getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Endpoint Protection Software with Android - Page 3

Last updated: May 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


64 software options

KACE logo

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
PureVPN logo

Secured VPN service offering limitless, anonymous web access

learn more
Pure VPN, and PureVPN for Business, is a Virtual Private Network (VPN) for all platforms including Windows, Mac, Linux, iOS and Android that provides 256-bit secured, anonymous and P2P-enabled access to unrestricted internet browsing with features including IP address masking, split tunneling & more

Read more about PureVPN

Users also considered
Intercept X Endpoint logo

Endpoint protection software for security analysts

learn more
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.

Read more about Intercept X Endpoint

Users also considered
Xcitium Endpoint Detection & Resonse logo

Gain full context of a ransomware attack

learn more
Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat Response (EDTR), represents an advanced endpoint solution designed for the continuous monitoring of endpoint devices. This solution aims to detect and respond effectively to a wide array of major threats, including but not limited to malware and ransomware.

Read more about Xcitium Endpoint Detection & Resonse

Users also considered
Netsurion logo

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.

Gain powerful EDR capabilities backed by a 24/7 SOC.

Read more about Netsurion

Users also considered
FortiClient logo

Endpoint protection software with behavior-based analytics

learn more
FortiClient is an endpoint protection software that helps businesses identify malicious attacks across multiple vectors, including web, USB, and email. The software inventory management module allows managers to monitor all software installed on an endpoint and remove outdated applications.

Read more about FortiClient

Users also considered
N-central logo

On-premise and hosted RMM software for MSPs

learn more
N-central is an endpoint detection and response software designed to help managed service providers (MSPs) prevent, detect, respond to, and recover from threats.

Read more about N-central

Users also considered
Trellix Endpoint Security logo

Computer security and endpoint protection platform

learn more
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.

Read more about Trellix Endpoint Security

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden lets you remove local administrator rights & control applications on Windows and Mac endpoints to keep them safe against cyberattacks.

Read more about Securden

Users also considered
Securden Unified PAM logo

Access Governance redefined for Hybrid environments

learn more
Protect your windows servers and devices from cyberattacks. Eliminate local administrator rights across all endpoints seamlessly. Use automated privilege elevation to raise requests to applications and allow your users and employees to access what they need, without a hassle.

Read more about Securden Unified PAM

Users also considered
zIPS logo

Software to manage secure access across mobile devices

learn more
Zimperium zIPS is a mobile threat defense (MTD) software designed to that helps enterprises provide and manage secure access to data and company systems across employees' mobile devices and applications.

Read more about zIPS

Users also considered
Securden Endpoint Privilege Manager logo

Endpoint privilege access management solution

learn more
Securden Windows Privilege Manager helps eliminate local admin rights from all endpoints. Control, track application usage, and reduce threats across your organization. Enforce Zero-trust, prevent malware propagation, and fortify your IT infrastructure against ransomware attacks.

Read more about Securden Endpoint Privilege Manager

Users also considered
remote.it logo

Zero-trust network connectivity as a service

learn more
remote.it delivers zero-trust network connectivity as a service, revolutionizing remote access and network management. It connects without public IP addresses, survives network changes, and minimizes attack surfaces. With flexible deployment options and a wide range of applications, it's a robust VP.

Read more about remote.it

Users also considered
Hypori Halo logo

Securing the world at work from any device, anywhere.

learn more
Hypori Halo is an app-accessible, separate, and secure mobile workspace delivering encrypted access to enterprise apps and data from any smartphone or tablet.

Read more about Hypori Halo

Users also considered