getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Endpoint Protection Software with Access Controls/Permissions (2026) - Page 5

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


124 software options

Detego Digital Forensics logo

Digital forensics and investigation management software

learn more
Detego Digital Forensics is designed to help law enforcement units, intelligence agencies, and corporate enterprises extract information from PCs, removable storage, and mobile devices. It enables forensic teams to automate workflows, manage documents, and generate customer reports via a unified platform.

Read more about Detego Digital Forensics

Users also considered
Cisco Secure Cloud Analytics logo

Network security software for on-premise & cloud environment

learn more
Cisco Secure Cloud Analytics is a network security software, designed to help businesses automatically track threats across on-premises and cloud environments. It allows users to monitor internal and external threats, malware, policy violations, misconfigured cloud assets, blacklisted communication, and user misuse.

Read more about Cisco Secure Cloud Analytics

Users also considered
PureDome logo

Secure. Reliable. Quick.

learn more
PureDome provides comprehensive endpoint protection, securing devices and networks against cyber threats. Its VPN offers encrypted connections and dedicated IPs for access controls. The device posture check ensures only authorized devices access the network. Internet Kill Switch prevents data leaks

Read more about PureDome

Users also considered
Seqrite Centralized Security Management logo

Enhancing security with insight-led control

learn more
HawkkEye is a centralized security management platform that strengthens an organization's security posture through a unified dashboard. It offers enterprise-grade capabilities like threat intelligence, simplified investigation via real-time dashboards, consolidated management of endpoints, and advanced threat protection.

Read more about Seqrite Centralized Security Management

Users also considered
ManageEngine Application Control Plus logo

Endpoint protection tool for security teams.

learn more
ManageEngine Application Control Plus is a cloud-based and on-premise software that enables businesses to gain control over software usage and mitigate security risks.

Read more about ManageEngine Application Control Plus

Users also considered
Venn logo

Secure Remote Workspace

learn more
Venn secures remote work on any unmanaged or BYOD computer with a radically simplified and less costly solution than VDI.

Read more about Venn

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
Carbon Black App Control logo

Endpoint protection and network access management software

learn more
Carbon Black App Control is a endpoint protection software that helps businesses track compliance, set up device control, ensure malware protection, and manage other operations. It allows staff members to combine file integrity monitoring, device control, memory protection, application control, and tamper protection on a centralized platform.

Read more about Carbon Black App Control

Users also considered
Privilege Manager logo

Endpoint security and access management software

learn more
Privilege Manager is an endpoint application and privilege management software designed to help businesses protect applications from malware and security threats via a unified portal. Organizations can deploy the platform on the cloud or on Windows, Linux, and Mac-based devices.

Read more about Privilege Manager

Users also considered
Ivanti Neurons for UEM logo

Endpoint management solution

learn more
Ivanti Endpoint Manager is a comprehensive solution for IT teams to manage and secure devices across Windows, macOS, Linux, Chrome OS, and more. With Day Zero support, it ensures devices are managed without loss of functionality or downtime. Ivanti provides a unified view of all devices, facilitating efficient discovery, management, and security through precise and actionable insights for quicker remediation.

Read more about Ivanti Neurons for UEM

Users also considered
remote.it logo

Zero-trust network connectivity as a service

learn more
remote.it delivers zero-trust network connectivity as a service, revolutionizing remote access and network management. It connects without public IP addresses, survives network changes, and minimizes attack surfaces. With flexible deployment options and a wide range of applications, it's a robust VP.

Read more about remote.it

Users also considered
Cyberelements logo

Cloud-based cybersecurity and access management solution

learn more
Cyberelements is a cloud-based cybersecurity software that lets businesses monitor external data centers, helps connect workforces to their applications and streamline identity management processes.

Read more about Cyberelements

Users also considered
BUFFERZONE logo

Network security and endpoint protection solution

learn more
BUFFERZONE is a security solutions suite based on Protection by Containment that creates an isolated virtual environment for users to securely access potentially risky content such as web pages, email attachments, links, or external files.

Read more about BUFFERZONE

Users also considered
EndPoint Privilege Manager logo

Privilege access management solution

learn more
Securden Windows Privilege Manager helps eliminate local admin rights from all endpoints. Control, track application usage, and reduce threats across your organization. Enforce Zero-trust, prevent malware propagation, and fortify your IT infrastructure against ransomware attacks.

Read more about EndPoint Privilege Manager

Users also considered
ManageEngine Endpoint DLP Plus logo

Monitor and protect sensitive data across endpoints

learn more
ManageEngine Endpoint DLP Plus is an enterprise-ready solution that monitors the transfer and usage of sensitive data across the business IT network. The solution supports advanced data discovery and classification techniques such as Fingerprint, RegEx, and keywords search, through which sensitive data is identified and protected across the different endpoints in your organization.

Read more about ManageEngine Endpoint DLP Plus

Users also considered
Chariot logo

Cybersecurity platform on the offensive.

learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden lets you remove local administrator rights & control applications on Windows and Mac endpoints to keep them safe against cyberattacks.

Read more about Securden

Users also considered
remote.it logo

Zero-trust network connectivity as a service

learn more
remote.it delivers zero-trust network connectivity as a service, revolutionizing remote access and network management. It connects without public IP addresses, survives network changes, and minimizes attack surfaces. With flexible deployment options and a wide range of applications, it's a robust VP.

Read more about remote.it

Users also considered
Cyberelements logo

Cloud-based cybersecurity and access management solution

learn more
Cyberelements is a cloud-based cybersecurity software that lets businesses monitor external data centers, helps connect workforces to their applications and streamline identity management processes.

Read more about Cyberelements

Users also considered
SURFSecurity logo

A secure identity-first zero-trust enterprise browser

learn more
BYOD and cloud-adoption is making it hard for CISOs to track and secure remote environments, forcing them to add tools to their growing security stack. SURF's zero-trust enterprise browser collapses the security stack into one single control point, ensuring that security starts at the user identity.

Read more about SURFSecurity

Users also considered
BUFFERZONE logo

Network security and endpoint protection solution

learn more
BUFFERZONE is a security solutions suite based on Protection by Containment that creates an isolated virtual environment for users to securely access potentially risky content such as web pages, email attachments, links, or external files.

Read more about BUFFERZONE

Users also considered
EndpointOps logo

Unified endpoint protection and management solution

learn more
Zirozen unified Endpoint management solution provides comprehensive visibility across endpoints and helps users keep endpoint safe and secure.

Read more about EndpointOps

Users also considered
AnySecura logo

Endpoint security and user activity monitoring solution

learn more
AnySecura is a user activity monitoring solution that enables organizations to safeguard their critical information with integrated DLP, endpoint protection, and auditing. It helps build a secure and compliant operational environment.

Read more about AnySecura

Users also considered
Heimdal Endpoint Detection and Response (EDR) logo

Seamless Endpoint Detection and Response Software

learn more
Heimdal Endpoint Detection and Response is our take on unified EDR software that integrates six of our most popular cybersecurity modules: Heimdal Threat Prevention, Patch & Asset Management, Ransomware Encryption Protection, Next-Gen Antivirus, Privileged Access Management, and Application Control.

Read more about Heimdal Endpoint Detection and Response (EDR)

Users also considered