getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Endpoint Protection Software - Page 3

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


103 software options

TypingDNA ActiveLock logo

Customer identity and access management

learn more
ActiveLock continuously authenticates the workforce by the way they type to ensure only authorized users are accessing company endpoints. To secure the workforce, cybersecurity teams trust TypingDNA ActiveLock to ensure no one other than the authorized employee can ever access company devices, especially in remote environments.

Read more about TypingDNA ActiveLock

Users also considered
OneLogin logo

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
Workspace ONE logo

Digital workspace platform

learn more
Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to simply and securely deliver and manage devices, apps, and data from a single, unified console, providing modern, cloud-native endpoint management and secure access to corporate resources.

Read more about Workspace ONE

Users also considered
TeamViewer ONE logo

Remote support, remote access & device management software

learn more
TeamViewer Endpoint Protection blocks malware, ransomware, and zero-day threats in real time with low system impact and easy deployment

Read more about TeamViewer ONE

Users also considered
Deep Freeze logo

Endpoint protection and remote machine management software

learn more
Deep Freeze offers developers a set of enterprise solutions to protect, manage and optimize IT assets on a cloud-based platform. Key features include device management, activity tracking, application security, maintenance and scheduling, asset administration, data protection, and power management.

Read more about Deep Freeze

Users also considered
NordLayer logo

Cloud-based network security platform for businesses

learn more
NordLayer reduces endpoint risks with Web Protection, device posture monitoring, and custom DNS. It detects jailbroken/rooted devices, blocks malicious files, and stops phishing threats, securing all endpoints across Windows, macOS, iOS, Android, and Linux.

Read more about NordLayer

Users also considered
Elastic Stack logo

Distributed search and analytics solution

learn more
Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.

Read more about Elastic Stack

Users also considered
Cisco AnyConnect logo

Virtual private network (VPN) to secure remote access

learn more
Cisco AnyConnect is a virtual private network (VPN) software designed to provide remote workforce with secure enterprise-wide network access across multiple locations and devices. Administrators can utilize the platform to identify network usage details.

Read more about Cisco AnyConnect

Users also considered
CylanceENDPOINT logo

Threat detection and endpoint protection platform

learn more
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.

Read more about CylanceENDPOINT

Users also considered
ManageEngine Vulnerability Manager Plus logo

Vulnerability management with built-in remediation

learn more
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching.

Read more about ManageEngine Vulnerability Manager Plus

Users also considered
ConnectWise SIEM logo

Threat detection and response management software

learn more
ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks & connected devices via a unified portal.

Read more about ConnectWise SIEM

Users also considered
Bitdefender GravityZone logo

Security & risk analytics platform with threat intelligence

learn more
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.

Read more about Bitdefender GravityZone

Users also considered
Splunk Enterprise logo

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
Syxsense logo

Unified Security and Endpoint Management

learn more
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.

Read more about Syxsense

Users also considered
DriveLock logo

Cloud-based tool for protecting company data & end-devices

learn more
DriveLock's endpoint protection is designed to simplify security management while providing robust protection against a wide range of cyber threats. It eliminates the complexity of managing multiple security tools, simplifying administration and reducing the potential for security breaches.

Read more about DriveLock

Users also considered
LogMeIn Central logo

Endpoint management for desktops, servers & mobile laptops

learn more
LogMeIn Central is an endpoint management solution which helps IT professionals to monitor, manage, and secure their organization's endpoint infrastructure including desktops, servers and laptops. Users can remotely deploy & automate routine IT tasks for any PC or Mac from anywhere, via any device.

Read more about LogMeIn Central

Users also considered
WebTitan logo

DNS-based web filter, malware/phishing protection & security

learn more
DNS Based Advanced Web Security Filter blocking Malware, Ransomware and Phishing attempts.

Read more about WebTitan

Users also considered
PureDome logo

Secure. Reliable. Quick.

learn more
PureDome provides comprehensive endpoint protection, securing devices and networks against cyber threats. Its VPN offers encrypted connections and dedicated IPs for access controls. The device posture check ensures only authorized devices access the network. Internet Kill Switch prevents data leaks

Read more about PureDome

Users also considered
OpenText Core Endpoint Protection​ logo

Smarter Cybersecurity Services & Solutions

learn more
OpenText™ Core Endpoint Protection secures users and devices across all the stages of a cyberattack.

Read more about OpenText Core Endpoint Protection​

Users also considered
Intercept X Endpoint logo

Endpoint protection software for security analysts

learn more
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.

Read more about Intercept X Endpoint

Users also considered
Ivanti Connect Secure logo

SSL VPN solution for secure remote access

learn more
Ivanti Connect Secure is an SSL VPN solution for remote and mobile users. It provides access from any web-enabled device to corporate resources anytime, anywhere. Ivanti Connect Secure is a widely deployed SSL VPN for organizations of any size across every major industry, offering a single unified client for remote and on-site access, easy integration with various services, and dynamic adaptive multi-factor authentication.

Read more about Ivanti Connect Secure

Users also considered
CrashPlan logo

Easy, secure, & cost-effective backup and recovery

learn more
CrashPlan serves SMBs and enterprises seeking reliable endpoint, server, Google workspace and Microsoft 365 backup to safeguard data, ensure compliance, and enable fast recovery.

Read more about CrashPlan

Users also considered
Cortex XDR logo

Threat intelligence software for security teams

learn more
Cortex XDR (formerly Traps) is a threat intelligence software designed to help security teams integrate the system with network, endpoint, third-party, and cloud data to streamline investigations and prevent cyber attacks. The platform allows administrators to identify threats, isolate endpoints, and block malware across environments.

Read more about Cortex XDR

Users also considered
Apex One logo

Endpoint protection and threat intelligence software

learn more
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers a host-based intrusion prevention system (HIPS), which enables administrators to virtually patch vulnerabilities.

Read more about Apex One

Users also considered
FortiClient logo

Endpoint protection software with behavior-based analytics

learn more
FortiClient is an endpoint protection software that helps businesses identify malicious attacks across multiple vectors, including web, USB, and email. The software inventory management module allows managers to monitor all software installed on an endpoint and remove outdated applications.

Read more about FortiClient

Users also considered