App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Endpoint Protection Software - Page 2

AvatarImg
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.

182 software options

Sponsored

Personalize your search

Any industry

Any business size

FortiClient logo
4.5
(268)

Endpoint protection software with behavior-based analytics

learn more
FortiClient is an endpoint protection software that helps businesses identify malicious attacks across multiple vectors, including web, USB, and email. The software inventory management module allows managers to monitor all software installed on an endpoint and remove outdated applications.

Read more about FortiClient

Users also considered
Bitdefender GravityZone logo
4.6
(208)

Security & risk analytics platform with threat intelligence

learn more
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.

Read more about Bitdefender GravityZone

Users also considered
CrashPlan logo
4.5
(245)

Easy, automatic cloud business backup

learn more
Code42's CrashPlan for Small Business is a global enterprise SaaS provider of endpoint data protection and security. Backup, restore and protect your data from anywhere with CrashPlan for Small Business.

Read more about CrashPlan

Users also considered
Webroot Business Endpoint Protection logo
4.5
(212)

Smarter Cybersecurity Services & Solutions

learn more
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack.

Read more about Webroot Business Endpoint Protection

Users also considered
Intercept X Endpoint logo
4.5
(214)

Endpoint protection software for security analysts

learn more
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.

Read more about Intercept X Endpoint

Users also considered
Safetica logo
4.7
(128)

Data loss prevention and insider threat protection solution

learn more
Safetica monitors your endpoints and protects them against insider threats and data breaches.

Read more about Safetica

Users also considered
AccessPatrol logo
4.9
(101)

Device control software - secure data from illicit transfers

learn more
Device control software. Enforce the exclusive use of authorized peripheral devices. Block USB portable storage devices and restrict file transfers to protect sensitive data against theft.

Read more about AccessPatrol

Users also considered
GoodAccess logo
4.9
(95)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
Cypherdog Encryption logo
4.8
(102)

One click. Complete protection.

learn more
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to the communication.

No "trusted" third party, zero-knowledge security model, asymmetric encryption.

Read more about Cypherdog Encryption

Users also considered
Action1 logo
4.9
(94)

Patching That Just Works

learn more
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.

Read more about Action1

Users also considered
SentinelOne logo
4.8
(78)

Autonomous endpoint protection platform

learn more
Autonomous endpoint protection through a single agent that successfully prevents, detects, and responds to attacks across all major vectors.

Read more about SentinelOne

Users also considered
VMware Cloud Director Availability logo
4.8
(80)

Streamline your Cloud Migration and Disaster Recovery

learn more
VMware Cloud Director Availability provides replications and failover at a vApp or virtual machine level. VMware Cloud Director Availability is a unified solution, that provides on-premises to cloud and cloud to cloud onboarding, migration, and disaster recovery for multi-tenant cloud sites.

Read more about VMware Cloud Director Availability

Users also considered
DNSFilter logo
4.8
(83)

Cloud-based cybersecurity and network monitoring platform

learn more
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

Users also considered
Perimeter 81 logo
4.8
(69)

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. Features such as Device Posture Check allow for endpoint protection, identity management, and advanced remote security.

Read more about Perimeter 81

Users also considered
OneLogin logo
4.6
(90)

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
Teramind logo
4.6
(86)

Employee Monitoring, Insider Threat & Data Loss Prevention

learn more
Teramind is an employee monitoring, insider threats detection and data loss prevention solution. Track all activity and productivity of employees, privileged users, remote workers to prevent IP and data leaks.

Read more about Teramind

Users also considered
Lookout logo
4.7
(67)

Endpoint-to-cloud security for businesses with remote teams

learn more
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.

Read more about Lookout

Users also considered
Elastic Stack logo
4.6
(67)

Distributed search and analytics solution

learn more
Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.

Read more about Elastic Stack

Users also considered
BrowseControl logo
4.7
(63)

Easy-to-use web filtering software to restrict internet use

learn more
Web filtering software. Blocks websites based on URLs, categories, keywords, and IP addresses. Restrictions can be customized based on groups of users or computers.

Read more about BrowseControl

Users also considered
BlackBerry CylancePROTECT logo
4.6
(64)

Threat detection and endpoint protection platform

learn more
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.

Read more about BlackBerry CylancePROTECT

Users also considered
Syxsense logo
4.6
(61)

Unified Security and Endpoint Management

learn more
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.

Read more about Syxsense

Users also considered
WatchGuard Endpoint Security logo
4.4
(82)

Cloud-based endpoint protection and computer security tool

learn more
Designed for businesses of all sizes, WatchGuard Endpoint Security is a cloud-based computer security software that helps businesses protect systems against cyber threats and detect endpoint malware through a unified platform

Read more about WatchGuard Endpoint Security

Users also considered
PureVPN logo
4.3
(76)

Secured VPN service offering limitless, anonymous web access

learn more
Pure VPN, and PureVPN for Business, is a Virtual Private Network (VPN) for all platforms including Windows, Mac, Linux, iOS and Android that provides 256-bit secured, anonymous and P2P-enabled access to unrestricted internet browsing with features including IP address masking, split tunneling & more

Read more about PureVPN

Users also considered
Microsoft 365 Defender logo
4.5
(56)

Cross-domain threat protection with built-in AI

learn more
Microsoft 365 Defender is an automated, cross-domain security solution that leverages the power of the Microsoft 365 security portfolio to automatically analyze threat data across domains, building a complete picture of each attack in a single dashboard. Microsoft 365 Defender is part of Microsoft’s XDR (extend, defend, recover) strategy and aims to provide global visibility into the data generated by existing security solutions.

Read more about Microsoft 365 Defender

Users also considered
Admin By Request logo
4.8
(37)

Local admin rights, managed.

learn more
Admin By Request is a security solution that enables organizations to monitor and control local admin rights across their endpoints. The tool offers Just-In-Time elevation, anti-malware file scanning, temporary local admin accounts, and a full inventory and Auditlog.

Read more about Admin By Request

Users also considered