getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Online Endpoint Protection Software - Page 6

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


170 software options

Imperva Sonar logo

Unified cybersecurity platform for IT professionals

learn more
Imperva Sonar is a unified cybersecurity platform that provides fully integrated protection for applications and databases against emerging, automated, and insider attacks. It can be used to protect critical databases, applications, websites, and, APIs.
The Imperva Sonar platform includes behavioral analysis, threat prevention, data governance, cloud discovery, bot management, plus other types of protective technology.

Read more about Imperva Sonar

Users also considered
Seqrite Centralized Security Management logo

Enhancing security with insight-led control

learn more
HawkkEye is a centralized security management platform that strengthens an organization's security posture through a unified dashboard. It offers enterprise-grade capabilities like threat intelligence, simplified investigation via real-time dashboards, consolidated management of endpoints, and advanced threat protection.

Read more about Seqrite Centralized Security Management

Users also considered
CybrHawk SIEM XDR logo

Transforming cybersecurity with unprecedented visibility

learn more
Delivering top-notch cybersecurity solutions to protect businesses from evolving threats. Stay ahead with our cutting-edge technologies, comprehensive services, and expert team. Visit www.cybrhawk.com for robust protection and peace of mind in the digital landscape.

Read more about CybrHawk SIEM XDR

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
Netwrix Endpoint Policy Manager logo

Real Policy. Real Control. Everywhere.

learn more
Instantly secure endpoints by removing local admin rights, managing USB sticks, creating application firewalls, managing apps and operating system settings no matter where your users are. Increase what your GPO or MDM system can do!

Read more about Netwrix Endpoint Policy Manager

Users also considered
CyberCAST logo

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
Versa SASE logo

Connect. Protect. Simplify.

learn more
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
Venn logo

Secure Remote Workspace

learn more
Venn secures remote work on any unmanaged or BYOD computer with a radically simplified and less costly solution than VDI.

Read more about Venn

Users also considered
ManageEngine Application Control Plus logo

Endpoint protection tool for security teams.

learn more
ManageEngine Application Control Plus is a cloud-based and on-premise software that enables businesses to gain control over software usage and mitigate security risks.

Read more about ManageEngine Application Control Plus

Users also considered
Morphisec Guard logo

Adapt. Protect Defend.

learn more
Morphisec provides prevention-first security against the most advanced threats to stop the attacks that others don’t, from endpoint to the cloud.

Read more about Morphisec Guard

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
Securely manage Wireless WANs with NetCloud Manager: zero trust, AI insights, SD-WAN, and zero-touch deployment.

Read more about Ericsson NetCloud Manager

Users also considered
Absolute logo

Mobile device management & asset management app

learn more
Absolute Manage is a mobile device management software to deploy apps to mobiles, track devices, share files & content, manage BYOD policies, & more.

Read more about Absolute

Users also considered
Network Detection and Response logo

Network visibility, threat detection and forensic analysis

learn more
Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. It accelerates the ability for organizations to respond to and identify future attacks before they become serious events.

Read more about Network Detection and Response

Users also considered
Cisco XDR logo

Extended Detection and Response Security Solution

learn more
Cisco XDR goes beyond traditional security solutions by leveraging advanced analytics, machine learning, and automation to proactively detect threats that may have evaded traditional security measures. By analyzing data from various sources, including endpoint, network, cloud, and email, Cisco XDR provides a holistic view of the entire attack landscape, enabling businesses to respond swiftly and effectively.

Read more about Cisco XDR

Users also considered
Privilege Manager logo

Endpoint security and access management software

learn more
Privilege Manager is an endpoint application and privilege management software designed to help businesses protect applications from malware and security threats via a unified portal. Organizations can deploy the platform on the cloud or on Windows, Linux, and Mac-based devices.

Read more about Privilege Manager

Users also considered
Ivanti Neurons for UEM logo

Endpoint management solution

learn more
Ivanti Endpoint Manager is a comprehensive solution for IT teams to manage and secure devices across Windows, macOS, Linux, Chrome OS, and more. With Day Zero support, it ensures devices are managed without loss of functionality or downtime. Ivanti provides a unified view of all devices, facilitating efficient discovery, management, and security through precise and actionable insights for quicker remediation.

Read more about Ivanti Neurons for UEM

Users also considered
zIPS logo

Software to manage secure access across mobile devices

learn more
Zimperium zIPS is a mobile threat defense (MTD) software designed to that helps enterprises provide and manage secure access to data and company systems across employees' mobile devices and applications.

Read more about zIPS

Users also considered
BroShield logo

Computer security and parental control software

learn more
BroShield is a computer security and parental control software that helps individuals and families block inappropriate sites, schedule screen times, restrict activities, receive suspicious activity alerts, and more from within a unified platform. It allows users to monitor activities in real-time, restrict adult websites, set up web firewalls, manage robotic troubleshooting, and handle other processes.

Read more about BroShield

Users also considered
Heimdal Endpoint Detection and Response (EDR) logo

Seamless Endpoint Detection and Response Software

learn more
Heimdal Endpoint Detection and Response is our take on unified EDR software that integrates six of our most popular cybersecurity modules: Heimdal Threat Prevention, Patch & Asset Management, Ransomware Encryption Protection, Next-Gen Antivirus, Privileged Access Management, and Application Control.

Read more about Heimdal Endpoint Detection and Response (EDR)

Users also considered
Securden Unified PAM logo

Access Governance redefined for Hybrid environments

learn more
Protect your windows servers and devices from cyberattacks. Eliminate local administrator rights across all endpoints seamlessly. Use automated privilege elevation to raise requests to applications and allow your users and employees to access what they need, without a hassle.

Read more about Securden Unified PAM

Users also considered
Securden Endpoint Privilege Manager logo

Endpoint privilege access management solution

learn more
Securden Windows Privilege Manager helps eliminate local admin rights from all endpoints. Control, track application usage, and reduce threats across your organization. Enforce Zero-trust, prevent malware propagation, and fortify your IT infrastructure against ransomware attacks.

Read more about Securden Endpoint Privilege Manager

Users also considered
ManageEngine Endpoint DLP Plus logo

Monitor and protect sensitive data across endpoints

learn more
ManageEngine Endpoint DLP Plus is an enterprise-ready solution that monitors the transfer and usage of sensitive data across the business IT network. The solution supports advanced data discovery and classification techniques such as Fingerprint, RegEx, and keywords search, through which sensitive data is identified and protected across the different endpoints in your organization.

Read more about ManageEngine Endpoint DLP Plus

Users also considered
Chariot logo

Cybersecurity platform on the offensive.

learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered