getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Endpoint Protection Software with Anomaly/Malware Detection (2026) - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


76 software options

ESET Home Office Security Pack logo

Cloud-based cybersecurity solution for SMBs

learn more
ESET Home Office Security Pack is a comprehensive solution for small and medium-sized businesses and startups that need to protect digital equipment

Read more about ESET Home Office Security Pack

Users also considered
Guardio logo

Chrome extension for blocking malware and phishing attacks

learn more
Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove pop-up messages from the browser. It lets employees prevent unauthorized users from accessing web browsers and remove existing malware from devices via a unified platform.

Read more about Guardio

Users also considered
NordLayer logo
Category Leaders

Cloud-based network security platform for businesses

learn more
NordLayer reduces endpoint risks with Web Protection, device posture monitoring, and custom DNS. It detects jailbroken/rooted devices, blocks malicious files, and stops phishing threats, securing all endpoints across Windows, macOS, iOS, Android, and Linux.

Read more about NordLayer

Users also considered
Jamf Protect logo

Endpoint protection software for MacOS users

learn more

Jamf Protect is an endpoint protection software designed to help businesses monitor events across Mac devices and detect, prevent and resolve threats. The platform notifies administrators about malicious activities across scripts, applications, and users and automatically quarantines files for further analysis.

Features of Jamf Protect include log forwarding, CIS benchmarks, on-device activity analysis, threat intelligence, behavioral analytics, and more.

Read more about Jamf Protect

Users also considered
Huntress logo

Cloud-based cybersecurity platform

learn more
Huntress is a cloud-based cybersecurity platform, which helps organizations track threats, vulnerabilities, and exploits. With its dashboard, security professionals can monitor active incidents, review investigations, receive custom incident reports, and respond to threats in an automated manner.

Read more about Huntress

Users also considered
RoboShadow logo

Global Vulnerability Scanner. Cyber Security, Demystified.

learn more
Get a complete Internal & External Vulnerability Assessment for Free for your organisation or network. The RoboShadow Vulnerability Scanner platform give you all the main Cyber Security assessment tests that are common in Penetration Testing, Cyber Certifications and used by bad guys themselves.

Read more about RoboShadow

Users also considered
Invicti logo

Proof-based application security testing platform

learn more
Invicti is a web application and API security platform that provides proof-based vulnerability scanning with DAST, SAST, and ASPM capabilities. The platform discovers and tests websites, applications, and APIs while correlating security findings from multiple tools to prioritize real vulnerabilities. It integrates with CI/CD pipelines and offers AI-powered remediation guidance to help development teams address security issues efficiently.

Read more about Invicti

Users also considered
Powertech Antivirus logo

Virus protection solution for Linux, AIX, and IBM i

learn more
Fortra's Powertech Antivirus is a cloud-based solution which provides malware protection to Linux, IBM i and AIX power servers from viruses, malware threats and worms. It lets users detect and resolve data privacy threats to save valuable IT resources, whilst ensuring enterprise compliance.

Read more about Powertech Antivirus

Users also considered
Xcitium Endpoint Detection & Resonse logo

Gain full context of a ransomware attack

learn more
Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat Response (EDTR), represents an advanced endpoint solution designed for the continuous monitoring of endpoint devices. This solution aims to detect and respond effectively to a wide array of major threats, including but not limited to malware and ransomware.

Read more about Xcitium Endpoint Detection & Resonse

Users also considered
INLYSE Malware.AI logo

VISUAL AI BASED MALWARE DETECTION

learn more
INLYSE Malware.AI is a revolutionary visual AI-based malware detection solution that utilizes cutting-edge technology to convert files into graphical representations and analyze them comprehensively for any signs of malware.

Read more about INLYSE Malware.AI

Users also considered
Apex One logo

Endpoint protection and threat intelligence software

learn more
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers a host-based intrusion prevention system (HIPS), which enables administrators to virtually patch vulnerabilities.

Read more about Apex One

Users also considered
ESET PROTECT MDR logo

Future ready protection for enterprise

learn more
Uninterrupted endpoint protection for business with 250+ employees, multiplatform cyber risk management and 24/7 ESET expertise on call

Read more about ESET PROTECT MDR

Users also considered
Darktrace logo

AI-enabled network and cybersecurity solution

learn more
Darktrace, founded in 2013 in Cambridge, UK, is a leader in AI cybersecurity, protecting 10,000+ global customers from evolving threats

Read more about Darktrace

Users also considered
IBM Security MaaS360 logo

Unified endpoint management (UEM)

learn more
MaaS360 is an enterprise mobility management platform that enables IT to deliver end-to-end security and management through the implementation of Mobile Device Management, Secure Mail, Secure Browser and Laptop Management. It accelerates deployment, reduce risk and increase employee productivity.

Read more about IBM Security MaaS360

Users also considered
Heimdal Next-Gen Endpoint Antivirus logo

Next-Gen Antivirus for Unparalleled Detection and Response.

learn more
Heimdal Next-Gen Endpoint Antivirus is an NGAV solution featuring unparalleled threat intelligence, forensics, and firewall integration for a complete endpoint detection and response approach. With it, you will not only secure your workstations but make everyone’s life easier in the process too.

Read more about Heimdal Next-Gen Endpoint Antivirus

Users also considered
Cisco Secure Endpoint logo

Endpoint Detection and Response Security Solution

learn more
Cisco Secure Endpoint is a detection and response security solution that provides XDR capabilities, endpoint investigations, incident management, and more to prevent cyber attacks. With integrated vulnerability management and built in ThreatX hunting, Cisco Scure Endpoint pinpoints the origin of attacks to keep systems functional while thwarting harmful malware.

Read more about Cisco Secure Endpoint

Users also considered
TypingDNA ActiveLock logo

Customer identity and access management

learn more
ActiveLock continuously authenticates the workforce by the way they type to ensure only authorized users are accessing company endpoints. To secure the workforce, cybersecurity teams trust TypingDNA ActiveLock to ensure no one other than the authorized employee can ever access company devices, especially in remote environments.

Read more about TypingDNA ActiveLock

Users also considered
ESET PROTECT Complete logo

Cloud-based patch management for total security

learn more
ESET PROTECT Complete offers advanced patch management for businesses with 250+ employees, ensuring systems are secure and up-to-date with automated updates and comprehensive vulnerability assessments.

Read more about ESET PROTECT Complete

Users also considered
Chimpa logo

Unified Endpoint Manageme software for iOS & Android devices

learn more
Chimpa UEM helps manage, monitor, and secure various Android and iOS-based devices like digital signage, interactive displays, service kiosks, single-purpose devices, and more. Users can protect devices from unauthorized access, data theft, and intrusion using role-based permissions.

Read more about Chimpa

Users also considered
Heimdal XDR logo

Unified analysis and incident response center

learn more
Heimdal XDR empowers security and IT teams to respond faster to threats and adversaries by supplying them with advanced threat intelligence, bi-lateral telemetry, advanced forensics details, ransomware process details, and more. End-to-end consolidated and unified security.

Read more about Heimdal XDR

Users also considered
Netsurion logo

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.

Gain powerful EDR capabilities backed by a 24/7 SOC.

Read more about Netsurion

Users also considered
DriveLock logo

Cloud-based tool for protecting company data & end-devices

learn more
DriveLock's endpoint protection is designed to simplify security management while providing robust protection against a wide range of cyber threats. It eliminates the complexity of managing multiple security tools, simplifying administration and reducing the potential for security breaches.

Read more about DriveLock

Users also considered
Uptycs logo

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
Cynet 360 logo

Automated breach response and protection platform

learn more
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.

Read more about Cynet 360

Users also considered
Heimdal Ransomware Encryption Protection logo

An Advanced Ransomware Encryption Blocking Agent.

learn more
Heimdal Ransomware Encryption Protection is an innovative, 100% signature-free module that provides market-leading detection of ransomware attacks, as well as remediation in case of encryption. It is effective against both fileless and file-based strains, quietly securing all your digital assets.

Read more about Heimdal Ransomware Encryption Protection

Users also considered