If you are currently using VIPRE Endpoint Security Server or any other server-based/on-premise editions of VIPRE, you may be wondering what benefits and drawbacks you might experience if you move to VIPRE Endpoint Security Cloud. This article will help you decide.
Benefits
VIPRE Cloud is hosted as a service in the Cloud. This presents you with a number of benefits, including:
- There is no longer a need to purchase, configure, and maintain an on-premise server to host your VIPRE console
- You always have the latest user interface design and a simplified user experience
- Cloud-scale threat analytics and visualization
- VIPRE console access from anywhere, using any Internet-enabled device
Since VIPRE Cloud uses our existing, proven, agent-based malware protection, you also get nearly all the benefits of VIPRE Endpoint Security Server.
Product Feature Comparison
Endpoint Product Feature Comparison
The table below compares the features of all versions of VIPRE's Endpoint Security product line.
Feature | Endpoint Security Server | ESC | EDR | EDR+MDR |
---|---|---|---|---|
Early Blocking | ||||
DNS Protection |
❌ |
❌ |
❌ |
❌ |
Enhanced DNS Protection | ✅ |
✅ |
✅ |
✅ |
Web Access Control | ❌ |
✅ |
✅ |
✅ |
Malicious URL Blocking | ✅ |
✅ |
✅ |
✅ |
Malicious Content Blocking | ✅ |
✅ |
✅ |
✅ |
Removable Device Control (e.g. USB) | ✅ |
✅ |
✅ |
✅ |
Removable Device Encryption | ✅ |
❌ |
❌ |
❌ |
Client Firewall | ✅ |
✅ |
✅ |
✅ |
Patch Management | ✅ |
❌ |
❌ |
❌ |
Vulnerability and Patch Management | ❌ |
✅ |
✅ |
✅ |
Signature-based Detection | ✅ |
✅ |
✅ |
✅ |
Deep Scanning | ||||
Email Anti-Spam | ✅ |
✅ |
✅ |
✅ |
Email Anti-Phishing | ✅ |
✅ |
✅ |
✅ |
Email Anti-Malware | ✅ |
✅ |
✅ |
✅ |
File/Attachment Scanning | ✅ |
✅ |
✅ |
✅ |
On-Access Active Protection | ✅ |
✅ |
✅ |
✅ |
Pre-execution Behavior Analysis/HIPS | ✅ |
✅ |
✅ |
✅ |
Malicious Traffic Detection (IDS) | ✅ |
✅ |
✅ |
✅ |
Browser Exploit Prevention (via PM/AAP) | ✅ |
✅ |
✅ |
✅ |
Application Exploit Prevention (via PM/AAP) | ✅ |
✅ |
✅ |
✅ |
Unprotected Device Discovery | ✅ |
❌ |
❌ |
❌ |
Active Threat Hunting | ||||
Runtime Behavior Analysis/HIPS | ✅ |
✅ |
✅ |
✅ |
Advanced Active Protection (ML Behavior Analysis) | ✅ |
✅ |
✅ |
✅ |
Ransomware and Zero-day Detection | ✅ |
✅ |
✅ |
✅ |
Low CPU and Memory Usage | ✅ |
✅ |
✅ |
✅ |
Containment | ||||
Process Blocking | ✅ |
✅ |
✅ |
✅ |
Quarantine | ✅ |
✅ |
✅ |
✅ |
Device Isolation | ❌ |
❌ |
✅ |
✅ |
Investigate and Remove | ||||
Automated Malware Removal/Quarantine | ✅ |
✅ |
✅ |
✅ |
False Positive Exclusion | ✅ |
✅ |
✅ |
✅ |
Custom Malware Analysis | ✅ |
✅ |
✅ |
✅ |
Custom Malware Removal | ✅ |
✅ |
✅ |
✅ |
Forensic File Sandbox | ❌ | ❌ | ✅ |
✅ |
Forensic URL Sandbox | ❌ | ❌ | ✅ |
✅ |
Incident Management | ❌ | ❌ | ✅ |
✅ |
Event Analysis | ❌ | ❌ | ✅ |
✅ |
MITRE ATT&CK Mappings | ❌ | ❌ | ✅ |
✅ |
Root Cause Analysis | ❌ | ❌ | ✅ |
✅ |
Raw Event Telemetry | ❌ | ❌ | ✅ |
✅ |
Remediation | ||||
Remote Endpoint Management Shell | ❌ | ❌ | ✅ |
✅ |
Custom Remediation | ✅ |
✅ |
✅ |
✅ |
Ransomware Recovery | ❌ | ❌ | ✅ |
✅ |
Management | ||||
Centralized Policy Management | ✅ |
✅ |
✅ |
✅ |
On-premise Management Server | ✅ |
❌ | ❌ | ❌ |
Cloud-based Roaming Support | ✅ |
✅ |
✅ |
✅ |
Simple and Intuitive Cloud-based Console | ❌ | ✅ |
✅ |
✅ |
Web-based Responsive Console | ❌ | ✅ |
✅ |
✅ |
Managed Detection & Response | ||||
24x7x365 monitoring and incident coverage | ❌ | ❌ |
❌ |
✅ |
Incident Response | ❌ | ❌ |
❌ |
✅ |
Quarterly security reports | ❌ | ❌ |
❌ |
✅ |
IT Security Expects | ❌ | ❌ |
❌ |
✅ |
Other Features | ||||
Management Reporting | ✅ |
✅ |
✅ |
✅ |
Two-factor authentication | ❌ |
✅ |
✅ |
✅ |
Partner Features (via VIPRE Site Manager) | ||||
Multi-tenancy | ❌ | ✅ |
✅ |
✅ |
Self-service Tenant Creation | ❌ | ✅ |
✅ |
✅ |
SSO to Tenant Sites | ❌ | ✅ |
✅ |
✅ |
Shared Policies | ❌ | ✅ |
✅ |
✅ |
Migration Considerations
Your threat data will be hosted in the cloud - VIPRE Cloud retains only basic system information such as hostnames and IP addresses, and it uses highly secure Amazon Web Services and a secure multi-tenant design. Nevertheless, some industries and countries are subject to regulations restricting what information can be stored outside the physical organization's environment. Review your local policies about Cloud services, and ask us if you have any questions.