device Control
  • Encryption
  • Application Whitelisting/Program Control

   

  • Good detection Rates
  • Extremely Light and Fast
  • True Cloud-Based Implementation
  • Agressive pricing

  • Specilized, Atypical Threat Detection
  • Run Alonside Standard AV Product
  • Small Fooprint, low resource utilization
  • Active and Passive (on demand) Editions