This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

SafeDNS vs Falcon Comparison

Search

Add to Compare

Recommended for you

Splunk Enterprise

ESET Endpoint Security

SecureAnywhere

Keeper Business

Orca Security

SpamTitan

Good recommendations?

Overview

Category Leaders

SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions,...

Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Video & Screenshots

Pricing

Starting from
$

80

/yryear
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based
Starting from

No info

  • Free trial available
  • No credit card required
  • Free account
  • Subscription based

User reviews

4.7

5

4

3

2

1

26

6

0

0

1

  • Value for money
  • Ease of use
  • Features
  • Customer support
97%
would recommend this app

4.7

5

4

3

2

1

10

2

1

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

Pros

We have been using this software for years and are very happy with the results. School and Parents are grateful for the safety this software brings to us.

RP

Ruth P.

The product is easy to use. It is installed on public computers and is very successful in keeping the children at the library safe while using a computer.

MJ

Mary Jo P.

Im happy with it, the more I know how it works the better use I can get from it.

JA

Jorge A.

Pros

Detailed analysis of processes, logon attempts, and great ability to sync with Splunk and Active Directory. Great dashboard to add to the best parts.

Anshuman B.

The support team is very responsive and helps guide us through any issues we have. They also help clear up what is a rather complex, information filled portal.

MH

Matt H.

Good interface, lots of Splunk dashboards integrated in the dashboards. Good drilldown capability.

AR

Anonymous Reviewer

Cons

End user does not know what is wrong or if something is being blocked; and yes, there is a blocked page warning configured.

SL

SHERMAN L.

Generally, we use this to prevent accidents. An accident might be someone opening a site that is inappropriate for the workplace, and expose the client to workplace harassment claims.

DS

David S.

Even the scanners have limited access to the wan, our personnel found a way to navigate to not work-related webpages.

LC

Leonides C.

Cons

Sometimes it is not update automatically, and I had some problems to remove the software, the key that is used to install/remove fails sometimes.

André L.

When you are in a limited bandwidth with a higher number of PC’s this will cause too high bandwidth utilization and can interrupt your operation.

AR

Anonymous Reviewer

Diagnosing malware threats, attack vectors and root-cause was never easier.

AR

Anonymous Reviewer

  • Vendor responds to reviews
  • Last review2 days ago
  • Vendor responds to reviews
  • Last review14 days ago

Key features

  • Total features33
  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Management
  • Application Security
  • Audit Trail
  • Bandwidth Monitoring
  • Behavioral Analytics
  • Billing & Invoicing
  • Categorization/Grouping
  • Container Scanning
  • Continuous Integration
  • Continuous Monitoring
  • Credential Management
  • Dashboard
  • Data Security
  • Data Visualization
  • Database Support
  • Device Management
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Logs
  • Event Tracking
  • Filtering
  • IOC Verification
  • IP Filtering
  • IT Incident Management
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Investigation Management
  • Live Chat
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Resource Management
  • Network Security
  • Performance Monitoring
  • Policy Management
  • Prioritization
  • Privileged Account Management
  • Real Time Monitoring
  • Real Time Reporting
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Root Cause Analysis
  • Runtime Container Security
  • Scheduling
  • Search/Filter
  • Server Monitoring
  • Signature Matching
  • Status Tracking
  • Task Management
  • Task Scheduling
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • VPN
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Total features69
  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Management
  • Application Security
  • Audit Trail
  • Bandwidth Monitoring
  • Behavioral Analytics
  • Billing & Invoicing
  • Categorization/Grouping
  • Container Scanning
  • Continuous Integration
  • Continuous Monitoring
  • Credential Management
  • Dashboard
  • Data Security
  • Data Visualization
  • Database Support
  • Device Management
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Logs
  • Event Tracking
  • Filtering
  • IOC Verification
  • IP Filtering
  • IT Incident Management
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Investigation Management
  • Live Chat
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Resource Management
  • Network Security
  • Performance Monitoring
  • Policy Management
  • Prioritization
  • Privileged Account Management
  • Real Time Monitoring
  • Real Time Reporting
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Root Cause Analysis
  • Runtime Container Security
  • Scheduling
  • Search/Filter
  • Server Monitoring
  • Signature Matching
  • Status Tracking
  • Task Management
  • Task Scheduling
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • VPN
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting

Integrations

  • Total integrationsN/A
  • Axonius
  • Azure Active Directory
  • Box
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft Teams
  • Okta
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk
  • Total integrations4
  • Axonius
  • Azure Active Directory
  • Box
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft Teams
  • Okta
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk