getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software with Endpoint Protection (2026) - Page 5

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


217 software options

Uptycs logo

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
Cynet 360 logo

Automated breach response and protection platform

learn more
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.

Read more about Cynet 360

Users also considered
Quadrant XDR logo

Around-the-clock threat detection and response

learn more
Quadrant XDR is a cloud-based security analytics platform developed by Quadrant Managed Detection and Response. It is designed to provide businesses with around-the-clock threat detection and response, curated by the highest quality Security Analysts in the industry.

Read more about Quadrant XDR

Users also considered
Nanitor logo

Vulnerability management solution

learn more
Nanitor is a powerful vulnerability management solution focusing on hardening security fundamentals across global IT infrastructure.

Read more about Nanitor

Users also considered
AppSec Education Platform logo

Hands-On Secure Coding Training for Software Developers

learn more
HackEDU is a cloud-based solution, which helps businesses manage training programs for software developers. Designed to help development teams improve code quality and meet compliance requirements, HackEDU offers customized learning paths, certifications, progress tracking, and more.

Read more about AppSec Education Platform

Users also considered
Reveelium logo

Detection and response solution

learn more
Reveelium helps users reduce the impact of incidents by responding quickly to threats with behavioral analysis, threat Intelligence, correlation and alert prioritization.

Read more about Reveelium

Users also considered
Cyrisma logo

All-in-one cyber risk management platform

learn more
CYRISMA is a revolutionary cyber risk management platform that combines multiple risk discovery, assessment and mitigation features, removing the need for organizations to integrate different single-point products to get the same outcomes.

Read more about Cyrisma

Users also considered
VaultCore logo

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
Naq Cyber logo

Revolutionise healthcare. We'll will handle the compliance.

learn more
Naq automates compliance with healthcare's most essential frameworks, including DTAC, DCB0 129, ISO 13485, ISO 27001, and more.

Read more about Naq Cyber

Users also considered
CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
PC Matic PRO logo

Endpoint security and detection solution

learn more
PC Matic Pro's whitelisting is a critical preventative layer of cyber-protection that
resides on top of other endpoint security solutions.

Read more about PC Matic PRO

Users also considered
1Fort logo

Cyber insurance made seamless

learn more
1Fort streamlines and automates the complex process for businesses to comply with the security requirements for cyber insurance, ensuring they can get coverage within a matter of weeks and become cyber resilient.

Read more about 1Fort

Users also considered
Tanium logo

Autonomous IT. Unstoppable Business.

learn more
The Tanium Autonomous IT Platform equips organizations with real-time visibility and control across their endpoint environments to make their business unstoppable.

Read more about Tanium

Users also considered
HP Wolf Security logo

Endpoint protection tool that helps manage IT infrastructure

learn more
HP Wolf Security is a comprehensive suite of products that help businesses manage their IT infrastructure and protect their data.

Read more about HP Wolf Security

Users also considered
SEKOIA.IO logo

Neutralize Cyber Threats Before Impact

learn more
SEKOIA.IO is a SecOps platform, designed to deliver comprehensive Detection and Response before impact.

Read more about SEKOIA.IO

Users also considered
Banyan Security logo

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered
Detectify logo

Vulnerability management solution for security teams

learn more
Detectify is a cybersecurity solution designed to help security teams monitor assets and identify threats across web applications. Administrators can add domains or IP addresses, verify asset ownership, and scan profiles to track vulnerabilities including DNS misconfigurations and SQL injections.

Read more about Detectify

Users also considered
Verimatrix XTD logo

Prevent, detect, respond and predict threats on mobile apps.

learn more
Verimatrix XTD employs advanced obfuscation, anti-tamper and environmental checks to shield Android and iOS mobile apps from attack. Its extensive suite of cybersecurity capabilities spans mobile, embedded, desktop, and web platforms, including browsers, JavaScript, various frameworks and libraries.

Read more about Verimatrix XTD

Users also considered
Shieldoo logo

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
Secureworks logo

Threat intelligence and cybersecurity software

learn more
Secureworks is a cybersecurity software designed to help businesses detect, investigate, and remediate threats and vulnerabilities. Key features of the platform include endpoint visibility, AI-based detections, context-based vulnerability prioritization, machine vulnerability scanning, and web application security testing.

Read more about Secureworks

Users also considered
ThreatSTOP DNS Defense logo

SaaS automated protective DNS security (PDNS)

learn more
ThreatSTOP DNS Defense enables true protective DNS (PDNS) with continuous updates from 900+ threat intelligence sources. DNS Defense turns existing DDI/IPAM or DNS Servers into security enforcement points that stop dangerous and unwanted traffic before damage is done.

Read more about ThreatSTOP DNS Defense

Users also considered
ReaQta-Hive logo

Experience Security Without Complexity

learn more
ReaQta, an IBM company, is an AI Autonomous Detection & Response platform built by AI/ML researchers and cyber security experts. ReaQta allows companies to eliminate extremely advanced endpoint threats in real-time.

Read more about ReaQta-Hive

Users also considered
TRaViS logo

AI-Driven Attack Surface Management & Threat Intelligence

learn more
TRaViS is an AI-powered External Attack Surface Management (EASM) platform that identifies, evaluates, and manages security risks across an organization's digital attack surface. It provides continuous threat exposure management, external attack surface management, and attack surface management capabilities to help organizations discover, monitor, and secure their digital assets.

Read more about TRaViS

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
Unify all your cybersecurity tools in a single console for hyperautomated real-time remediations, without human interaction. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.

Read more about TEHTRIS XDR Platform

Users also considered
InsightIDR logo

Cloud-based cybersecurity tool for developers.

learn more
InsightIDR is a cloud-based cybersecurity solution, which helps businesses in food and beverage, cosmetics, media, and other sectors manage extended detection and response (XDR) across networks. The platform provides several functions such as endpoint detection and response (EDR), threat intelligence, traffic analysis, behavioral analytics, security information and event management (SIEM), log search, and data collection.

Read more about InsightIDR

Users also considered