getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Endpoint Protection Software - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


103 software options

Heimdal XDR logo

Unified analysis and incident response center

learn more
Heimdal XDR empowers security and IT teams to respond faster to threats and adversaries by supplying them with advanced threat intelligence, bi-lateral telemetry, advanced forensics details, ransomware process details, and more. End-to-end consolidated and unified security.

Read more about Heimdal XDR

Users also considered
ESET PROTECT MDR logo

Future ready protection for enterprise

learn more
Uninterrupted endpoint protection for business with 250+ employees, multiplatform cyber risk management and 24/7 ESET expertise on call

Read more about ESET PROTECT MDR

Users also considered
Sealit logo

Full Security - Just 1 Click.

learn more
Sealit protects your data, no matter how it's shared. End-to-end email and file encryption for small businesses or individuals.

Read more about Sealit

Users also considered
Cynet 360 logo

Automated breach response and protection platform

learn more
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.

Read more about Cynet 360

Users also considered
Beyond DLP logo

Product Data Protection Beyond Boundaries

learn more
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.

Read more about Beyond DLP

Users also considered
SentinelOne logo

Protect your Endpoints, Cloud, and Data

learn more
SentinelOne delivers autonomous cybersecurity powered by AI, enabling real-time prevention, detection, and response to threats across endpoints, cloud workloads, and identity systems—empowering organizations to stay ahead of cyberattacks with speed, visibility, and control.

Read more about SentinelOne

Users also considered
VMware Cloud Director Availability logo

Streamline your Cloud Migration and Disaster Recovery

learn more
VMware Cloud Director Availability provides replications and failover at a vApp or virtual machine level. VMware Cloud Director Availability is a unified solution, that provides on-premises to cloud and cloud to cloud onboarding, migration, and disaster recovery for multi-tenant cloud sites.

Read more about VMware Cloud Director Availability

Users also considered
Password Depot  logo

The oustanding password manager.

learn more
Password Depot is a password management solution that helps businesses ensure optimal protection for sensitive data. The application allows users to safeguard passwords, documents, identities, debit or credit cards, and more with AES Rijndael 256 double encryption. It generates secure passwords and automates data entry, eliminating the need for manual typing. Users can access their passwords across multiple devices, including Windows, Mac, iOS, and Android.

Read more about Password Depot

Users also considered
Perimeter 81 logo

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. Features such as Device Posture Check allow for endpoint protection, identity management, and advanced remote security.

Read more about Perimeter 81

Users also considered
DNSFilter logo

Cloud-based cybersecurity and network monitoring platform

learn more
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

Users also considered
1Password logo

Password manager for businesses and families

learn more
1Password protects all company secrets such as passwords, security tokens, 2FA codes, documents, and passkeys to centralize and simplify the sign-in experience. Developers have access to features that help secure secrets and speed up workflows throughout the software development life cycle.

Read more about 1Password

Users also considered
SafeDNS logo

Cloud-based web filtering and internet security software

learn more
SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions, and nonprofits protect their network against malware, phishing, inappropriate content, and more whilst maintaining compliance with statutory regulations.

Read more about SafeDNS

Users also considered
Safetica logo

Intelligent Data Security

learn more
Safetica monitors your endpoints and protects them against insider threats and data breaches.

Read more about Safetica

Users also considered
Senturo logo

Senturo: Secure, Track, & Manage Your IT Fleet

learn more
Senturo protects Android, Apple, Chromebook & Windows devices with advanced security tools: location tracking, geofencing, & IP whitelisting. Track your fleet in real-time, enforce geo-compliance, & send urgent device alerts - all from a unified platform, ensuring ulimate IT fleet control.

Read more about Senturo

Users also considered
Malwarebytes for Business logo

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
Unitrends Backup logo

Data backup, recovery and protection solution

learn more
Unitrends endpoint protection, protects the data of your on-the-go workforce & remote servers with simple, secure cloud backup. Features include pattern recognition, predictive analytics, email alerts, and data replication and deduplication.

Read more about Unitrends Backup

Users also considered
CleanMyMac logo

An app for all Mac situations.

learn more
CleanMyMac is the Apple-notarized way to tidy up your Mac. All the tools for essential computer care, in a sleek interface that makes cleaning actually fun.

Read more about CleanMyMac

Users also considered
inDefend logo

Enterprises, SMEs & Startups

learn more
inDefend Advanced secures endpoints by preventing data leaks, monitoring user activity, and enforcing encryption. It provides real-time alerts, access controls, and deep visibility into file transfers, ensuring complete protection against insider threats and unauthorized data exfiltration.

Read more about inDefend

Users also considered
Security Event Manager logo

SIEM solution for small to large organizations

learn more
Security Event Manager is a security information and event management (SIEM) solution, which assists small to large organizations with threat detection and response management. Key features include event log forwarding, reporting, file integrity, and device monitoring.

Read more about Security Event Manager

Users also considered
Uptycs logo

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
Teramind logo

Employee Monitoring, UAM, ITM & IRM, DLP, and Compliance.

learn more
Teramind is a unified employee monitoring, insider threat detection, data loss prevention, compliance and governance solution. Track digital interactions, optimize productivity, monitor privileged users, to enforce policies, prevent IP and data leaks and maintain and prove regulatory compliance.

Read more about Teramind

Users also considered
Lookout logo

Endpoint-to-cloud security for businesses with remote teams

learn more
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.

Read more about Lookout

Users also considered
Avast Premium Business Security logo

Premium online security and privacy protection for SMB

learn more
Avast Premium Business Security combines our next-gen antivirus with VPN and USB control to help your employees and their devices stay more private and safer online, as well as offline. 

Read more about Avast Premium Business Security

Users also considered
ESET Endpoint Security logo

Network security, network monitoring & endpoint protection

learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
Cisco Secure Endpoint logo

Endpoint Detection and Response Security Solution

learn more
Cisco Secure Endpoint is a detection and response security solution that provides XDR capabilities, endpoint investigations, incident management, and more to prevent cyber attacks. With integrated vulnerability management and built in ThreatX hunting, Cisco Scure Endpoint pinpoints the origin of attacks to keep systems functional while thwarting harmful malware.

Read more about Cisco Secure Endpoint

Users also considered