App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Endpoint Protection Software - Page 5

AvatarImg
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.

143 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Imperva Sonar logo

Imperva Sonar

3.5
(4)

Unified cybersecurity platform for IT professionals

learn more
Imperva Sonar is a unified cybersecurity platform that provides fully integrated protection for applications and databases against emerging, automated, and insider attacks. It can be used to protect critical databases, applications, websites, and, APIs.
The Imperva Sonar platform includes behavioral analysis, threat prevention, data governance, cloud discovery, bot management, plus other types of protective technology.

Read more about Imperva Sonar

Users also considered
Absolute logo

Absolute

5.0
(1)

Mobile device management & asset management app

learn more
Absolute Manage is a mobile device management software to deploy apps to mobiles, track devices, share files & content, manage BYOD policies, & more.

Read more about Absolute

Users also considered
Cybrhawk SIEM ZTR logo

Cybrhawk SIEM ZTR

5.0
(1)

Security information and Event Management software

learn more
Cybrhawk SIEM ZTR helps users manage all their data and applications across multiple endpoints, ensuring protection from cyber-crimes, and breaches. It automatically captures, stores, and standardizes security information about domain controllers, network computers, and databases.

Read more about Cybrhawk SIEM ZTR

Users also considered
Dhound logo

Dhound

5.0
(1)

Web security monitoring & intrusion detection tool

learn more
Dhound is a security monitoring and intrusion detection tool for internet facing servers, clouds and web applications.

Read more about Dhound

Users also considered
condignum logo

condignum

5.0
(1)

Cloud-based compliance management solution

learn more
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.

Read more about condignum

Users also considered
Venafi Trust Protection Platform logo

Venafi Trust Protection Platform

5.0
(1)

Cloud-based cybersecurity platform

learn more
Venafi is a cloud-based cybersecurity platform that helps in identity management and securing machine-to-machine connections and communications.

Read more about Venafi Trust Protection Platform

Users also considered
SYSVOOT Antivirus Pro logo

SYSVOOT Antivirus Pro

5.0
(1)

Your Freedom From Computer Viruses

learn more
Great protection with real time support. All at one price.

Read more about SYSVOOT Antivirus Pro

Users also considered
Fyde logo

Fyde

5.0
(1)

Network security & access management solution

learn more
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management.

Read more about Fyde

Users also considered
Shieldoo logo

Shieldoo

5.0
(1)

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
Microsoft Enterprise Mobility + Security (EMS) logo

Microsoft Enterprise Mobility + Security (EMS)

4.0
(1)

Enterprise mobility management (EMM) for Microsoft Azure

learn more
Microsoft Intune is a cloud-based enterprise mobility management (EMM) solution designed to help organizations define mobile management strategies which suit their needs, with flexible app and device controls, granular policies, and support for managing iOS, Android, Windows, and macOS devices

Read more about Microsoft Enterprise Mobility + Security (EMS)

Users also considered
Privilege Manager logo

Privilege Manager

4.0
(1)

Endpoint security and access management software

learn more
Privilege Manager is an endpoint application and privilege management software designed to help businesses protect applications from malware and security threats via a unified portal. Organizations can deploy the platform on the cloud or on Windows, Linux, and Mac-based devices.

Read more about Privilege Manager

Users also considered
Endpoint Detection and Response logo

Endpoint Detection and Response

4.0
(1)

Endpoint detection and response software

learn more
Endpoint Detection and Response is an endpoint protection software designed to help managed service providers (MSPs) automatically detect and mitigate zero-day attacks and fileless threats. Administrators can create custom policies to protect the system against ransomware attacks and restore data in real-time.

Read more about Endpoint Detection and Response

Users also considered
zIPS logo

zIPS

(0)

Software to manage secure access across mobile devices

learn more
Zimperium zIPS is a mobile threat defense (MTD) software designed to that helps enterprises provide and manage secure access to data and company systems across employees' mobile devices and applications.

Read more about zIPS

Users also considered
Adept Secure logo

Adept Secure

(0)

Cloud-based network monitoring and cybersecurity software

learn more
Adept Secure is a cloud-based software designed to help businesses monitor computing assets and prevent cybersecurity threats across enterprise networks. Supervisors can track all incoming or outgoing traffic across websites, block specific IP addresses, and redirect them to the appropriate lists for future reference.

Read more about Adept Secure

Users also considered
Appaegis Isolation Access Cloud logo

Appaegis Isolation Access Cloud

(0)

Data Centric Zero Trust

learn more
Appaegis extends zero trust from application access to data access governance to reduce risk, apply real-time control to access, and provide granular visibility to access and availability of critical assets.

Read more about Appaegis Isolation Access Cloud

Users also considered
Deep Freeze Cloud logo

Deep Freeze Cloud

(0)

IT asset management and endpoint protection tool

learn more
Deep Freeze Cloud by Faronics is an IT asset management tool that allows you to manage all your systems from one console. It lets you manage your entire fleet at once, with one click and makes your system indestructible by restoring it every time to the original pristine state.

Read more about Deep Freeze Cloud

Users also considered
Network Detection and Response logo

Network Detection and Response

(0)

Network visibility, threat detection and forensic analysis

learn more
Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. It accelerates the ability for organizations to respond to and identify future attacks before they become serious events.

Read more about Network Detection and Response

Users also considered
Crowdsec logo

Crowdsec

(0)

Let's make the Internet safer, together.

learn more
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.

Read more about Crowdsec

Users also considered
SysCloud logo

SysCloud

(0)

Start making smarter cloud backups

learn more
Google Workspace and Microsoft 365 users can now back up their data to the cloud.

Read more about SysCloud

Users also considered
ZeroThreat Essentials logo

ZeroThreat Essentials

(0)

Endpoint protection software

learn more
Move from detection to prevention With ZeroThreat Essentials to isolate infections such as ransomware and unknowns.

Read more about ZeroThreat Essentials

Users also considered
Privileged Account Manager logo

Privileged Account Manager

(0)

Access Governance redefined for Hybrid environments

learn more
Protect your windows servers and devices from cyberattacks. Eliminate local administrator rights across all endpoints seamlessly. Use automated privilege elevation to raise requests to applications and allow your users and employees to access what they need, without a hassle.

Read more about Privileged Account Manager

Users also considered
Chariot logo

Chariot

(0)

Cybersecurity platform on the offensive.

learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
DriveLock logo

DriveLock

(0)

Cloud-based tool for protecting company data and end-devices

learn more
DriveLock is a cloud-based software that helps businesses manage security processes across multiple IT systems, including hard drives and mobile devices.

Read more about DriveLock

Users also considered
Verimatrix Code Shield logo

Verimatrix Code Shield

(0)

Secure your code with an enterprise grade security toolkit

learn more
Verimatrix Code Shield solution injects powerful, automated, and self-defending security directly into your app. It secures the app from being modified and can be easily implemented at any stage of the development process.

Read more about Verimatrix Code Shield

Users also considered
DIARIO logo

DIARIO

(0)

Document malware detection tool

learn more
DIARIO is capable of scanning documents without them ever leaving the perimeter of the company or user, using an artificial intelligence engine with 100% Telefónica TECH technology. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more.

Read more about DIARIO

Users also considered