Vendor Landscape: Endpoint Anti-Malware

Endpoint protection grows up to become a fully-fledged security suite unto itself.


Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.


You are currently over the vendor limit, please adjust your weightings to equal exactly 100%.


You are currently over the product limit, please adjust your weightings to equal exactly 100%.

What matters more, the vendor score or the product score? As you weigh the importance, we will generate the vendor shortlist to match your needs.

View Vendor Shortlist

What is a shortlist?

A shortlist is a personalized list of vendors based on the criteria you define. Your shortlist offers more information about vendor's strengths, weaknesses, price-points, etc, and ranks them according to your needs.

Access this Vendor Shortlist by logging in with your Info-Tech Research Group membership or unlocking this content.


What is a Value Score?

The Value Score indexes each vendor’s product offering and business strength relative to their price point. It does not indicate vendor ranking.

Vendors that score high offer more bang for the buck (e.g. features, usability, stability, etc.) than the average vendor, while the inverse is true for those that score lower.

Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes.

Your Challenge

  • Malware is an ever-present threat that continues to grow at near exponential rates.
  • Poor Anti-Malware performance (due to malware growth) combined with a large number of vendors makes Anti-Malware selection difficult.
  • The cost of infection is such that enterprises must implement an Anti-Malware solution, but cannot afford to implement the wrong solution.

Our Advice

Critical Insight

  • Virus volumes are becoming almost unmanageable: at least by traditional measures. Reputation scanning offers the hope of a rebalancing of the protection/performance scale and is becoming ubiquitous.
  • Endpoints need protecting against more than just malware: endpoints have become a primary battlefront in the modern security war. Every step must be taken to protect them. Complete suites offer unparalleled ease of management.
  • Cheap and cheerful may not always be appropriate: cut-price solutions may be lowest on features/functionality. Evaluate on both cost and features to determine whether it’s worth spending more.

Impact and Result

Implementing feature-rich endpoint Anti-Malware solutions is the most significant step that enterprises can take to mitigate risk. Selecting the optimal solution ensures the greatest level of protection, and therefore the greatest reduction in risk.


  • Allan Williams, Director, The Australian National University
  • Chris Laing, Team Member, Ontario Shores Centre for Mental Health Science
  • Emmanuel Quaicoe, Supervisor, AGL
  • Ellen Earhart, Consultant, Educational Services
  • Rakesh Pandey, Supervisor, NTT Data Inc.
  • Bruce Rusk, Manager, Tatua Co-Operative Dairy Company
  • Matthew P. Arnold, Consultant, Teen Challenge Inc.

Get the Complete Storyboard

See how all the steps you need to take come together, with tools and advice to help with each task on your list.

Download Now

Get to Action

  1. Understand the Endpoint Anti-Malware market space

    Understand Endpoint Anti-Malware solutions, their capabilities, and cost.

  2. Review Endpoint Anti-Malware solutions

    Build a shortlist of best-fit Endpoint Anti-Malware tools for the enterprise.

Guided Implementation Icon Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

  • Book an Analyst Call on this topic. You can start as early as tomorrow morning. Our analysts will explain the process in your first call.
  • Get advice from a subject matter expert. Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and setting the direction for your next project step.

Schedule Your First Call


  • Missing comment
    Philip Egeberg | 10-12-2010

    Great Storyboard. Thank you.

  • Missing comment
    Brett Ogletree | 09-25-2012

    How can you rate endpoint malware protection without including its track-record for effectiveness?

    • 9eb6a2810126f534ebf65557616f34d1 comment
      Info-Tech Research Group | 09-27-2012

      Thank you for your comment. As noted in response to another comment on this same solution set, though the relative effectiveness of core scanning capabilities is an important aspect of any anti-malware solution, such analyses are available from a variety of free sources. With that in mind, Info-Tech’s evaluation of the product space has focused on additional advanced features that address broader requirements as expressed by our diverse client base. That said, your request for a greater focus on the core aspects of anti-malware solutions will be considered thoroughly during our regular agenda planning activities.

  • Missing comment
    Walter Lefmann | 05-23-2014

    "Last Revised: September 18, 2012
    ... this is ancient in terms of the fast-moving information security field ...

    • 35cf646e37f9d3618eeca1a4ac6f70be comment
      Info-Tech Research Group | 05-23-2014

      Thank you for your comment. We are currently in the midst of completing our Endpoint Protection Vendor Landscape, which will replace our anti-malware research content. It will be published this summer.

Hide Details

Search Code: 23791
Published: July 15, 2010
Last Revised: September 18, 2012

GET HELP Contact Us
VL Methodology