App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Endpoint Protection Software with Secure Login

AvatarImg
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

49 software options

Sponsored

1 filter applied



Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

ManageEngine Endpoint Central logo
4.5
(763)

Desktop, mobile device & patch management software

visit website
An integrated desktop & mobile device management application that enables the centralized management of desktops, servers, laptops, tablets & smartphones

Read more about ManageEngine Endpoint Central

Users also considered
NinjaOne logo
4.8
(204)

The Easiest-to-Use Unified IT Operations Solution

visit website
Ninja Protect provides unprecedented visibility and control over endpoints, robust patching, endpoint hardening, backup, and data protection capabilities alongside Bitdefender’s industry-leading next-generation AV and EDR capabilities, Ninja Protect is a solution ranked #1 on G2 for endpoint mgmt.

Read more about NinjaOne

Users also considered
Heimdal Next-Gen Endpoint Antivirus logo
4.8
(12)

Next-Gen Antivirus for Unparalleled Detection and Response.

visit website
Heimdal Next-Gen Endpoint Antivirus is an NGAV solution featuring unparalleled threat intelligence, forensics, and firewall integration for a complete endpoint detection and response approach. With it, you will not only secure your workstations but make everyone’s life easier in the process too.

Read more about Heimdal Next-Gen Endpoint Antivirus

Users also considered
Heimdal Ransomware Encryption Protection logo
4.8
(4)

An Advanced Ransomware Encryption Blocking Agent.

visit website
Heimdal Ransomware Encryption Protection is an innovative, 100% signature-free module that provides market-leading detection of ransomware attacks, as well as remediation in case of encryption. It is effective against both fileless and file-based strains, quietly securing all your digital assets.

Read more about Heimdal Ransomware Encryption Protection

Users also considered
Kandji logo
4.9
(75)

Apple device management (MDM) for macOS, iOS, iPadOS, tvOS.

visit website
Kandji is the modern Apple MDM solution for IT teams that manage macOS, iOS, iPadOS, and tvOS devices at medium-to-large businesses. Features include zero-touch deployment, app management, automated patching, one-click security and compliance templates, and 150+ pre-built device controls.

Read more about Kandji

Users also considered
Automox logo
4.8
(71)

Cloud-based platform for patch management

visit website
Automox is a cloud-based cyber hygiene and patch management solution that helps enterprises streamline endpoint protection and minimize cyber threats across all devices. The centralized platform provides users with an overview of devices requiring patch approvals, system updates, or troubleshooting.

Read more about Automox

Users also considered
Malwarebytes for Business logo
4.7
(2.4K)

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
JumpCloud Directory Platform logo
4.7
(206)

A cloud directory platform for secure access to resources

learn more
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere.

Read more about JumpCloud Directory Platform

Users also considered
Safetica logo
4.7
(128)

Data loss prevention and insider threat protection solution

learn more
Safetica monitors your endpoints and protects them against insider threats and data breaches.

Read more about Safetica

Users also considered
GoodAccess logo
4.9
(95)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
Action1 logo
4.9
(95)

Patching That Just Works

learn more
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.

Read more about Action1

Users also considered
UTunnel VPN logo
5.0
(68)

Cloud VPN, Zero Trust Network Access, and Mesh Networking

learn more
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!

Read more about UTunnel VPN

Users also considered
VMware Cloud Director Availability logo
4.8
(80)

Streamline your Cloud Migration and Disaster Recovery

learn more
VMware Cloud Director Availability provides replications and failover at a vApp or virtual machine level. VMware Cloud Director Availability is a unified solution, that provides on-premises to cloud and cloud to cloud onboarding, migration, and disaster recovery for multi-tenant cloud sites.

Read more about VMware Cloud Director Availability

Users also considered
OneLogin logo
4.6
(90)

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
Syxsense logo
4.6
(61)

Unified Security and Endpoint Management

learn more
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.

Read more about Syxsense

Users also considered
WatchGuard Endpoint Security logo
4.4
(82)

Cloud-based endpoint protection and computer security tool

learn more
Designed for businesses of all sizes, WatchGuard Endpoint Security is a cloud-based computer security software that helps businesses protect systems against cyber threats and detect endpoint malware through a unified platform

Read more about WatchGuard Endpoint Security

Users also considered
PureVPN logo
4.3
(76)

Secured VPN service offering limitless, anonymous web access

learn more
Pure VPN, and PureVPN for Business, is a Virtual Private Network (VPN) for all platforms including Windows, Mac, Linux, iOS and Android that provides 256-bit secured, anonymous and P2P-enabled access to unrestricted internet browsing with features including IP address masking, split tunneling & more

Read more about PureVPN

Users also considered
ThreatLocker logo
4.9
(39)

Allow what you need, Block everything else.

learn more
Stop ransomware with policy-driven endpoint protection. ThreatLocker enables organizations of all sizes with Zero Trust controls such as application allowlisting, Ringfencing, elevation and storage controls, as well as operational alerts.

Read more about ThreatLocker

Users also considered
Admin By Request logo
4.8
(37)

Local admin rights, managed.

learn more
Admin By Request is a security solution that enables organizations to monitor and control local admin rights across their endpoints. The tool offers Just-In-Time elevation, anti-malware file scanning, temporary local admin accounts, and a full inventory and Auditlog.

Read more about Admin By Request

Users also considered
Sealit logo
4.8
(31)

Full Security - Just 1 Click.

learn more
Sealit protects your data, no matter how it's shared. End-to-end email and file encryption for small businesses or individuals.

Read more about Sealit

Users also considered
Commvault Cloud logo
4.6
(39)

Total Resilience. No Exceptions.

learn more
Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid
enterprise at the lowest TCO, in the face of ransomware and other cyber threats.

Read more about Commvault Cloud

Users also considered
NordLayer logo
4.7
(29)

A stress-free way to secure your network.

learn more
NordLayer uses overall endpoint protection available on every major operating system by limiting potential risks of human error-sensitive phishing, malicious activity, and outdated patch cases with ThreatBlock, jailbroken/rooted devices detection, and increasing server reliability with custom DNS.

Read more about NordLayer

Users also considered
ManageEngine ADAudit Plus logo
4.3
(43)

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a change audit software that provides detailed reports for changes made in Windows Active Directory and real-time compliance audits

Read more about ManageEngine ADAudit Plus

Users also considered
Powertech Antivirus logo
4.5
(27)

Virus protection solution for Linux, AIX, and IBM i

learn more
Fortra's Powertech Antivirus is a cloud-based solution which provides malware protection to Linux, IBM i and AIX power servers from viruses, malware threats and worms. It lets users detect and resolve data privacy threats to save valuable IT resources, whilst ensuring enterprise compliance.

Read more about Powertech Antivirus

Users also considered
N-central logo
3.9
(46)

On-premise and hosted RMM software for MSPs

learn more
N-able N-central® is an endpoint detection and response software designed to help managed service providers (MSPs) prevent, detect, respond to, and recover from threats.

Read more about N-central

Users also considered