getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Endpoint Protection Software with Incident Management (2026) - Page 3

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


75 software options

Cynet 360 logo

Automated breach response and protection platform

learn more
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.

Read more about Cynet 360

Users also considered
Beyond DLP logo

Product Data Protection Beyond Boundaries

learn more
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.

Read more about Beyond DLP

Users also considered
Tanium logo

Autonomous IT. Unstoppable Business.

learn more
The Tanium Autonomous IT Platform equips organizations with real-time visibility and control across their endpoint environments to make their business unstoppable.

Read more about Tanium

Users also considered
Banyan Security logo

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered
ReaQta-Hive logo

Experience Security Without Complexity

learn more
ReaQta, an IBM company, is an AI Autonomous Detection & Response platform built by AI/ML researchers and cyber security experts. ReaQta allows companies to eliminate extremely advanced endpoint threats in real-time.

Read more about ReaQta-Hive

Users also considered
Verimatrix XTD logo

Prevent, detect, respond and predict threats on mobile apps.

learn more
Verimatrix XTD employs advanced obfuscation, anti-tamper and environmental checks to shield Android and iOS mobile apps from attack. Its extensive suite of cybersecurity capabilities spans mobile, embedded, desktop, and web platforms, including browsers, JavaScript, various frameworks and libraries.

Read more about Verimatrix XTD

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
XDR / EDR is a powerful endpoint security solution that includes real-time monitoring and collection of endpoint security data with an automated threat response mechanism.
Its missions are: detecting known and unknown attacks, launch remediations and provide advanced investigation features.

Read more about TEHTRIS XDR Platform

Users also considered
Detego Digital Forensics logo

Digital forensics and investigation management software

learn more
Detego Digital Forensics is designed to help law enforcement units, intelligence agencies, and corporate enterprises extract information from PCs, removable storage, and mobile devices. It enables forensic teams to automate workflows, manage documents, and generate customer reports via a unified platform.

Read more about Detego Digital Forensics

Users also considered
Endpoint Detection and Response logo

Endpoint detection and response software

learn more
Endpoint Detection and Response is an endpoint protection software designed to help managed service providers (MSPs) automatically detect and mitigate zero-day attacks. Administrators can create custom policies to protect the system against ransomware attacks and restore data in real-time.

Read more about Endpoint Detection and Response

Users also considered
CybrHawk SIEM XDR logo

Transforming cybersecurity with unprecedented visibility

learn more
Delivering top-notch cybersecurity solutions to protect businesses from evolving threats. Stay ahead with our cutting-edge technologies, comprehensive services, and expert team. Visit www.cybrhawk.com for robust protection and peace of mind in the digital landscape.

Read more about CybrHawk SIEM XDR

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
CyberCAST logo

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
Versa SASE logo

Connect. Protect. Simplify.

learn more
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
Network Detection and Response logo

Network visibility, threat detection and forensic analysis

learn more
Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. It accelerates the ability for organizations to respond to and identify future attacks before they become serious events.

Read more about Network Detection and Response

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden lets you remove local administrator rights & control applications on Windows and Mac endpoints to keep them safe against cyberattacks.

Read more about Securden

Users also considered
zIPS logo

Software to manage secure access across mobile devices

learn more
Zimperium zIPS is a mobile threat defense (MTD) software designed to that helps enterprises provide and manage secure access to data and company systems across employees' mobile devices and applications.

Read more about zIPS

Users also considered
Securden Unified PAM logo

Access Governance redefined for Hybrid environments

learn more
Protect your windows servers and devices from cyberattacks. Eliminate local administrator rights across all endpoints seamlessly. Use automated privilege elevation to raise requests to applications and allow your users and employees to access what they need, without a hassle.

Read more about Securden Unified PAM

Users also considered
Securden Endpoint Privilege Manager logo

Endpoint privilege access management solution

learn more
Securden Windows Privilege Manager helps eliminate local admin rights from all endpoints. Control, track application usage, and reduce threats across your organization. Enforce Zero-trust, prevent malware propagation, and fortify your IT infrastructure against ransomware attacks.

Read more about Securden Endpoint Privilege Manager

Users also considered
Gradient Cyber logo

Cybersecurity platform for small and midsize businesses

learn more
Gradient Cyber offers extended detection and response (XDR), managed risk, and threat assessment using the SecOps Delivery Platform. It helps businesses gain insights into cybersecurity maturity and improvement.

Read more about Gradient Cyber

Users also considered
The Anomali Platform logo

Cloud-based & on-premise XDR tool for administrators.

learn more
The Anomali Platform is a cloud-based and on-premise vulnerability management solution, which helps businesses in finance, aviation, banking, and other sectors handle cybersecurity via machine learning (ML). The platform offers various features including exposure management, threat intelligence, extended detection and response, risk protection, natural language processing (NLP), data transformation, attack surface management, and more.

Read more about The Anomali Platform

Users also considered
Field Effect logo

Cyber security solution for MSPs

learn more
Field Effect is a cyber security solution that offers advanced threat detection and response, as well as cyber training for businesses. Field Effect’s technology combines artificial intelligence (AI) with industry best practices to offer a comprehensive defence against cyber attacks.

Read more about Field Effect

Users also considered
SURFSecurity logo

A secure identity-first zero-trust enterprise browser

learn more
BYOD and cloud-adoption is making it hard for CISOs to track and secure remote environments, forcing them to add tools to their growing security stack. SURF's zero-trust enterprise browser collapses the security stack into one single control point, ensuring that security starts at the user identity.

Read more about SURFSecurity

Users also considered
HarfangLab logo

Endpoint detection and protection platform

learn more
HarfangLab is a cybersecurity platform that develops a suite of solutions in the cloud and on-premises to prevent, detect, and block cyberattacks: EDR, EPP, and Attack Surface Management tools, enhanced by AI.

Read more about HarfangLab

Users also considered
Heimdal Endpoint Detection and Response (EDR) logo

Seamless Endpoint Detection and Response Software

learn more
Heimdal Endpoint Detection and Response is our take on unified EDR software that integrates six of our most popular cybersecurity modules: Heimdal Threat Prevention, Patch & Asset Management, Ransomware Encryption Protection, Next-Gen Antivirus, Privileged Access Management, and Application Control.

Read more about Heimdal Endpoint Detection and Response (EDR)

Users also considered
DarkSight logo

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered