getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Endpoint Protection Software - Page 3

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


119 software options

Lookout logo

Endpoint-to-cloud security for businesses with remote teams

learn more
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.

Read more about Lookout

Users also considered
Avast Premium Business Security logo

Premium online security and privacy protection for SMB

learn more
Avast Premium Business Security combines our next-gen antivirus with VPN and USB control to help your employees and their devices stay more private and safer online, as well as offline. 

Read more about Avast Premium Business Security

Users also considered
ESET Endpoint Security logo

Network security, network monitoring & endpoint protection

learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
Cisco Secure Endpoint logo

Endpoint Detection and Response Security Solution

learn more
Cisco Secure Endpoint is a detection and response security solution that provides XDR capabilities, endpoint investigations, incident management, and more to prevent cyber attacks. With integrated vulnerability management and built in ThreatX hunting, Cisco Scure Endpoint pinpoints the origin of attacks to keep systems functional while thwarting harmful malware.

Read more about Cisco Secure Endpoint

Users also considered
TypingDNA ActiveLock logo

Customer identity and access management

learn more
ActiveLock continuously authenticates the workforce by the way they type to ensure only authorized users are accessing company endpoints. To secure the workforce, cybersecurity teams trust TypingDNA ActiveLock to ensure no one other than the authorized employee can ever access company devices, especially in remote environments.

Read more about TypingDNA ActiveLock

Users also considered
OneLogin logo

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
Workspace ONE logo

Digital workspace platform

learn more
Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to simply and securely deliver and manage devices, apps, and data from a single, unified console, providing modern, cloud-native endpoint management and secure access to corporate resources.

Read more about Workspace ONE

Users also considered
TeamViewer ONE logo

Remote support, remote access & device management software

learn more
TeamViewer Endpoint Protection blocks malware, ransomware, and zero-day threats in real time with low system impact and easy deployment

Read more about TeamViewer ONE

Users also considered
Deep Freeze logo

Endpoint protection and remote machine management software

learn more
Deep Freeze offers developers a set of enterprise solutions to protect, manage and optimize IT assets on a cloud-based platform. Key features include device management, activity tracking, application security, maintenance and scheduling, asset administration, data protection, and power management.

Read more about Deep Freeze

Users also considered
NordLayer logo

Cloud-based network security platform for businesses

learn more
NordLayer reduces endpoint risks with Web Protection, device posture monitoring, and custom DNS. It detects jailbroken/rooted devices, blocks malicious files, and stops phishing threats, securing all endpoints across Windows, macOS, iOS, Android, and Linux.

Read more about NordLayer

Users also considered
Incapsula logo

Safer, Faster Website

learn more
Incapsula is a cloud-based web application security platform to optimize, protect and enhance website performance. It allows website traffic to route through Incapsula’s global network of high-powered servers that accelerate outgoing traffic and optimize it for faster load times.

Read more about Incapsula

Users also considered
Elastic Stack logo

Distributed search and analytics solution

learn more
Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.

Read more about Elastic Stack

Users also considered
ManageEngine Vulnerability Manager Plus logo

Vulnerability management with built-in remediation

learn more
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching.

Read more about ManageEngine Vulnerability Manager Plus

Users also considered
Bitdefender GravityZone logo

Security & risk analytics platform with threat intelligence

learn more
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.

Read more about Bitdefender GravityZone

Users also considered
Splunk Enterprise logo

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
Commvault Cloud logo

Total Resilience. No Exceptions.

learn more
Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid
enterprise at the lowest TCO, in the face of ransomware and other cyber threats.

Read more about Commvault Cloud

Users also considered
Syxsense logo

Unified Security and Endpoint Management

learn more
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.

Read more about Syxsense

Users also considered
DriveLock logo

Cloud-based tool for protecting company data & end-devices

learn more
DriveLock's endpoint protection is designed to simplify security management while providing robust protection against a wide range of cyber threats. It eliminates the complexity of managing multiple security tools, simplifying administration and reducing the potential for security breaches.

Read more about DriveLock

Users also considered
Microsoft Defender XDR logo

Cross-domain threat protection with built-in AI

learn more
Microsoft 365 Defender is an automated, cross-domain security solution that leverages the power of the Microsoft 365 security portfolio to automatically analyze threat data across domains, building a complete picture of each attack in a single dashboard. Microsoft 365 Defender is part of Microsoft’s XDR (extend, defend, recover) strategy and aims to provide global visibility into the data generated by existing security solutions.

Read more about Microsoft Defender XDR

Users also considered
ACMP Suite logo

Keep clients running!

learn more
In a world full of unpredictability, choosing the right partner is crucial. We are your guide on the path to greater simplicity and efficiency. ACMP offers modular and scalable solutions for your specific challenges in the IT department.

Read more about ACMP Suite

Users also considered
Powertech Antivirus logo

Virus protection solution for Linux, AIX, and IBM i

learn more
Fortra's Powertech Antivirus is a cloud-based solution which provides malware protection to Linux, IBM i and AIX power servers from viruses, malware threats and worms. It lets users detect and resolve data privacy threats to save valuable IT resources, whilst ensuring enterprise compliance.

Read more about Powertech Antivirus

Users also considered
LogMeIn Central logo

Endpoint management for desktops, servers & mobile laptops

learn more
LogMeIn Central is an endpoint management solution which helps IT professionals to monitor, manage, and secure their organization's endpoint infrastructure including desktops, servers and laptops. Users can remotely deploy & automate routine IT tasks for any PC or Mac from anywhere, via any device.

Read more about LogMeIn Central

Users also considered
WebTitan logo

DNS-based web filter, malware/phishing protection & security

learn more
DNS Based Advanced Web Security Filter blocking Malware, Ransomware and Phishing attempts.

Read more about WebTitan

Users also considered
Dhound logo

Web security monitoring & intrusion detection tool

learn more
Dhound is a security monitoring and intrusion detection tool for internet facing servers, clouds and web applications.

Read more about Dhound

Users also considered
Cisco Secure Cloud Analytics logo

Network security software for on-premise & cloud environment

learn more
Cisco Secure Cloud Analytics is a network security software, designed to help businesses automatically track threats across on-premises and cloud environments. It allows users to monitor internal and external threats, malware, policy violations, misconfigured cloud assets, blacklisted communication, and user misuse.

Read more about Cisco Secure Cloud Analytics

Users also considered