The table below compares the features of all versions of VIPRE's Endpoint Security product line.
| Feature | Endpoint Security Server | ESC | EDR | EDR+MDR |
|---|---|---|---|---|
Early Blocking | ||||
DNS Protection |
❌ |
❌ |
❌ |
❌ |
| Enhanced DNS Protection | ✅ |
✅ |
✅ |
✅ |
| Web Access Control | ❌ |
✅ |
✅ |
✅ |
| Malicious URL Blocking | ✅ |
✅ |
✅ |
✅ |
| Malicious Content Blocking | ✅ |
✅ |
✅ |
✅ |
| Removable Device Control (e.g. USB) | ✅ |
✅ |
✅ |
✅ |
| Removable Device Encryption | ✅ |
❌ |
❌ |
❌ |
| Client Firewall | ✅ |
✅ |
✅ |
✅ |
| Patch Management | ✅ |
❌ |
❌ |
❌ |
| Vulnerability and Patch Management | ❌ |
✅ |
✅ |
✅ |
| Signature-based Detection | ✅ |
✅ |
✅ |
✅ |
Deep Scanning | ||||
| Email Anti-Spam | ✅ |
✅ |
✅ |
✅ |
| Email Anti-Phishing | ✅ |
✅ |
✅ |
✅ |
| Email Anti-Malware | ✅ |
✅ |
✅ |
✅ |
| File/Attachment Scanning | ✅ |
✅ |
✅ |
✅ |
| On-Access Active Protection | ✅ |
✅ |
✅ |
✅ |
| Pre-execution Behavior Analysis/HIPS | ✅ |
✅ |
✅ |
✅ |
| Malicious Traffic Detection (IDS) | ✅ |
✅ |
✅ |
✅ |
| Browser Exploit Prevention (via PM/AAP) | ✅ |
✅ |
✅ |
✅ |
| Application Exploit Prevention (via PM/AAP) | ✅ |
✅ |
✅ |
✅ |
| Unprotected Device Discovery | ✅ |
❌ |
❌ |
❌ |
Active Threat Hunting | ||||
| Runtime Behavior Analysis/HIPS | ✅ |
✅ |
✅ |
✅ |
| Advanced Active Protection (ML Behavior Analysis) | ✅ |
✅ |
✅ |
✅ |
| Ransomware and Zero-day Detection | ✅ |
✅ |
✅ |
✅ |
| Low CPU and Memory Usage | ✅ |
✅ |
✅ |
✅ |
Containment | ||||
| Process Blocking | ✅ |
✅ |
✅ |
✅ |
| Quarantine | ✅ |
✅ |
✅ |
✅ |
| Device Isolation | ❌ |
❌ |
✅ |
✅ |
Investigate and Remove | ||||
| Automated Malware Removal/Quarantine | ✅ |
✅ |
✅ |
✅ |
| False Positive Exclusion | ✅ |
✅ |
✅ |
✅ |
| Custom Malware Analysis | ✅ |
✅ |
✅ |
✅ |
| Custom Malware Removal | ✅ |
✅ |
✅ |
✅ |
| Forensic File Sandbox | ❌ | ❌ | ✅ |
✅ |
| Forensic URL Sandbox | ❌ | ❌ | ✅ |
✅ |
| Incident Management | ❌ | ❌ | ✅ |
✅ |
| Event Analysis | ❌ | ❌ | ✅ |
✅ |
| MITRE ATT&CK Mappings | ❌ | ❌ | ✅ |
✅ |
| Root Cause Analysis | ❌ | ❌ | ✅ |
✅ |
| Raw Event Telemetry | ❌ | ❌ | ✅ |
✅ |
Remediation | ||||
| Remote Endpoint Management Shell | ❌ | ❌ | ✅ |
✅ |
| Custom Remediation | ✅ |
✅ |
✅ |
✅ |
| Ransomware Recovery | ❌ | ❌ | ✅ |
✅ |
Management | ||||
| Centralized Policy Management | ✅ |
✅ |
✅ |
✅ |
| On-premise Management Server | ✅ |
❌ | ❌ | ❌ |
| Cloud-based Roaming Support | ✅ |
✅ |
✅ |
✅ |
| Simple and Intuitive Cloud-based Console | ❌ | ✅ |
✅ |
✅ |
| Web-based Responsive Console | ❌ | ✅ |
✅ |
✅ |
Managed Detection & Response | ||||
| 24x7x365 monitoring and incident coverage | ❌ | ❌ |
❌ |
✅ |
| Incident Response | ❌ | ❌ |
❌ |
✅ |
| Quarterly security reports | ❌ | ❌ |
❌ |
✅ |
| IT Security Expects | ❌ | ❌ |
❌ |
✅ |
Other Features | ||||
| Management Reporting | ✅ |
✅ |
✅ |
✅ |
| Two-factor authentication | ❌ |
✅ |
✅ |
✅ |
Partner Features (via VIPRE Site Manager) | ||||
| Multi-tenancy | ❌ | ✅ |
✅ |
✅ |
| Self-service Tenant Creation | ❌ | ✅ |
✅ |
✅ |
| SSO to Tenant Sites | ❌ | ✅ |
✅ |
✅ |
| Shared Policies | ❌ | ✅ |
✅ |
✅ |