getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Endpoint Protection Software - Page 5

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


119 software options

Imperva Sonar logo

Unified cybersecurity platform for IT professionals

learn more
Imperva Sonar is a unified cybersecurity platform that provides fully integrated protection for applications and databases against emerging, automated, and insider attacks. It can be used to protect critical databases, applications, websites, and, APIs.
The Imperva Sonar platform includes behavioral analysis, threat prevention, data governance, cloud discovery, bot management, plus other types of protective technology.

Read more about Imperva Sonar

Users also considered
BUFFERZONE logo

Network security and endpoint protection solution

learn more
BUFFERZONE is a security solutions suite based on Protection by Containment that creates an isolated virtual environment for users to securely access potentially risky content such as web pages, email attachments, links, or external files.

Read more about BUFFERZONE

Users also considered
Heimdal Endpoint Detection and Response (EDR) logo

Seamless Endpoint Detection and Response Software

learn more
Heimdal Endpoint Detection and Response is our take on unified EDR software that integrates six of our most popular cybersecurity modules: Heimdal Threat Prevention, Patch & Asset Management, Ransomware Encryption Protection, Next-Gen Antivirus, Privileged Access Management, and Application Control.

Read more about Heimdal Endpoint Detection and Response (EDR)

Users also considered
Chariot logo

Cybersecurity platform on the offensive.

learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
Todyl Security Platform logo

Cloud-based cybersecurity platform

learn more
Todyl is an all-in-one cloud-based cybersecurity platform that lets users identify threats, protect data, simplify architectures, and more.

Read more about Todyl Security Platform

Users also considered
EndpointOps logo

Unified endpoint protection and management solution

learn more
Zirozen unified Endpoint management solution provides comprehensive visibility across endpoints and helps users keep endpoint safe and secure.

Read more about EndpointOps

Users also considered
Armor logo

Ransomware and endpoint protection tool for SMBs

learn more
Multi-layered anti-ransomware solution preventing ransomware before it even starts, working alongside EDR/EPP/XDR agents.

Read more about Armor

Users also considered
AnySecura logo

Endpoint security and user activity monitoring solution

learn more
AnySecura is a user activity monitoring solution that enables organizations to safeguard their critical information with integrated DLP, endpoint protection, and auditing. It helps build a secure and compliant operational environment.

Read more about AnySecura

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden lets you remove local administrator rights & control applications on Windows and Mac endpoints to keep them safe against cyberattacks.

Read more about Securden

Users also considered
Crowdsec logo

Let's make the Internet safer, together.

learn more
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.

Read more about Crowdsec

Users also considered
Securden Endpoint Privilege Manager logo

Endpoint privilege access management solution

learn more
Securden Windows Privilege Manager helps eliminate local admin rights from all endpoints. Control, track application usage, and reduce threats across your organization. Enforce Zero-trust, prevent malware propagation, and fortify your IT infrastructure against ransomware attacks.

Read more about Securden Endpoint Privilege Manager

Users also considered
Hypori Halo logo

Securing the world at work from any device, anywhere.

learn more
Hypori Halo is an app-accessible, separate, and secure mobile workspace delivering encrypted access to enterprise apps and data from any smartphone or tablet.

Read more about Hypori Halo

Users also considered
zIPS logo

Software to manage secure access across mobile devices

learn more
Zimperium zIPS is a mobile threat defense (MTD) software designed to that helps enterprises provide and manage secure access to data and company systems across employees' mobile devices and applications.

Read more about zIPS

Users also considered
DarkSight logo

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered
Securden Unified PAM logo

Access Governance redefined for Hybrid environments

learn more
Protect your windows servers and devices from cyberattacks. Eliminate local administrator rights across all endpoints seamlessly. Use automated privilege elevation to raise requests to applications and allow your users and employees to access what they need, without a hassle.

Read more about Securden Unified PAM

Users also considered
ManageEngine Endpoint DLP Plus logo

Monitor and protect sensitive data across endpoints

learn more
ManageEngine Endpoint DLP Plus is an enterprise-ready solution that monitors the transfer and usage of sensitive data across the business IT network. The solution supports advanced data discovery and classification techniques such as Fingerprint, RegEx, and keywords search, through which sensitive data is identified and protected across the different endpoints in your organization.

Read more about ManageEngine Endpoint DLP Plus

Users also considered
Security.Desk logo

Endpoint Detection and Response

learn more
End-to-end service management solution for IT asset inventory administration, configuration, and compliance management.

Read more about Security.Desk

Users also considered
BroShield logo

Computer security and parental control software

learn more
BroShield is a computer security and parental control software that helps individuals and families block inappropriate sites, schedule screen times, restrict activities, receive suspicious activity alerts, and more from within a unified platform. It allows users to monitor activities in real-time, restrict adult websites, set up web firewalls, manage robotic troubleshooting, and handle other processes.

Read more about BroShield

Users also considered
SURFSecurity logo

A secure identity-first zero-trust enterprise browser

learn more
BYOD and cloud-adoption is making it hard for CISOs to track and secure remote environments, forcing them to add tools to their growing security stack. SURF's zero-trust enterprise browser collapses the security stack into one single control point, ensuring that security starts at the user identity.

Read more about SURFSecurity

Users also considered