App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Endpoint Protection Software - Page 5

AvatarImg
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.

171 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Cynet 360 logo

Cynet 360

5.0
(3)

Automated breach response and protection platform

learn more
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.

Read more about Cynet 360

Users also considered
CleanCloud by SEK logo

CleanCloud by SEK

5.0
(3)

A cloud computing management tool

learn more
CleanCloud is a cloud computing management tool that offers integration with Azure, AWS, and Google Cloud. It provides an overview of vulnerable items, analyzes all cloud resources, monitors critical assets, and performs audits that detail each identified event. Available in Portuguese and English.

Read more about CleanCloud by SEK

Users also considered
NACVIEW logo

NACVIEW

4.2
(5)

Network access control solution

learn more
NACVIEW is a network access control solution. NACVIEW provides visibility of all connected devices across the whole network. A variety of profiling methods allows you to define what is connected to your network type of device, operating system, and more.

Read more about NACVIEW

Users also considered
Inky logo

Inky

4.2
(5)

The most effective solution when fighting phishing attacks.

learn more
INKY is an endpoint protection tool that helps businesses leverage artificial intelligence (AI) technology and machine learning capabilities to identify and prevent phishing attacks. INKY can be integrated with Microsoft Exchange, Google Workspace and other applications.

Read more about Inky

Users also considered
Comodo logo

Comodo

4.7
(3)

Endpoint and threat detection software

learn more
Comodo provides endpoint protection and threat prevention solutions. The products help enterprise customers and consumers alike protect their organizations and data against malware, phishing attacks and other threats.

Read more about Comodo

Users also considered
Tanium Endpoint Platform logo

Tanium Endpoint Platform

4.3
(4)

Endpoint and computer security software

learn more
Tanium Endpoint Platform is an on-premise and cloud-based computer security software that helps businesses manage incidents, track asset inventory, handle vulnerability, and more from within a unified platform

Read more about Tanium Endpoint Platform

Users also considered
Banyan Security logo

Banyan Security

4.3
(4)

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered
DeepArmor logo

DeepArmor

4.0
(5)

Endpoint protection platforms for SMBs

learn more
DeepArmor is an artificial intelligence-powered endpoint protection and security platform for small to medium businesses. The solution can be used by security operations teams and security providers to detect and protect against threats, ransomware, malware, viruses, and other IT security risks.

Read more about DeepArmor

Users also considered
Quantum Network Security logo

Quantum Network Security

5.0
(2)

Network security suite for cyber attack threat prevention

learn more
Quantum Network Security is a scalable suite of solutions that protect against Gen V cyber attacks across networks, endpoints, clouds, data centers, and more. The suite provides a unified management platform, SandBlast threat prevention, hyper-scale networking, plus VPN and IoT security. Quantum Network Security also offers security gateway appliances that can be installed in-office.

Read more about Quantum Network Security

Users also considered
Twingate logo

Twingate

5.0
(2)

Secure work, anywhere

learn more
Twingate makes it easy for organizations to adopt a Zero Trust architecture, replacing corporate VPNs with a more secure and usable solution.

Read more about Twingate

Users also considered
ReaQta-Hive logo

ReaQta-Hive

5.0
(2)

Experience Security Without Complexity

learn more
ReaQta, an IBM company, is an AI Autonomous Detection & Response platform built by AI/ML researchers and cyber security experts. ReaQta allows companies to eliminate extremely advanced endpoint threats in real-time.

Read more about ReaQta-Hive

Users also considered
Shieldoo logo

Shieldoo

5.0
(2)

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
ISS logo

ISS

4.3
(3)

Cloud-based compliance management solution

learn more
INSSIDE Security Suite is a leading cloud-based platform in regulatory compliance solutions, designed by collaborators, allowing companies to manage risks, and facilitating the creation of reports, analysis, and monitoring of compliance processes.

Read more about ISS

Users also considered
Symantec Endpoint Detection and Response logo

Symantec Endpoint Detection and Response

3.6
(5)

Cloud-based endpoint detection and response management tool

learn more
Symantec Endpoint Detection and Response is a cloud-based solution designed to help enterprises detect and respond to advanced persistent threats. With an average dwell time of 190 days, these threats can be difficult to detect and remediate, but Symantec EDR's machine learning and behavioral analytics capabilities make it possible to identify and prioritize incidents quickly and accurately.

Read more about Symantec Endpoint Detection and Response

Users also considered
Detego Digital Forensics logo

Detego Digital Forensics

4.5
(2)

Digital forensics and investigation management software

learn more
Detego Digital Forensics is designed to help law enforcement units, intelligence agencies, and corporate enterprises extract information from PCs, removable storage, and mobile devices. It enables forensic teams to automate workflows, manage documents, and generate customer reports via a unified platform.

Read more about Detego Digital Forensics

Users also considered
Cisco Secure Cloud Analytics logo

Cisco Secure Cloud Analytics

4.5
(2)

Network security software for on-premise & cloud environment

learn more
Cisco Secure Cloud Analytics is a network security software, designed to help businesses automatically track threats across on-premises and cloud environments. It allows users to monitor internal and external threats, malware, policy violations, misconfigured cloud assets, blacklisted communication, and user misuse.

Read more about Cisco Secure Cloud Analytics

Users also considered
Imperva Sonar logo

Imperva Sonar

3.5
(4)

Unified cybersecurity platform for IT professionals

learn more
Imperva Sonar is a unified cybersecurity platform that provides fully integrated protection for applications and databases against emerging, automated, and insider attacks. It can be used to protect critical databases, applications, websites, and, APIs.
The Imperva Sonar platform includes behavioral analysis, threat prevention, data governance, cloud discovery, bot management, plus other types of protective technology.

Read more about Imperva Sonar

Users also considered
TEHTRIS XDR Platform logo

TEHTRIS XDR Platform

4.0
(2)

Consolidate all your cyber solutions in a single console

learn more
XDR / EDR is a powerful endpoint security solution that includes real-time monitoring and collection of endpoint security data with an automated threat response mechanism.
Its missions are: detecting known and unknown attacks, launch remediations and provide advanced investigation features.

Read more about TEHTRIS XDR Platform

Users also considered
CybrHawk SIEM XDR logo

CybrHawk SIEM XDR

5.0
(1)

Transforming cybersecurity with unprecedented visibility

learn more
Delivering top-notch cybersecurity solutions to protect businesses from evolving threats. Stay ahead with our cutting-edge technologies, comprehensive services, and expert team. Visit www.cybrhawk.com for robust protection and peace of mind in the digital landscape.

Read more about CybrHawk SIEM XDR

Users also considered
Dhound logo

Dhound

5.0
(1)

Web security monitoring & intrusion detection tool

learn more
Dhound is a security monitoring and intrusion detection tool for internet facing servers, clouds and web applications.

Read more about Dhound

Users also considered
Absolute logo

Absolute

5.0
(1)

Mobile device management & asset management app

learn more
Absolute Manage is a mobile device management software to deploy apps to mobiles, track devices, share files & content, manage BYOD policies, & more.

Read more about Absolute

Users also considered
CyberCAST logo

CyberCAST

5.0
(1)

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
CipherBox logo

CipherBox

5.0
(1)

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Venafi Trust Protection Platform logo

Venafi Trust Protection Platform

5.0
(1)

Cloud-based cybersecurity platform

learn more
Venafi is a cloud-based cybersecurity platform that helps in identity management and securing machine-to-machine connections and communications.

Read more about Venafi Trust Protection Platform

Users also considered
SYSVOOT Antivirus Pro logo

SYSVOOT Antivirus Pro

5.0
(1)

Your Freedom From Computer Viruses

learn more
Great protection with real time support. All at one price.

Read more about SYSVOOT Antivirus Pro

Users also considered