getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Endpoint Protection Software

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


83 software options

NinjaOne logo

Unified endpoint management & IT automation platform

visit website
NinjaOne Endpoint Management enables IT organizations of all sizes and experience levels to take a more proactive approach to IT management, which yields significant efficiency gains, improved user satisfaction and a stronger security posture.

Read more about NinjaOne

Users also considered
JumpCloud Directory Platform logo

A cloud directory platform for secure access to resources

visit website
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere.

Read more about JumpCloud Directory Platform

Users also considered
ManageEngine Endpoint Central logo

Desktop, mobile device & patch management software

visit website
Endpoint Central (formerly Desktop Central) from ManageEngine is an integrated desktop & mobile device management application that enables the centralized management of desktops, servers, laptops, tablets & smartphones.

Read more about ManageEngine Endpoint Central

Users also considered
Versa SASE logo

Connect. Protect. Simplify.

visit website
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
Action1 logo

Patching That Just Works

visit website
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.

Read more about Action1

Users also considered
ReaQta-Hive logo

Experience Security Without Complexity

learn more
ReaQta, an IBM company, is an AI Autonomous Detection & Response platform built by AI/ML researchers and cyber security experts. ReaQta allows companies to eliminate extremely advanced endpoint threats in real-time.

Read more about ReaQta-Hive

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
Securely manage Wireless WANs with NetCloud Manager: zero trust, AI insights, SD-WAN, and zero-touch deployment.

Read more about Ericsson NetCloud Manager

Users also considered
Quantum Network Security logo

Network security suite for cyber attack threat prevention

learn more
Quantum Network Security is a scalable suite of solutions that protect against Gen V cyber attacks across networks, endpoints, clouds, data centers, and more. The suite provides a unified management platform, SandBlast threat prevention, hyper-scale networking, plus VPN and IoT security. Quantum Network Security also offers security gateway appliances that can be installed in-office.

Read more about Quantum Network Security

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
condignum logo

Cloud-based compliance management solution

learn more
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.

Read more about condignum

Users also considered
INLYSE Malware.AI logo

VISUAL AI BASED MALWARE DETECTION

learn more
INLYSE Malware.AI is a revolutionary visual AI-based malware detection solution that utilizes cutting-edge technology to convert files into graphical representations and analyze them comprehensively for any signs of malware.

Read more about INLYSE Malware.AI

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
GateKeeper Enterprise logo

Shared PC authentication, proximity, 2FA/MFA wireless token.

learn more
GateKeeper Enterprise is an access management software which helps businesses in healthcare, manufacturing, and other industries handle proximity-based authentication for PCs and websites. It enables organizations to automatically lock employees’ unattended devices and securely store passwords.

Read more about GateKeeper Enterprise

Users also considered
UTunnel VPN logo

Cloud VPN, Zero Trust Network Access, and Mesh Networking

learn more
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!

Read more about UTunnel VPN

Users also considered
RoboShadow logo

Global Vulnerability Scanner. Cyber Security, Demystified.

learn more
Get a complete Internal & External Vulnerability Assessment for Free for your organisation or network. The RoboShadow Vulnerability Scanner platform give you all the main Cyber Security assessment tests that are common in Penetration Testing, Cyber Certifications and used by bad guys themselves.

Read more about RoboShadow

Users also considered
DriveStrike logo

Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

Users also considered
GoodAccess logo

Zero Trust Architecture as a Service

learn more
Cybersecurity platform (SASE/SSE) that enables easy Zero Trust Architecture implementation for medium enterprises, any scale.

Read more about GoodAccess

Users also considered
Huntress logo

Cloud-based cybersecurity platform

learn more
Huntress is a cloud-based cybersecurity platform, which helps organizations track threats, vulnerabilities, and exploits. With its dashboard, security professionals can monitor active incidents, review investigations, receive custom incident reports, and respond to threats in an automated manner.

Read more about Huntress

Users also considered
Rippling logo

Workforce management across HR, finance, and IT. 

learn more
Rippling is a cloud-based workforce management system that helps businesses manage operations across HR, finance, and IT.

Read more about Rippling

Users also considered
Chimpa logo

Unified Endpoint Manageme software for iOS & Android devices

learn more
Chimpa UEM helps manage, monitor, and secure various Android and iOS-based devices like digital signage, interactive displays, service kiosks, single-purpose devices, and more. Users can protect devices from unauthorized access, data theft, and intrusion using role-based permissions.

Read more about Chimpa

Users also considered
Sealit logo

Full Security - Just 1 Click.

learn more
Sealit protects your data, no matter how it's shared. End-to-end email and file encryption for small businesses or individuals.

Read more about Sealit

Users also considered
Password Depot  logo

The oustanding password manager.

learn more
Password Depot is a password management solution that helps businesses ensure optimal protection for sensitive data. The application allows users to safeguard passwords, documents, identities, debit or credit cards, and more with AES Rijndael 256 double encryption. It generates secure passwords and automates data entry, eliminating the need for manual typing. Users can access their passwords across multiple devices, including Windows, Mac, iOS, and Android.

Read more about Password Depot

Users also considered
DNSFilter logo

Cloud-based cybersecurity and network monitoring platform

learn more
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

Users also considered
1Password logo

Password manager for businesses and families

learn more
1Password protects all company secrets such as passwords, security tokens, 2FA codes, documents, and passkeys to centralize and simplify the sign-in experience. Developers have access to features that help secure secrets and speed up workflows throughout the software development life cycle.

Read more about 1Password

Users also considered
Malwarebytes for Business logo

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered