App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Endpoint Protection Software with Risk Assessment

AvatarImg
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

39 software options

Sponsored

1 filter applied



Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

Endpoint Detection and Response logo
4.5
(2)

Endpoint detection and response software

visit website
Endpoint Detection and Response is an endpoint protection software designed to help managed service providers (MSPs) automatically detect and mitigate zero-day attacks. Administrators can create custom policies to protect the system against ransomware attacks and restore data in real-time.

Read more about Endpoint Detection and Response

Users also considered
Malwarebytes for Business logo
4.7
(2.4K)

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
Symantec Endpoint Security logo
4.4
(545)

Protect Your Business

learn more
Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes.

Read more about Symantec Endpoint Security

Users also considered
Splunk Enterprise logo
4.6
(221)

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
WebTitan logo
4.5
(258)

DNS-based web filter, malware/phishing protection & security

learn more
DNS Based Advanced Web Security Filter blocking Malware, Ransomware and Phishing attempts.

Read more about WebTitan

Users also considered
Safetica logo
4.7
(128)

Data loss prevention and insider threat protection solution

learn more
Safetica monitors your endpoints and protects them against insider threats and data breaches.

Read more about Safetica

Users also considered
GoodAccess logo
4.9
(95)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
Teramind logo
4.6
(86)

Employee Monitoring, Insider Threat & Data Loss Prevention

learn more
Teramind is an employee monitoring, insider threats detection and data loss prevention solution. Track all activity and productivity of employees, privileged users, remote workers to prevent IP and data leaks.

Read more about Teramind

Users also considered
Lookout logo
4.7
(67)

Endpoint-to-cloud security for businesses with remote teams

learn more
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.

Read more about Lookout

Users also considered
Syxsense logo
4.6
(61)

Unified Security and Endpoint Management

learn more
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.

Read more about Syxsense

Users also considered
Commvault Cloud logo
4.6
(39)

Total Resilience. No Exceptions.

learn more
Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid
enterprise at the lowest TCO, in the face of ransomware and other cyber threats.

Read more about Commvault Cloud

Users also considered
Falcon logo
4.7
(33)

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about Falcon

Users also considered
Acronis Cyber Protect Cloud logo
4.1
(70)

AI-powered data protection and cybersecurity

learn more
Acronis Cyber Protect Cloud is truly a unique integration of backup, anti-malware, antivirus and endpoint protection. Such synergy solves complexity, allowing service providers to better protect customers while keeping the costs down.

Read more about Acronis Cyber Protect Cloud

Users also considered
Workspace ONE logo
4.7
(27)

Digital workspace platform

learn more
Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to simply and securely deliver and manage devices, apps, and data from a single, unified console, providing modern, cloud-native endpoint management and secure access to corporate resources.

Read more about Workspace ONE

Users also considered
ManageEngine ADAudit Plus logo
4.3
(43)

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a change audit software that provides detailed reports for changes made in Windows Active Directory and real-time compliance audits

Read more about ManageEngine ADAudit Plus

Users also considered
Acunetix logo
4.4
(34)

All-in-one automated web application security solution

learn more
Acunetix (by Invicti) is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
ManageEngine Vulnerability Manager Plus logo
4.6
(24)

Vulnerability management with built-in remediation

learn more
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching.

Read more about ManageEngine Vulnerability Manager Plus

Users also considered
DataDome logo
4.5
(17)

Anti-bot protection software to block unwanted traffic

learn more
DataDome Anti-bot Protection software is a cloud-based platform designed to help businesses identify and prevent bot attacks in real-time using in-memory pattern databases along with machine learning (ML) and artificial intelligence (AI) technologies.

Read more about DataDome

Users also considered
Security Event Manager logo
4.7
(9)

SIEM solution for small to large organizations

learn more
Security Event Manager is a security information and event management (SIEM) solution, which assists small to large organizations with threat detection and response management. Key features include event log forwarding, reporting, file integrity, and device monitoring.

Read more about Security Event Manager

Users also considered
Axonius logo
5.0
(5)

Cybersecurity asset management platform

learn more
Axonius is a cybersecurity asset management platform which gives organizations a comprehensive asset inventory, helps uncover security solution coverage gaps, & automatically validates & enforces security policies with 130+ management & security solution integrations, & more.

Read more about Axonius

Users also considered
Portnox CLEAR logo
4.1
(11)

Network security and access control software

learn more
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Users also considered
Acronis Cyber Protect logo
4.7
(6)

Integrated data protection and cybersecurity in one solution

learn more
Acronis Cyber Protect brings together data protection and cybersecurity in one, easy-to-use solution.

Read more about Acronis Cyber Protect

Users also considered
Uptycs logo
4.7
(6)

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
Beyond DLP logo
4.8
(5)

Product Data Protection Beyond Boundaries

learn more
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.

Read more about Beyond DLP

Users also considered
condignum logo
5.0
(3)

Cloud-based compliance management solution

learn more
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.

Read more about condignum

Users also considered