The table below compares the features of all versions of VIPRE's Endpoint Security product line.
Feature | Endpoint Security Server | ESC | EDR | EDR+MDR |
---|---|---|---|---|
Early Blocking | ||||
DNS Protection |
❌ |
❌ |
❌ |
❌ |
Enhanced DNS Protection | ✅ |
✅ |
✅ |
✅ |
Web Access Control | ❌ |
✅ |
✅ |
✅ |
Malicious URL Blocking | ✅ |
✅ |
✅ |
✅ |
Malicious Content Blocking | ✅ |
✅ |
✅ |
✅ |
Removable Device Control (e.g. USB) | ✅ |
✅ |
✅ |
✅ |
Removable Device Encryption | ✅ |
❌ |
❌ |
❌ |
Client Firewall | ✅ |
✅ |
✅ |
✅ |
Patch Management | ✅ |
❌ |
❌ |
❌ |
Vulnerability and Patch Management | ❌ |
✅ |
✅ |
✅ |
Signature-based Detection | ✅ |
✅ |
✅ |
✅ |
Deep Scanning | ||||
Email Anti-Spam | ✅ |
✅ |
✅ |
✅ |
Email Anti-Phishing | ✅ |
✅ |
✅ |
✅ |
Email Anti-Malware | ✅ |
✅ |
✅ |
✅ |
File/Attachment Scanning | ✅ |
✅ |
✅ |
✅ |
On-Access Active Protection | ✅ |
✅ |
✅ |
✅ |
Pre-execution Behavior Analysis/HIPS | ✅ |
✅ |
✅ |
✅ |
Malicious Traffic Detection (IDS) | ✅ |
✅ |
✅ |
✅ |
Browser Exploit Prevention (via PM/AAP) | ✅ |
✅ |
✅ |
✅ |
Application Exploit Prevention (via PM/AAP) | ✅ |
✅ |
✅ |
✅ |
Unprotected Device Discovery | ✅ |
❌ |
❌ |
❌ |
Active Threat Hunting | ||||
Runtime Behavior Analysis/HIPS | ✅ |
✅ |
✅ |
✅ |
Advanced Active Protection (ML Behavior Analysis) | ✅ |
✅ |
✅ |
✅ |
Ransomware and Zero-day Detection | ✅ |
✅ |
✅ |
✅ |
Low CPU and Memory Usage | ✅ |
✅ |
✅ |
✅ |
Containment | ||||
Process Blocking | ✅ |
✅ |
✅ |
✅ |
Quarantine | ✅ |
✅ |
✅ |
✅ |
Device Isolation | ❌ |
❌ |
✅ |
✅ |
Investigate and Remove | ||||
Automated Malware Removal/Quarantine | ✅ |
✅ |
✅ |
✅ |
False Positive Exclusion | ✅ |
✅ |
✅ |
✅ |
Custom Malware Analysis | ✅ |
✅ |
✅ |
✅ |
Custom Malware Removal | ✅ |
✅ |
✅ |
✅ |
Forensic File Sandbox | ❌ | ❌ | ✅ |
✅ |
Forensic URL Sandbox | ❌ | ❌ | ✅ |
✅ |
Incident Management | ❌ | ❌ | ✅ |
✅ |
Event Analysis | ❌ | ❌ | ✅ |
✅ |
MITRE ATT&CK Mappings | ❌ | ❌ | ✅ |
✅ |
Root Cause Analysis | ❌ | ❌ | ✅ |
✅ |
Raw Event Telemetry | ❌ | ❌ | ✅ |
✅ |
Remediation | ||||
Remote Endpoint Management Shell | ❌ | ❌ | ✅ |
✅ |
Custom Remediation | ✅ |
✅ |
✅ |
✅ |
Ransomware Recovery | ❌ | ❌ | ✅ |
✅ |
Management | ||||
Centralized Policy Management | ✅ |
✅ |
✅ |
✅ |
On-premise Management Server | ✅ |
❌ | ❌ | ❌ |
Cloud-based Roaming Support | ✅ |
✅ |
✅ |
✅ |
Simple and Intuitive Cloud-based Console | ❌ | ✅ |
✅ |
✅ |
Web-based Responsive Console | ❌ | ✅ |
✅ |
✅ |
Managed Detection & Response | ||||
24x7x365 monitoring and incident coverage | ❌ | ❌ |
❌ |
✅ |
Incident Response | ❌ | ❌ |
❌ |
✅ |
Quarterly security reports | ❌ | ❌ |
❌ |
✅ |
IT Security Expects | ❌ | ❌ |
❌ |
✅ |
Other Features | ||||
Management Reporting | ✅ |
✅ |
✅ |
✅ |
Two-factor authentication | ❌ |
✅ |
✅ |
✅ |
Partner Features (via VIPRE Site Manager) | ||||
Multi-tenancy | ❌ | ✅ |
✅ |
✅ |
Self-service Tenant Creation | ❌ | ✅ |
✅ |
✅ |
SSO to Tenant Sites | ❌ | ✅ |
✅ |
✅ |
Shared Policies | ❌ | ✅ |
✅ |
✅ |