App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cloud Security Software with Endpoint Management

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

80 software options

Sponsored

Personalize your search

Any industry

Any business size

Guardz logo
5.0
(4)

Cybersecurity solution

visit website
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
CloudAware logo
4.5
(2)

Cloud management platform for enterprise IT teams

visit website
CloudAware is a cloud management platform designed to help enterprise IT teams deploy and manage applications across Amazon, Azure, and Google Cloud platforms. Key features include data collection, custom fields, filtered views, data encryption, tag management, and analytics.

Read more about CloudAware

Users also considered
JumpCloud Directory Platform logo
4.7
(206)

A cloud directory platform for secure access to resources

visit website
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere.

Read more about JumpCloud Directory Platform

Users also considered
DNSFilter logo
4.8
(83)

Cloud-based cybersecurity and network monitoring platform

visit website
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

Users also considered
ESET Endpoint Security logo
4.7
(1.1K)

Network security, network monitoring & endpoint protection

learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
Avast Ultimate Business Security logo
4.4
(927)

Comprehensive cybersecurity and patch automation for SMB

learn more
Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure.

Read more about Avast Ultimate Business Security

Users also considered
Duo Security logo
4.7
(511)

User identity verification & device vulnerability discovery

learn more
Duo Security provides a Trusted Access platform offering multiple two-factor authentication methods, mobile apps, and an Access Gateway for Single Sign-On (SSO)

Read more about Duo Security

Users also considered
SpamTitan logo
4.6
(525)

Anti-spam filter for business email. Vital email security.

learn more
SpamTitan is an anti-spam email security solution that identifies & blocks phishing, malware, spear phishing, malicious and spam emails to protect business email, with multi-layered analysis and authentication. 5 Star product with great pricing and amazing front line support

Read more about SpamTitan

Users also considered
Splunk Enterprise logo
4.6
(221)

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
WebTitan logo
4.5
(258)

DNS-based web filter, malware/phishing protection & security

learn more
DNS Based Advanced Web Security Filter blocking Malware, Ransomware and Phishing attempts.

Read more about WebTitan

Users also considered
Safetica logo
4.7
(128)

Data loss prevention and insider threat protection solution

learn more
Safetica provides on-premise (Safetica ONE) and cloud-native (Safetica NXT) data loss prevention and insider threat protection solutions that help companies keep their data safe and align with regulations.

Read more about Safetica

Users also considered
GoodAccess logo
4.9
(95)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
Perimeter 81 logo
4.8
(70)

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring remote, secure cloud access from anywhere. Secure your organization with both agent and agentless access as well as advanced security features such as Firewall as a Service, device posture security, and SWG.

Read more about Perimeter 81

Users also considered
OneLogin logo
4.6
(90)

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
Lookout logo
4.7
(67)

Endpoint-to-cloud security for businesses with remote teams

learn more
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.

Read more about Lookout

Users also considered
Orca Security logo
4.8
(56)

Thrive Securely in the Cloud

learn more
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across AWS, Azure, Google Cloud and Kubernetes.

Read more about Orca Security

Users also considered
Guardio logo
4.5
(45)

Chrome extension for blocking malware and phishing attacks

learn more
Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove pop-up messages from the browser. It lets employees prevent unauthorized users from accessing web browsers and remove existing malware from devices via a unified platform.

Read more about Guardio

Users also considered
SafeDNS logo
4.7
(35)

Cloud-based web filtering and internet security software

learn more
SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions, and nonprofits protect their network against malware, phishing, inappropriate content, and more whilst maintaining compliance with statutory regulations.

Read more about SafeDNS

Users also considered
Falcon logo
4.7
(33)

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about Falcon

Users also considered
BooleBox logo
4.6
(33)

Secure file sharing and data protection platform

learn more
Boolebox is a cloud-based and on-premise data protection platform designed to help organizations across finance, research, healthcare, IT and various other sectors archive, synchronize, and securely share data across multiple devices.

Read more about BooleBox

Users also considered
NordLayer logo
4.7
(29)

A stress-free way to secure your network.

learn more
NordLayer enforces secure access control to a company network via private gateways for encrypted data transactions and hidden traffic flow, managed endpoint permissions with MFA, and third-party authentication to ensure compliance with cloud security requirements.

Read more about NordLayer

Users also considered
Workspace ONE logo
4.7
(27)

Digital workspace platform

learn more
Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to simply and securely deliver and manage devices, apps, and data from a single, unified console, providing modern, cloud-native endpoint management and secure access to corporate resources.

Read more about Workspace ONE

Users also considered
Coro logo
4.6
(30)

Cybersecurity management software

learn more
Coro is a cloud-based cybersecurity application designed to help businesses in healthcare, transportation, financial and legal services, healthcare, IT, and other industries manage and secure users, devices, email, and data from cyberattacks. The platform enables organizations to ensure compliance with various governance and security policies and handle access for confidential and practice data via a unified portal.

Read more about Coro

Users also considered
vRx logo
4.9
(19)

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Trend Micro Deep Security logo
4.4
(22)

Cloud-based security platform to identify & remediate threat

learn more
Trend Micro Deep Security is a cloud-based platform, which helps businesses across government, healthcare, and manufacturing industries detect threats and enable security across virtual, cloud, physical, and container environments.

Read more about Trend Micro Deep Security

Users also considered