getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Endpoint Protection Software - Page 2

Last updated: February 2026

183 software options

LogMeIn Central logo

Endpoint management for desktops, servers & mobile laptops

learn more
LogMeIn Central is an endpoint management solution which helps IT professionals to monitor, manage, and secure their organization's endpoint infrastructure including desktops, servers and laptops. Users can remotely deploy & automate routine IT tasks for any PC or Mac from anywhere, via any device.

Read more about LogMeIn Central

Users also considered
JumpCloud Directory Platform logo

A cloud directory platform for secure access to resources

learn more
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere.

Read more about JumpCloud Directory Platform

Users also considered
Splunk Enterprise logo

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
WebTitan logo

DNS-based web filter, malware/phishing protection & security

learn more
DNS Based Advanced Web Security Filter blocking Malware, Ransomware and Phishing attempts.

Read more about WebTitan

Users also considered
FortiClient logo
Category Leaders

Endpoint protection software with behavior-based analytics

learn more
FortiClient is an endpoint protection software that helps businesses identify malicious attacks across multiple vectors, including web, USB, and email. The software inventory management module allows managers to monitor all software installed on an endpoint and remove outdated applications.

Read more about FortiClient

Users also considered
Bitdefender GravityZone logo
Category Leaders

Security & risk analytics platform with threat intelligence

learn more
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.

Read more about Bitdefender GravityZone

Users also considered
CrashPlan logo

Easy, secure, & cost-effective backup and recovery

learn more
CrashPlan serves SMBs and enterprises seeking reliable endpoint, server, Google workspace and Microsoft 365 backup to safeguard data, ensure compliance, and enable fast recovery.

Read more about CrashPlan

Users also considered
AccessPatrol by CurrentWare logo

Device control software - secure data from illicit transfers

learn more
Device control software. Enforce the exclusive use of authorized peripheral devices. Block USB portable storage devices and restrict file transfers to protect sensitive data against theft.

Read more about AccessPatrol by CurrentWare

Users also considered
OpenText Core Endpoint Protection​ logo

Smarter Cybersecurity Services & Solutions

learn more
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack.

Read more about OpenText Core Endpoint Protection​

Users also considered
Intercept X Endpoint logo
Category Leaders

Endpoint protection software for security analysts

learn more
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.

Read more about Intercept X Endpoint

Users also considered
Safetica logo

Intelligent Data Security

learn more
Safetica monitors your endpoints and protects them against insider threats and data breaches.

Read more about Safetica

Users also considered
ACMP Suite logo

Keep clients running!

learn more
In a world full of unpredictability, choosing the right partner is crucial. We are your guide on the path to greater simplicity and efficiency. ACMP offers modular and scalable solutions for your specific challenges in the IT department.

Read more about ACMP Suite

Users also considered
GoodAccess logo
Category Leaders

Zero Trust Architecture as a Service

learn more
Cybersecurity platform (SASE/SSE) that enables easy Zero Trust Architecture implementation for medium enterprises, any scale.

Read more about GoodAccess

Users also considered
SentinelOne logo

Protect your Endpoints, Cloud, and Data

learn more
SentinelOne delivers autonomous cybersecurity powered by AI, enabling real-time prevention, detection, and response to threats across endpoints, cloud workloads, and identity systems—empowering organizations to stay ahead of cyberattacks with speed, visibility, and control.

Read more about SentinelOne

Users also considered
ThreatLocker logo

Allow what you need, Block everything else.

learn more
Stop ransomware with policy-driven endpoint protection. ThreatLocker enables organizations of all sizes with Zero Trust controls such as application allowlisting, Ringfencing, elevation and storage controls, as well as operational alerts.

Read more about ThreatLocker

Users also considered
UTunnel VPN logo

Cloud VPN, Zero Trust Network Access, and Mesh Networking

learn more
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!

Read more about UTunnel VPN

Users also considered
Password Depot  logo

The oustanding password manager.

learn more
Password Depot is a password management solution that helps businesses ensure optimal protection for sensitive data. The application allows users to safeguard passwords, documents, identities, debit or credit cards, and more with AES Rijndael 256 double encryption. It generates secure passwords and automates data entry, eliminating the need for manual typing. Users can access their passwords across multiple devices, including Windows, Mac, iOS, and Android.

Read more about Password Depot

Users also considered
VMware Cloud Director Availability logo

Streamline your Cloud Migration and Disaster Recovery

learn more
VMware Cloud Director Availability provides replications and failover at a vApp or virtual machine level. VMware Cloud Director Availability is a unified solution, that provides on-premises to cloud and cloud to cloud onboarding, migration, and disaster recovery for multi-tenant cloud sites.

Read more about VMware Cloud Director Availability

Users also considered
DNSFilter logo

Cloud-based cybersecurity and network monitoring platform

learn more
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

Users also considered
Perimeter 81 logo
Category Leaders

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. Features such as Device Posture Check allow for endpoint protection, identity management, and advanced remote security.

Read more about Perimeter 81

Users also considered
Teramind logo

Employee Monitoring, Insider Threat & Data Loss Prevention

learn more
Teramind is an employee monitoring, insider threats detection and data loss prevention solution. Track all activity and productivity of employees, privileged users, remote workers to prevent IP and data leaks.

Read more about Teramind

Users also considered
Admin By Request logo

Local admin rights, managed.

learn more
Endpoint privilege management with just-in-time admin elevation, full auditing, and secure remote access for Windows, macOS, and Linux. Anti-malware file scanning, SSO and MFA enforcement, ML and AI automation, temporary local admin accounts, and a full inventory and detailed auditlog.

Read more about Admin By Request

Users also considered
OneLogin logo

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
N-central logo

On-premise and hosted RMM software for MSPs

learn more
N-able N-central is an endpoint detection and response software designed to help managed service providers (MSPs) prevent, detect, respond to, and recover from threats.

Read more about N-central

Users also considered
WatchGuard Endpoint Security logo

Cloud-based endpoint protection and computer security tool

learn more
Designed for businesses of all sizes, WatchGuard Endpoint Security is a cloud-based computer security software that helps businesses protect systems against cyber threats and detect endpoint malware through a unified platform

Read more about WatchGuard Endpoint Security

Users also considered