getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Endpoint Protection Software for Linux

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


91 software options

TeamViewer ONE logo

Remote support, remote access & device management software

learn more
TeamViewer Endpoint Protection blocks malware, ransomware, and zero-day threats in real time with low system impact and easy deployment

Read more about TeamViewer ONE

Users also considered
Malwarebytes for Business logo
Category Leaders

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
1Password logo

Password manager for businesses and families

learn more
1Password protects all company secrets such as passwords, security tokens, 2FA codes, documents, and passkeys to centralize and simplify the sign-in experience. Developers have access to features that help secure secrets and speed up workflows throughout the software development life cycle.

Read more about 1Password

Users also considered
ManageEngine Endpoint Central logo
Category Leaders

Desktop, mobile device & patch management software

learn more
Endpoint Central (formerly Desktop Central) from ManageEngine is an integrated desktop & mobile device management application that enables the centralized management of desktops, servers, laptops, tablets & smartphones.

Read more about ManageEngine Endpoint Central

Users also considered
ESET Endpoint Security logo
Category Leaders

Network security, network monitoring & endpoint protection

learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
Cisco AnyConnect logo

Virtual private network (VPN) to secure remote access

learn more
Cisco AnyConnect is a virtual private network (VPN) software designed to provide remote workforce with secure enterprise-wide network access across multiple locations and devices. Administrators can utilize the platform to identify network usage details.

Read more about Cisco AnyConnect

Users also considered
Trellix Endpoint Security logo
Category Leaders

Computer security and endpoint protection platform

learn more
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.

Read more about Trellix Endpoint Security

Users also considered
NinjaOne logo
Category Leaders

Unified endpoint management & IT automation platform

learn more
NinjaOne Endpoint Management enables IT organizations of all sizes and experience levels to take a more proactive approach to IT management, which yields significant efficiency gains, improved user satisfaction and a stronger security posture.

Read more about NinjaOne

Users also considered
Symantec Endpoint Security logo
Category Leaders

Protect Your Business

learn more
Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes.

Read more about Symantec Endpoint Security

Users also considered
LogMeIn Central logo

Endpoint management for desktops, servers & mobile laptops

learn more
LogMeIn Central is an endpoint management solution which helps IT professionals to monitor, manage, and secure their organization's endpoint infrastructure including desktops, servers and laptops. Users can remotely deploy & automate routine IT tasks for any PC or Mac from anywhere, via any device.

Read more about LogMeIn Central

Users also considered
Splunk Enterprise logo

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
WebTitan logo

DNS-based web filter, malware/phishing protection & security

learn more
DNS Based Advanced Web Security Filter blocking Malware, Ransomware and Phishing attempts.

Read more about WebTitan

Users also considered
FortiClient logo
Category Leaders

Endpoint protection software with behavior-based analytics

learn more
FortiClient is an endpoint protection software that helps businesses identify malicious attacks across multiple vectors, including web, USB, and email. The software inventory management module allows managers to monitor all software installed on an endpoint and remove outdated applications.

Read more about FortiClient

Users also considered
CrashPlan logo

Easy, secure, & cost-effective backup and recovery

learn more
CrashPlan serves SMBs and enterprises seeking reliable endpoint, server, Google workspace and Microsoft 365 backup to safeguard data, ensure compliance, and enable fast recovery.

Read more about CrashPlan

Users also considered
Intercept X Endpoint logo
Category Leaders

Endpoint protection software for security analysts

learn more
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.

Read more about Intercept X Endpoint

Users also considered
Automox logo

Cloud-based platform for patch management

learn more
Automox is the endpoint management platform built for the era of autonomous operations

Read more about Automox

Users also considered
GoodAccess logo
Category Leaders

Zero Trust Architecture as a Service

learn more
Cybersecurity platform (SASE/SSE) that enables easy Zero Trust Architecture implementation for medium enterprises, any scale.

Read more about GoodAccess

Users also considered
ACMP Suite logo

Keep clients running!

learn more
In a world full of unpredictability, choosing the right partner is crucial. We are your guide on the path to greater simplicity and efficiency. ACMP offers modular and scalable solutions for your specific challenges in the IT department.

Read more about ACMP Suite

Users also considered
UTunnel VPN logo

Cloud VPN, Zero Trust Network Access, and Mesh Networking

learn more
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!

Read more about UTunnel VPN

Users also considered
VMware Cloud Director Availability logo

Streamline your Cloud Migration and Disaster Recovery

learn more
VMware Cloud Director Availability provides replications and failover at a vApp or virtual machine level. VMware Cloud Director Availability is a unified solution, that provides on-premises to cloud and cloud to cloud onboarding, migration, and disaster recovery for multi-tenant cloud sites.

Read more about VMware Cloud Director Availability

Users also considered
Perimeter 81 logo
Category Leaders

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. Features such as Device Posture Check allow for endpoint protection, identity management, and advanced remote security.

Read more about Perimeter 81

Users also considered
Teramind logo

Employee Monitoring, Insider Threat & Data Loss Prevention

learn more
Teramind is an employee monitoring, insider threats detection and data loss prevention solution. Track all activity and productivity of employees, privileged users, remote workers to prevent IP and data leaks.

Read more about Teramind

Users also considered
Admin By Request logo

Local admin rights, managed.

learn more
Endpoint privilege management with just-in-time admin elevation, full auditing, and secure remote access for Windows, macOS, and Linux. Anti-malware file scanning, SSO and MFA enforcement, ML and AI automation, temporary local admin accounts, and a full inventory and detailed auditlog.

Read more about Admin By Request

Users also considered
OneLogin logo

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
N-central logo

On-premise and hosted RMM software for MSPs

learn more
N-central is an endpoint detection and response software designed to help managed service providers (MSPs) prevent, detect, respond to, and recover from threats.

Read more about N-central

Users also considered