Compare Bitdefender GravityZone and Coro Cybersecurity

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Bitdefender GravityZone
Bitdefender GravityZone
Star Rating
(70)4.0 out of 5
Market Segments
Small-Business (53.6% of reviews)
Information
Entry-Level Pricing
No pricing available
Learn more about Bitdefender GravityZone
Coro Cybersecurity
Coro Cybersecurity
Star Rating
(213)4.7 out of 5
Market Segments
Mid-Market (59.4% of reviews)
Information
Entry-Level Pricing
Starting at $15.00 1 User (5 endpoint devices per user) Per Month
Free Trial is available
Browse all 5 pricing plans
Featured Products
Pricing
Entry-Level Pricing
Bitdefender GravityZone
No pricing available
Coro Cybersecurity
Coro Complete Suite
Starting at $15.00
1 User (5 endpoint devices per user) Per Month
Browse all 5 pricing plans
Free Trial
Bitdefender GravityZone
Free Trial is available
Coro Cybersecurity
Free Trial is available
Ratings
Meets Requirements
8.4
58
9.3
169
Ease of Use
8.1
59
9.5
174
Ease of Setup
8.3
48
9.7
170
Ease of Admin
7.8
46
9.5
170
Quality of Support
8.1
50
9.6
164
Has the product been a good partner in doing business?
8.1
43
9.7
170
Product Direction (% positive)
7.7
56
9.6
164
Features by Category
Network Access Control (NAC)Hide 9 FeaturesShow 9 Features
Not enough data
8.3
12
Data
Not enough data
9.2
10
Not enough data
8.9
9
Not enough data
9.1
9
Network
Not enough data
8.3
10
Not enough data
9.5
11
Not enough data
Feature Not Available
Logistics
Not enough data
Feature Not Available
Not enough data
8.3
10
Not enough data
Feature Not Available
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
Not enough data
8.7
50
Administration
Not enough data
Feature Not Available
Not enough data
8.7
45
Not enough data
8.4
45
Governance
Not enough data
8.6
40
Not enough data
9.3
43
Not enough data
9.1
47
Security
Not enough data
9.1
20
Not enough data
8.6
46
Not enough data
9.1
46
Not enough data
8.9
45
Not enough data
9.1
128
Administration
Not enough data
9.1
108
Not enough data
9.5
117
Not enough data
9.1
107
Not enough data
9.3
106
Maintenance
Not enough data
9.0
105
Not enough data
9.2
113
Not enough data
9.3
111
Not enough data
Feature Not Available
Security
Not enough data
9.2
115
Not enough data
8.7
79
Not enough data
9.1
111
Not enough data
9.1
111
Not enough data
9.4
118
Not enough data
9.0
105
Not enough data
8.9
38
Security
Not enough data
9.5
36
Not enough data
9.2
35
Not enough data
9.2
33
Not enough data
8.5
30
Compliance
Not enough data
9.0
34
Not enough data
9.3
34
Not enough data
9.5
36
Administration
Not enough data
9.2
35
Not enough data
8.9
34
Not enough data
8.5
30
Not enough data
8.8
88
Data Protection
Not enough data
Feature Not Available
Not enough data
9.0
75
Not enough data
9.0
72
Not enough data
8.9
75
Not enough data
9.3
71
Analysis
Not enough data
8.4
63
Not enough data
9.2
69
Not enough data
8.5
70
Administration
Not enough data
8.8
74
Not enough data
9.0
75
Not enough data
8.6
70
Endpoint Protection SuitesHide 12 FeaturesShow 12 Features
8.9
9
Not enough data
Administration
8.9
6
Not enough data
8.8
7
Not enough data
8.8
7
Not enough data
8.8
7
Not enough data
8.9
6
Not enough data
Functionality
9.4
6
Not enough data
9.3
7
Not enough data
8.8
7
Not enough data
9.3
7
Not enough data
Analysis
9.0
7
Not enough data
9.3
7
Not enough data
10.0
5
Not enough data
Not enough data
8.4
54
Security
Not enough data
Feature Not Available
Not enough data
8.8
47
Not enough data
8.7
46
Not enough data
8.7
47
Administration
Not enough data
8.7
48
Not enough data
7.4
18
Not enough data
8.4
47
Access Control
Not enough data
8.4
45
Not enough data
8.1
44
Not enough data
8.1
42
Not enough data
8.8
45
Cloud Security Monitoring and AnalyticsHide 10 FeaturesShow 10 Features
Not enough data
8.7
61
Activity Monitoring
Not enough data
8.4
52
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.1
53
Security
Not enough data
9.2
56
Not enough data
8.9
51
Not enough data
8.7
58
Administration
Not enough data
9.0
55
Not enough data
9.0
57
Not enough data
9.1
50
Malware Analysis ToolsHide 11 FeaturesShow 11 Features
Not enough data
9.3
56
Detection
Not enough data
9.6
54
Not enough data
9.4
49
Not enough data
9.8
52
Analysis
Not enough data
9.3
53
Not enough data
8.6
41
Not enough data
9.4
47
Not enough data
9.4
47
Response
Not enough data
9.6
52
Not enough data
9.4
51
Not enough data
9.5
49
Generative AI
Not enough data
Feature Not Available
Extended Detection and Response (XDR) PlatformsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Detection & Response
Not enough data
Not enough data
9.3
5
Not enough data
9.3
5
Not enough data
9.3
5
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Insider Threat Management (ITM)Hide 9 FeaturesShow 9 Features
Not enough data
8.9
19
Functionality
Not enough data
9.5
16
Not enough data
9.4
18
Not enough data
9.0
17
Not enough data
9.7
17
Not enough data
8.9
16
Not enough data
8.5
16
Monitoring
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.2
15
6.3
8
Not enough data
Generative AI
6.5
8
Not enough data
6.0
8
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Bitdefender GravityZone
Bitdefender GravityZone
Coro Cybersecurity
Coro Cybersecurity
Bitdefender GravityZone and Coro Cybersecurity are categorized as Endpoint Detection & Response (EDR) and Endpoint Protection Suites
Reviews
Reviewers' Company Size
Bitdefender GravityZone
Bitdefender GravityZone
Small-Business(50 or fewer emp.)
53.6%
Mid-Market(51-1000 emp.)
37.7%
Enterprise(> 1000 emp.)
8.7%
Coro Cybersecurity
Coro Cybersecurity
Small-Business(50 or fewer emp.)
37.7%
Mid-Market(51-1000 emp.)
59.4%
Enterprise(> 1000 emp.)
2.9%
Reviewers' Industry
Bitdefender GravityZone
Bitdefender GravityZone
Information Technology and Services
31.9%
Computer Software
13.0%
Computer & Network Security
7.2%
Insurance
4.3%
Hospital & Health Care
4.3%
Other
39.1%
Coro Cybersecurity
Coro Cybersecurity
Non-Profit Organization Management
9.2%
Financial Services
8.7%
Information Technology and Services
7.2%
Primary/Secondary Education
5.3%
Hospital & Health Care
3.9%
Other
65.7%
Most Helpful Reviews
Bitdefender GravityZone
Bitdefender GravityZone
Most Helpful Favorable Review
Rod W.
RW
Rod W.
Verified User in Information Technology and Services

BitDefender does it's job. It stays out of the way, doesn't hog the system, and provides informative system logs and event notifications.

Most Helpful Critical Review
Ryan C.
RC
Ryan C.
Verified User in Computer Software

I've used a variety of BitDefender products over the years and they've all had a variety of software bugs and issues that were time consuming to troubleshoot and fix. This wouldn't be a huge problem if it weren't for the fact that every single issue has...

Coro Cybersecurity
Coro Cybersecurity
Most Helpful Favorable Review
CR
Candace R.
Verified User in Legal Services

Excellent ease of use and implementation.

Most Helpful Critical Review
Verified User
G
Verified User in Financial Services

Their DLP solution is pretty lackluster. It's mostly monitor and not a whole lot of action. The response is reactive, not proactive.

Alternatives
Bitdefender GravityZone
Bitdefender GravityZone Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
SentinelOne Singularity
SentinelOne
Add SentinelOne Singularity
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Coro Cybersecurity
Coro Cybersecurity Alternatives
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
Avanan Cloud Email Security
Avanan Cloud Email Security
Add Avanan Cloud Email Security
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
BetterCloud
BetterCloud
Add BetterCloud
Discussions
Bitdefender GravityZone
Bitdefender GravityZone Discussions
How good is Bitdefender?
1 comment
RF
Bitdefender today is a complete tool and improving every day, with a great market value for small and large companies, its protections are effective and the...Read more
What is Bitdefender GravityZone used for?
1 comment
LR
GravityZone is a robust threat prevention and incident response tool that offers both endpoint management via an agent, and also a central management portal...Read more
Monty the Mongoose crying
Bitdefender GravityZone has no more discussions with answers
Coro Cybersecurity
Coro Cybersecurity Discussions
What is coronet software?
1 comment
Phil B.
PB
Coro is a cybersecurity platform.Read more
What does cybersecurity software do?
1 comment
ED
There are many things to consider with Cybersecurity software: 1. email filtering 2. user awareness training 3. EDR, XDR, NDR, etc... 4. SIEM/SOAR 5....Read more
What are the five key attributes of cybersecurity?
1 comment
Chrystian B.
CB
- Hands-free email security - Device security - Attachment protection - Sensitive data protection - Suspected bot attacks - Login trackingRead more