getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Endpoint Protection Software - Page 5

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


165 software options

PureDome logo

Secure. Reliable. Quick.

learn more
PureDome provides comprehensive endpoint protection, securing devices and networks against cyber threats. Its VPN offers encrypted connections and dedicated IPs for access controls. The device posture check ensures only authorized devices access the network. Internet Kill Switch prevents data leaks

Read more about PureDome

Users also considered
Endpoint Detection and Response logo

Endpoint detection and response software

learn more
Endpoint Detection and Response is an endpoint protection software designed to help managed service providers (MSPs) automatically detect and mitigate zero-day attacks. Administrators can create custom policies to protect the system against ransomware attacks and restore data in real-time.

Read more about Endpoint Detection and Response

Users also considered
DataDome logo

Anti-bot protection software to block unwanted traffic

learn more
DataDome Anti-bot Protection software is a cloud-based platform designed to help businesses identify and prevent bot attacks in real-time using in-memory pattern databases along with machine learning (ML) and artificial intelligence (AI) technologies.

Read more about DataDome

Users also considered
Symantec Enterprise Cloud logo

Cybersecurity platform for threat protection

learn more
Symantec Enterprise Cloud is a cybersecurity platform that provides integrated solutions for various challenges faced by organizations. The system offers data-centric hybrid security for organizations both on-premises and in the cloud. Symantec Enterprise Cloud is designed to provide consistent compliance, secure remote work, and data and threat protection.

Read more about Symantec Enterprise Cloud

Users also considered
Detego Digital Forensics logo

Digital forensics and investigation management software

learn more
Detego Digital Forensics is designed to help law enforcement units, intelligence agencies, and corporate enterprises extract information from PCs, removable storage, and mobile devices. It enables forensic teams to automate workflows, manage documents, and generate customer reports via a unified platform.

Read more about Detego Digital Forensics

Users also considered
OpenText Core Endpoint Protection​ logo

Smarter Cybersecurity Services & Solutions

learn more
OpenText™ Core Endpoint Protection secures users and devices across all the stages of a cyberattack.

Read more about OpenText Core Endpoint Protection​

Users also considered
Intercept X Endpoint logo

Endpoint protection software for security analysts

learn more
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.

Read more about Intercept X Endpoint

Users also considered
Ivanti Connect Secure logo

SSL VPN solution for secure remote access

learn more
Ivanti Connect Secure is an SSL VPN solution for remote and mobile users. It provides access from any web-enabled device to corporate resources anytime, anywhere. Ivanti Connect Secure is a widely deployed SSL VPN for organizations of any size across every major industry, offering a single unified client for remote and on-site access, easy integration with various services, and dynamic adaptive multi-factor authentication.

Read more about Ivanti Connect Secure

Users also considered
CrashPlan logo

Easy, secure, & cost-effective backup and recovery

learn more
CrashPlan serves SMBs and enterprises seeking reliable endpoint, server, Google workspace and Microsoft 365 backup to safeguard data, ensure compliance, and enable fast recovery.

Read more about CrashPlan

Users also considered
Cortex XDR logo

Threat intelligence software for security teams

learn more
Cortex XDR (formerly Traps) is a threat intelligence software designed to help security teams integrate the system with network, endpoint, third-party, and cloud data to streamline investigations and prevent cyber attacks. The platform allows administrators to identify threats, isolate endpoints, and block malware across environments.

Read more about Cortex XDR

Users also considered
Apex One logo

Endpoint protection and threat intelligence software

learn more
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers a host-based intrusion prevention system (HIPS), which enables administrators to virtually patch vulnerabilities.

Read more about Apex One

Users also considered
FortiClient logo

Endpoint protection software with behavior-based analytics

learn more
FortiClient is an endpoint protection software that helps businesses identify malicious attacks across multiple vectors, including web, USB, and email. The software inventory management module allows managers to monitor all software installed on an endpoint and remove outdated applications.

Read more about FortiClient

Users also considered
Acronis Cyber Protect logo

Integrated data protection and cybersecurity in one solution

learn more
Acronis Cyber Protect brings together data protection and cybersecurity in one, easy-to-use solution.

Read more about Acronis Cyber Protect

Users also considered
Cisco Umbrella logo

Cloud-based enterprise network security solution

learn more
Cisco Umbrella is an enterprise network security solution that provides DNS-layer security to block threats before connections are established. The platform includes features such as secure web gateway, cloud access security broker, data loss prevention, cloud-delivered firewall, and malware protection. It leverages threat intelligence from Cisco Talos and operates on a global cloud infrastructure to protect users and devices across multiple locations.

Read more about Cisco Umbrella

Users also considered
ManageEngine ADAudit Plus logo

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a change audit software that provides detailed reports for changes made in Windows Active Directory and real-time compliance audits.

Read more about ManageEngine ADAudit Plus

Users also considered
Acunetix logo

Cloud-based and automated web application security solution

learn more
Acunetix is a cybersecurity solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
Guardio logo

Chrome extension for blocking malware and phishing attacks

learn more
Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove pop-up messages from the browser. It lets employees prevent unauthorized users from accessing web browsers and remove existing malware from devices via a unified platform.

Read more about Guardio

Users also considered
WatchGuard Endpoint Security logo

Cloud-based endpoint protection and computer security tool

learn more
Designed for businesses of all sizes, WatchGuard Endpoint Security is a cloud-based computer security software that helps businesses protect systems against cyber threats and detect endpoint malware through a unified platform

Read more about WatchGuard Endpoint Security

Users also considered
Symantec Endpoint Security logo

Protect Your Business

learn more
Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes.

Read more about Symantec Endpoint Security

Users also considered
PureVPN logo

Secured VPN service offering limitless, anonymous web access

learn more
Pure VPN, and PureVPN for Business, is a Virtual Private Network (VPN) for all platforms including Windows, Mac, Linux, iOS and Android that provides 256-bit secured, anonymous and P2P-enabled access to unrestricted internet browsing with features including IP address masking, split tunneling & more

Read more about PureVPN

Users also considered
KACE Systems Management Appliance logo

IT asset management software

learn more
KACE SMA is an IT management software that helps businesses manage servers, software licenses, endpoint security, servers, and more. The platform enables managers to understand the patching state of each of the devices in the asset inventory using a security dashboard.

Read more about KACE Systems Management Appliance

Users also considered
ManageEngine Browser Security Plus logo

Enterprise browser security tool for IT administrators

learn more
Browser Security Plus, a robust enterprise browser security tool from ManageEngine, empowers IT administrators to manage and fortify browsers efficiently within network infrastructures. Offering a comprehensive suite of features, this tool provides crucial insights into browser usage trends and add-on activities. With Browser Security Plus, IT administrators can elevate their control over browsers, fortifying the overall security posture of the enterprise's web ecosystem.

Read more about ManageEngine Browser Security Plus

Users also considered
ISS logo

Cloud-based compliance management solution

learn more
INSSIDE Security Suite is a leading cloud-based platform in regulatory compliance solutions, designed by collaborators, allowing companies to manage risks, and facilitating the creation of reports, analysis, and monitoring of compliance processes.

Read more about ISS

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
XDR / EDR is a powerful endpoint security solution that includes real-time monitoring and collection of endpoint security data with an automated threat response mechanism.
Its missions are: detecting known and unknown attacks, launch remediations and provide advanced investigation features.

Read more about TEHTRIS XDR Platform

Users also considered
Banyan Security logo

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered