getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Endpoint Protection Software with Open source - Page 5

Last updated: May 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


185 software options

CleanMyMac logo

An app for all Mac situations.

learn more
CleanMyMac is the Apple-notarized way to tidy up your Mac. All the tools for essential computer care, in a sleek interface that makes cleaning actually fun.

Read more about CleanMyMac

Users also considered
CrowdStrike logo

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
Deep Freeze logo

Endpoint protection and remote machine management software

learn more
Deep Freeze offers developers a set of enterprise solutions to protect, manage and optimize IT assets on a cloud-based platform. Key features include device management, activity tracking, application security, maintenance and scheduling, asset administration, data protection, and power management.

Read more about Deep Freeze

Users also considered
HP Wolf Security logo

Endpoint protection tool that helps manage IT infrastructure

learn more
HP Wolf Security is a comprehensive suite of products that help businesses manage their IT infrastructure and protect their data.

Read more about HP Wolf Security

Users also considered
Banyan Security logo

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered
Ivanti Neurons for UEM logo

Endpoint management solution

learn more
Ivanti Endpoint Manager is a comprehensive solution for IT teams to manage and secure devices across Windows, macOS, Linux, Chrome OS, and more. With Day Zero support, it ensures devices are managed without loss of functionality or downtime. Ivanti provides a unified view of all devices, facilitating efficient discovery, management, and security through precise and actionable insights for quicker remediation.

Read more about Ivanti Neurons for UEM

Users also considered
Commvault Cloud logo

Total Resilience. No Exceptions.

learn more
Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid
enterprise at the lowest TCO, in the face of ransomware and other cyber threats.

Read more about Commvault Cloud

Users also considered
Ryn VPN logo

VPN solution for data security.

learn more
Ryn VPN is a VPN solution that helps businesses encrypt data and connect to any app or website securely. The platform enables users to hide their IP address and protect identity while browsing the web to unlock any websites and apps. The strict no-logs policy ensures that none of the details are revealed to third parties. Additionally, Ryn VPN helps users bypass geo-restrictions and access all contents from anywhere. The solution is designed for Android phones or iOS devices.

Read more about Ryn VPN

Users also considered
CylanceENDPOINT logo

Threat detection and endpoint protection platform

learn more
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.

Read more about CylanceENDPOINT

Users also considered
Inky logo

The most effective solution when fighting phishing attacks.

learn more
INKY is an endpoint protection tool that helps businesses leverage artificial intelligence (AI) technology and machine learning capabilities to identify and prevent phishing attacks. INKY can be integrated with Microsoft Exchange, Google Workspace and other applications.

Read more about Inky

Users also considered
NACVIEW logo

Network access control solution

learn more
NACVIEW is a network access control solution. NACVIEW provides visibility of all connected devices across the whole network. A variety of profiling methods allows you to define what is connected to your network type of device, operating system, and more.

Read more about NACVIEW

Users also considered
Powertech Antivirus logo

Virus protection solution for Linux, AIX, and IBM i

learn more
Fortra's Powertech Antivirus is a cloud-based solution which provides malware protection to Linux, IBM i and AIX power servers from viruses, malware threats and worms. It lets users detect and resolve data privacy threats to save valuable IT resources, whilst ensuring enterprise compliance.

Read more about Powertech Antivirus

Users also considered
Absolute logo

Mobile device management & asset management app

learn more
Absolute Manage is a mobile device management software to deploy apps to mobiles, track devices, share files & content, manage BYOD policies, & more.

Read more about Absolute

Users also considered
Cortex XDR logo

Threat intelligence software for security teams

learn more
Cortex XDR (formerly Traps) is a threat intelligence software designed to help security teams integrate the system with network, endpoint, third-party, and cloud data to streamline investigations and prevent cyber attacks. The platform allows administrators to identify threats, isolate endpoints, and block malware across environments.

Read more about Cortex XDR

Users also considered
Workspace ONE logo

Digital workspace platform

learn more
Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to simply and securely deliver and manage devices, apps, and data from a single, unified console, providing modern, cloud-native endpoint management and secure access to corporate resources.

Read more about Workspace ONE

Users also considered
Elastic Stack logo

Distributed search and analytics solution

learn more
Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.

Read more about Elastic Stack

Users also considered
DataDome logo

Anti-bot protection software to block unwanted traffic

learn more
DataDome Anti-bot Protection software is a cloud-based platform designed to help businesses identify and prevent bot attacks in real-time using in-memory pattern databases along with machine learning (ML) and artificial intelligence (AI) technologies.

Read more about DataDome

Users also considered
Seqrite Centralized Security Management logo

Enhancing security with insight-led control

learn more
HawkkEye is a centralized security management platform that strengthens an organization's security posture through a unified dashboard. It offers enterprise-grade capabilities like threat intelligence, simplified investigation via real-time dashboards, consolidated management of endpoints, and advanced threat protection.

Read more about Seqrite Centralized Security Management

Users also considered
Cisco Umbrella logo

Cloud-based enterprise network security solution

learn more
Cisco Umbrella is an enterprise network security solution that provides DNS-layer security to block threats before connections are established. The platform includes features such as secure web gateway, cloud access security broker, data loss prevention, cloud-delivered firewall, and malware protection. It leverages threat intelligence from Cisco Talos and operates on a global cloud infrastructure to protect users and devices across multiple locations.

Read more about Cisco Umbrella

Users also considered
Syxsense logo

Unified Security and Endpoint Management

learn more
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.

Read more about Syxsense

Users also considered
ManageEngine Browser Security Plus logo

Enterprise browser security tool for IT administrators

learn more
Browser Security Plus, a robust enterprise browser security tool from ManageEngine, empowers IT administrators to manage and fortify browsers efficiently within network infrastructures. Offering a comprehensive suite of features, this tool provides crucial insights into browser usage trends and add-on activities. With Browser Security Plus, IT administrators can elevate their control over browsers, fortifying the overall security posture of the enterprise's web ecosystem.

Read more about ManageEngine Browser Security Plus

Users also considered
NordLayer logo

Cloud-based network security platform for businesses

learn more
NordLayer reduces endpoint risks with Web Protection, device posture monitoring, and custom DNS. It detects jailbroken/rooted devices, blocks malicious files, and stops phishing threats, securing all endpoints across Windows, macOS, iOS, Android, and Linux.

Read more about NordLayer

Users also considered
BLACKbox logo

Data protection solution

learn more
BLACKbox is a data protection service that provides complete data loss protection and breach detection across laptops, desktops, on-premises servers, data centers, public cloud environments and more.

Read more about BLACKbox

Users also considered
Microsoft Defender XDR logo

Cross-domain threat protection with built-in AI

learn more
Microsoft 365 Defender is an automated, cross-domain security solution that leverages the power of the Microsoft 365 security portfolio to automatically analyze threat data across domains, building a complete picture of each attack in a single dashboard. Microsoft 365 Defender is part of Microsoft’s XDR (extend, defend, recover) strategy and aims to provide global visibility into the data generated by existing security solutions.

Read more about Microsoft Defender XDR

Users also considered
Apex One logo

Endpoint protection and threat intelligence software

learn more
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers a host-based intrusion prevention system (HIPS), which enables administrators to virtually patch vulnerabilities.

Read more about Apex One

Users also considered