Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Security

Screenshots: Five overlooked enterprise grade antivirus systems

By Wally Bahny February 19, 2013, 11:58 AM PST

Image
1
of 19

Avast_1.JPG
Avast_1.JPG
Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: Avast

Five Apps: AV Managers: Avast

ntThis gallery is also available as a post in the Five Apps blog..

n

ntIn this edition of Five Apps, we take a look at five enterprise grade antivirus systems that fall just under that handful of major players.  These five systems are among the myriad of systems available.  The only requirement is that there is a centralized management console to manage and control the client-side software.

n

ntFirst up is Avast!  The admin console contains many tasks for admins to maintain and monitor their client systems.

n

ntScreenshot of Avast! console by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: Avast

Five Apps: AV Managers: Avast

ntEndpoints are easily discoverable by running a server-side task.

n

ntScreenshot of Avast! console by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: Avast

Five Apps: AV Managers: Avast

ntBuilding an installation package is easy – just check the boxes of the software pieces you want to include.

n

ntScreenshot of Avast! console by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: Avast

Five Apps: AV Managers: Avast

ntThe client software offers most common options to the end user or local admin.

n

ntScreenshot of Avast! client by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: F-Secure

Five Apps: AV Managers: F-Secure

ntEndpoint detection is fairly easy in F-Secure as well.

n

ntScreenshot of F-Secure console by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: F-Secure

Five Apps: AV Managers: F-Secure

ntA quick heads-up on the F-Secure client status.

n

ntScreenshot of F-Secure client by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: F-Secure

Five Apps: AV Managers: F-Secure

ntF-Secure also offers a nice Statistics panel.

n

ntScreenshot of F-Secure client by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: Panda

Five Apps: AV Managers: Panda

ntPanda AdminSecure’s standout feature is its built-in self-diagnosis.

n

ntScreenshot of Panda AdminSecure console by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: Panda

Five Apps: AV Managers: Panda

ntThe Panda AdminSecure console has several pie charts giving admins a nice heads-up on the status of their network.

n

ntScreenshot of Panda AdminSecure console by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: Panda

Five Apps: AV Managers: Panda

ntMonitoring historical activity is also a snap in Panda.

n

ntScreenshot of Panda AdminSecure console by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: Panda

Five Apps: AV Managers: Panda

ntThe Panda Security client software is very simple – just a notification center icon with some right-click options for system scans.

n

ntScreenshot of Panda AdminSecure client by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: VIPRE

Five Apps: AV Managers: VIPRE

ntVIPRE Business offers endpoint detection and installation options similar to the others.

n

ntScreenshot of VIPRE Business console by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: VIPRE

Five Apps: AV Managers: VIPRE

ntVIPRE Business dashboard is sparse but gives admins the information they need.

n

ntScreenshot of VIPRE Business console by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: VIPRE

Five Apps: AV Managers: VIPRE

ntThe client software displays many statistics for the end user or local admin to use.

n

ntScreenshot of VIPRE Business client by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: VIPRE

Five Apps: AV Managers: VIPRE

ntAlso available is a summary of the last system scan.

n

ntScreenshot of VIPRE Business client by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: Webroot

Five Apps: AV Managers: Webroot

ntWebroot SecureAnywhere is a cloud-only antivirus manager.  The dashboard gives admins enough information to manage their systems.

n

ntScreenshot of Webroot console by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: Webroot

Five Apps: AV Managers: Webroot

ntDetecting, deploying, and monitoring systems is also very easy with Webroot.

n

ntScreenshot of Webroot console by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: Webroot

Five Apps: AV Managers: Webroot

ntThe Webroot client, touted to be the smallest AV client in the world, offers some great statistics, including the amount of CPU time, memory, and average scan time.

n

ntScreenshot of Webroot client by Wally Bahny for TechRepublic

Screenshots: Five overlooked enterprise grade antivirus systems

Five Apps: AV Managers: Webroot

Five Apps: AV Managers: Webroot

ntRunning a scan – or checking on the status of the last one – is also very easy.

n

ntScreenshot of Webroot client by Wally Bahny for TechRepublic

  • Security
  • Account Information

    Share with Your Friends

    Screenshots: Five overlooked enterprise grade antivirus systems

    Your email has been sent

Share: Screenshots: Five overlooked enterprise grade antivirus systems
Image of Wally Bahny
By Wally Bahny
  • Account Information

    Contact Wally Bahny

    Your message has been sent

  • |
  • See all of Wally's content

TechRepublic Premium

  • TechRepublic Premium

    Identity Theft Protection Policy

    Help protect your employees and customers from identity theft. This policy from TechRepublic Premium outlines precautions for reducing risk, signs to watch out for and steps to take if you suspect identity theft has occurred. While such misfortune may not be 100% preventable for everyone who follows these guidelines (since identity theft can still occur ...

    Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Home Office Deduction Guide and Checklist

    There are rules about what qualifies as a home office, what qualifies as a deductible expense and what method should be used to calculate the deduction assuming those rules and qualifications are met. This guide, and the accompanying checklist, from TechRepublic Premium will help you navigate the twists and turns of those regulations to arrive ...

    Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Quick Glossary: Malware

    Malware is an insidious infection that will steal productivity from your enterprise and potentially wreak havoc on your network. To prevent and counteract malware, it’s important to know the terminology surrounding it. This list of terms from TechRepublic Premium will help you grasp the vocabulary that describes malware and the technology that spawns it. From ...

    Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Internet of Things Policy

    The Internet of Things continues making inroads in the business world, so organizations should have a defined IoT structure in place to ensure that data and operations are properly secured. This policy from TechRepublic Premium provides guidelines for the procurement, usage and administration of IoT devices, whether company provided or employee-owned. From the policy: Since ...

    Downloads
    Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice