What is Dell Endpoint Security?
Dell™ solutions for endpoint security can block annoying spam and malware, find potential endpoint vulnerabilities and encrypt the enterprise data residing on endpoints. Designed to streamline management, Dell solutions enable you to keep your data and network safe without adding administrative complexity.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceDell Endpoint Security Ratings
Real user data aggregated to summarize the product performance and customer experience.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
80 Likeliness to Recommend
90 Plan to Renew
67 Satisfaction of Cost Relative to Value
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+84 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love Dell Endpoint Security?
Pros
- Trustworthy
- Fair
- Altruistic
- Security Protects
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Cross Platform Integration
Port and Device Control
Cross Platform Support
Host NGFW Functionality
Ransomware Recovery and Removal
Endpoint Detection and Response
Mac OS support
Centralized Management Portal
Application Containment Mechanisms
System Hardening
Kernel Monitoring
Vendor Capability Ratings
Usability and Intuitiveness
Ease of IT Administration
Business Value Created
Ease of Data Integration
Ease of Implementation
Product Strategy and Rate of Improvement
Quality of Features
Availability and Quality of Training
Ease of Customization
Vendor Support
Breadth of Features
Dell Endpoint Security Reviews
Sameer a.
- Role: Information Technology
- Industry: Banking
- Involvement: End User of Application
Submitted Mar 2024
Easy to use and easy to learn
Likeliness to Recommend
What differentiates Dell Endpoint Security from other similar products?
User interface
What is your favorite aspect of this product?
End point security
What do you dislike most about this product?
Nothing to dislike
What recommendations would you give to someone considering this product?
Easy to learn and service easy available
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
- Role: Information Technology
- Industry: Finance
- Involvement: IT Development, Integration, and Administration
Submitted Nov 2023
This was the worst product from Dell ever
Likeliness to Recommend
Pros
- Performance Enhancing
- Enables Productivity
- Trustworthy
- Unique Features
Cons
- Less Effective Service
- Less Inspiring
- Less Reliable
Jennifer-lee K.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Leader or Manager
Submitted Jul 2023
It is easy to use tool for security protection.
Likeliness to Recommend
What differentiates Dell Endpoint Security from other similar products?
Endpoint security protects against a wide range of cyber threats, including viruses, malware, ransomware, spyware, and phishing attempts. Identifying and preventing these threats at the endpoint level helps protect critical data and assures the network’s overall security. Data encryption and data loss prevention are common components of endpoint security systems. This means that even if a device is lost or stolen, the data contained within it remains unavailable to unauthorized individuals, lowering the risk of data breaches.
What is your favorite aspect of this product?
I like having all of the sites and apps I use in one location; they are also secure, so my information is protected and secure. Signing in with a single log-in for all of my apps saves me time and effort from having to open them all in separate windows. This helps to keep my tabs organized and my virtual workspace neat. It is secure and simple to add new apps. It has added an extra layer of protection to all of my apps, and their utility has grown. The apps operate well, and it is convenient to have all of my apps secure in one app.
What do you dislike most about this product?
What I detest about Dell Endpoint is that it sometimes takes a long time to load my tool. Another thing is that my credentials were not always recognized, although I understand this is for account security. Apart from that, everything in this tool works perfectly.
What recommendations would you give to someone considering this product?
I enjoy how Dell includes all of the tools I require. Dell can support many applications and function as a one-stop shop because I can access all of these things by logging in to a single application. Dell endpoint additionally maintains the security of my account by requiring verification and authentication before signing in. This is also incredibly user-friendly and simple to use. It is not extremely customizable, which isn’t a deal breaker, but it is something that might be improved. It occasionally freezes, but not always, and it may take some time to reply.
Pros
- Continually Improving Product
- Reliable
- Performance Enhancing
- Trustworthy