App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cloud Security Software with Endpoint Protection

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

64 software options

Sponsored

Personalize your search

Any industry

Any business size

JumpCloud Directory Platform logo
4.7
(206)

A cloud directory platform for secure access to resources

visit website
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere.

Read more about JumpCloud Directory Platform

Users also considered
DNSFilter logo
4.8
(83)

Cloud-based cybersecurity and network monitoring platform

visit website
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

Users also considered
ESET Endpoint Security logo
4.7
(1.1K)

Network security, network monitoring & endpoint protection

learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
Avast Ultimate Business Security logo
4.4
(927)

Comprehensive cybersecurity and patch automation for SMB

learn more
Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure.

Read more about Avast Ultimate Business Security

Users also considered
Cloudflare logo
4.8
(442)

Performance & Security for Any Website

learn more
Cloudflare mitigates threats from website scraping to application level attacks (e.g. SQL Injection) and DDOS Protection without any additional hardware.

Read more about Cloudflare

Users also considered
Splunk Enterprise logo
4.6
(221)

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
WebTitan logo
4.5
(258)

DNS-based web filter, malware/phishing protection & security

learn more
DNS Based Advanced Web Security Filter blocking Malware, Ransomware and Phishing attempts.

Read more about WebTitan

Users also considered
GoodAccess logo
4.9
(95)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
SentinelOne logo
4.8
(79)

Autonomous endpoint protection platform

learn more
DataSet is a next-generation, autonomous endpoint/server protection platform that protects organizations against attacks utilizing key features such as machine learning, behavioral attack detection, automated responses, and real-time forensics, with complete visibility into all activity

Read more about SentinelOne

Users also considered
Perimeter 81 logo
4.8
(70)

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring remote, secure cloud access from anywhere. Secure your organization with both agent and agentless access as well as advanced security features such as Firewall as a Service, device posture security, and SWG.

Read more about Perimeter 81

Users also considered
Lookout logo
4.7
(67)

Endpoint-to-cloud security for businesses with remote teams

learn more
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.

Read more about Lookout

Users also considered
Orca Security logo
4.8
(56)

Thrive Securely in the Cloud

learn more
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across AWS, Azure, Google Cloud and Kubernetes.

Read more about Orca Security

Users also considered
GitGuardian logo
4.8
(36)

Automated Secrets Detection and Remediation

learn more
GitGuardian is helping developers and security teams secure software development with automated secrets detection & remediation for private or public source code.

Read more about GitGuardian

Users also considered
Guardio logo
4.5
(45)

Chrome extension for blocking malware and phishing attacks

learn more
Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove pop-up messages from the browser. It lets employees prevent unauthorized users from accessing web browsers and remove existing malware from devices via a unified platform.

Read more about Guardio

Users also considered
SafeDNS logo
4.7
(35)

Cloud-based web filtering and internet security software

learn more
SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions, and nonprofits protect their network against malware, phishing, inappropriate content, and more whilst maintaining compliance with statutory regulations.

Read more about SafeDNS

Users also considered
Falcon logo
4.7
(33)

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about Falcon

Users also considered
NordLayer logo
4.7
(29)

A stress-free way to secure your network.

learn more
NordLayer enforces secure access control to a company network via private gateways for encrypted data transactions and hidden traffic flow, managed endpoint permissions with MFA, and third-party authentication to ensure compliance with cloud security requirements.

Read more about NordLayer

Users also considered
Coro logo
4.6
(30)

Cybersecurity management software

learn more
Coro is a cloud-based cybersecurity application designed to help businesses in healthcare, transportation, financial and legal services, healthcare, IT, and other industries manage and secure users, devices, email, and data from cyberattacks. The platform enables organizations to ensure compliance with various governance and security policies and handle access for confidential and practice data via a unified portal.

Read more about Coro

Users also considered
Hackrate logo
5.0
(20)

Companies need ethical hackers more than ever

learn more
Secure platform to keep vulnerability reports centralized and easily manageable.

Read more about Hackrate

Users also considered
vRx logo
4.9
(19)

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Invicti logo
4.7
(18)

Security scanning & vulnerability management

learn more
Invicti, formerly Netsparker, web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.

Read more about Invicti

Users also considered
Blumira logo
4.9
(12)

Automated SIEM + XDR for IT Teams

learn more
Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Azure, Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

Read more about Blumira

Users also considered
SpinOne logo
4.6
(16)

All-in-One SaaS Security for Mission-Critical SaaS Apps

learn more
SpinOne is an all-in-one SaaS security platform that protects SaaS data for mission critical apps so that enterprises can mitigate risk, save time, reduce downtime, and improve compliance.

Read more about SpinOne

Users also considered
DataDome logo
4.5
(17)

Anti-bot protection software to block unwanted traffic

learn more
DataDome Anti-bot Protection software is a cloud-based platform designed to help businesses identify and prevent bot attacks in real-time using in-memory pattern databases along with machine learning (ML) and artificial intelligence (AI) technologies.

Read more about DataDome

Users also considered
Alert Logic MDR logo
4.5
(14)

Managed detection and response (MDR) platform

learn more
Alert Logic MDR is a managed detection and response platform that helps businesses identify, investigate, and eliminate active threats across networks, applications, and endpoint devices. Features include asset discovery, PCI scanning, behavior tracking, web log analytics & real-time reporting.

Read more about Alert Logic MDR

Users also considered