getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Endpoint Protection Software with Incident management - Page 2

Last updated: May 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


75 software options

ESET Endpoint Security logo

Network security, network monitoring & endpoint protection

learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
SysCloud logo

Start making smarter cloud backups

learn more
SysCloud is a BaaS provider offering automated backups, restores & unlimited retention for critical SaaS apps in a single pane of glass.

Read more about SysCloud

Users also considered
CyberCAST logo

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
CybrHawk SIEM XDR logo

Transforming cybersecurity with unprecedented visibility

learn more
Delivering top-notch cybersecurity solutions to protect businesses from evolving threats. Stay ahead with our cutting-edge technologies, comprehensive services, and expert team. Visit www.cybrhawk.com for robust protection and peace of mind in the digital landscape.

Read more about CybrHawk SIEM XDR

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Cynet 360 logo

Automated breach response and protection platform

learn more
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.

Read more about Cynet 360

Users also considered
Uptycs logo

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
Detego Digital Forensics logo

Digital forensics and investigation management software

learn more
Detego Digital Forensics is designed to help law enforcement units, intelligence agencies, and corporate enterprises extract information from PCs, removable storage, and mobile devices. It enables forensic teams to automate workflows, manage documents, and generate customer reports via a unified platform.

Read more about Detego Digital Forensics

Users also considered
Endpoint Detection and Response logo

Endpoint detection and response software

learn more
Endpoint Detection and Response is an endpoint protection software designed to help managed service providers (MSPs) automatically detect and mitigate zero-day attacks. Administrators can create custom policies to protect the system against ransomware attacks and restore data in real-time.

Read more about Endpoint Detection and Response

Users also considered
DriveLock logo

Cloud-based tool for protecting company data & end-devices

learn more
DriveLock's endpoint protection is designed to simplify security management while providing robust protection against a wide range of cyber threats. It eliminates the complexity of managing multiple security tools, simplifying administration and reducing the potential for security breaches.

Read more about DriveLock

Users also considered
Cisco Secure Endpoint logo

Endpoint Detection and Response Security Solution

learn more
Cisco Secure Endpoint is a detection and response security solution that provides XDR capabilities, endpoint investigations, incident management, and more to prevent cyber attacks. With integrated vulnerability management and built in ThreatX hunting, Cisco Scure Endpoint pinpoints the origin of attacks to keep systems functional while thwarting harmful malware.

Read more about Cisco Secure Endpoint

Users also considered
Network Detection and Response logo

Network visibility, threat detection and forensic analysis

learn more
Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. It accelerates the ability for organizations to respond to and identify future attacks before they become serious events.

Read more about Network Detection and Response

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
XDR / EDR is a powerful endpoint security solution that includes real-time monitoring and collection of endpoint security data with an automated threat response mechanism.
Its missions are: detecting known and unknown attacks, launch remediations and provide advanced investigation features.

Read more about TEHTRIS XDR Platform

Users also considered
ESET PROTECT Complete logo

Cloud-based patch management for total security

learn more
ESET PROTECT Complete offers advanced patch management for businesses with 250+ employees, ensuring systems are secure and up-to-date with automated updates and comprehensive vulnerability assessments.

Read more about ESET PROTECT Complete

Users also considered
CrowdStrike logo

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
Deep Freeze logo

Endpoint protection and remote machine management software

learn more
Deep Freeze offers developers a set of enterprise solutions to protect, manage and optimize IT assets on a cloud-based platform. Key features include device management, activity tracking, application security, maintenance and scheduling, asset administration, data protection, and power management.

Read more about Deep Freeze

Users also considered
Banyan Security logo

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered
CylanceENDPOINT logo

Threat detection and endpoint protection platform

learn more
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.

Read more about CylanceENDPOINT

Users also considered
Cortex XDR logo

Threat intelligence software for security teams

learn more
Cortex XDR (formerly Traps) is a threat intelligence software designed to help security teams integrate the system with network, endpoint, third-party, and cloud data to streamline investigations and prevent cyber attacks. The platform allows administrators to identify threats, isolate endpoints, and block malware across environments.

Read more about Cortex XDR

Users also considered
Workspace ONE logo

Digital workspace platform

learn more
Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to simply and securely deliver and manage devices, apps, and data from a single, unified console, providing modern, cloud-native endpoint management and secure access to corporate resources.

Read more about Workspace ONE

Users also considered
Elastic Stack logo

Distributed search and analytics solution

learn more
Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.

Read more about Elastic Stack

Users also considered
Cisco Umbrella logo

Cloud-based enterprise network security solution

learn more
Cisco Umbrella is an enterprise network security solution that provides DNS-layer security to block threats before connections are established. The platform includes features such as secure web gateway, cloud access security broker, data loss prevention, cloud-delivered firewall, and malware protection. It leverages threat intelligence from Cisco Talos and operates on a global cloud infrastructure to protect users and devices across multiple locations.

Read more about Cisco Umbrella

Users also considered
TeamViewer ONE logo

Remote support, remote access & device management software

learn more
TeamViewer Endpoint Protection blocks malware, ransomware, and zero-day threats in real time with low system impact and easy deployment

Read more about TeamViewer ONE

Users also considered
Portnox CLEAR logo

Network security and access control software

learn more
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Users also considered
ManageEngine ADAudit Plus logo

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a change audit software that provides detailed reports for changes made in Windows Active Directory and real-time compliance audits.

Read more about ManageEngine ADAudit Plus

Users also considered