GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.
Read more about ESET Endpoint Security
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.
Read more about Intercept X Endpoint
GoodAccess creates a secure network infrastructure that hides your business systems, assets and resources from the internet. In 10 minutes you create a private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.
Read more about GoodAccess
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.
Read more about Action1
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!
Read more about UTunnel VPN
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.
Read more about Lookout
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.
Read more about BlackBerry CylancePROTECT
Designed for businesses of all sizes, WatchGuard Endpoint Security is a cloud-based computer security software that helps businesses protect systems against cyber threats and detect endpoint malware through a unified platform
Read more about WatchGuard Endpoint Security
Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove pop-up messages from the browser. It lets employees prevent unauthorized users from accessing web browsers and remove existing malware from devices via a unified platform.
Read more about Guardio
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.
Read more about Falcon
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers a host-based intrusion prevention system (HIPS), which enables administrators to virtually patch vulnerabilities.
Read more about Apex One
Cisco Secure Endpoint is a detection and response security solution that provides XDR capabilities, endpoint investigations, incident management, and more to prevent cyber attacks. With integrated vulnerability management and built in ThreatX hunting, Cisco Scure Endpoint pinpoints the origin of attacks to keep systems functional while thwarting harmful malware.
Read more about Cisco Secure Endpoint
Cortex XDR (formerly Traps) is a threat intelligence software designed to help security teams integrate the system with network, endpoint, third-party, and cloud data to streamline investigations and prevent cyber attacks. The platform allows administrators to identify threats, isolate endpoints, and block malware across environments.
Read more about Cortex XDR
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.
Read more about Beyond DLP
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.
Read more about ManageEngine EventLog Analyzer
Quantum Network Security is a scalable suite of solutions that protect against Gen V cyber attacks across networks, endpoints, clouds, data centers, and more. The suite provides a unified management platform, SandBlast threat prevention, hyper-scale networking, plus VPN and IoT security. Quantum Network Security also offers security gateway appliances that can be installed in-office.
Read more about Quantum Network Security
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events.
Read more about Dhound
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management.
Read more about Fyde