Top Endpoint Protection Software Products

2,000+ businesses use Capterra each week to find the right software.


FEATURED PRODUCTS

SentinelOne is redefining endpoint and server security with a next-generation endpoint protection platform that includes machine learning, behavioral attack detection, real-time forensics, and automated, policy-base responses. SentinelOne is the only next-gen endpoint protection product that is certified by AV-Test on both Windows and OS X and offers guaranteed protection against ransomware. SentinelOne offers broad platform support and consumes minimal system resources. View Profile

Next-generation endpoint/server protection includes behavioral attack detection, real-time forensics, and automated responses. View Profile

A web-based windows desktop management software that helps in managing 1000s of desktops from a central location. It can manage desktops both in LAN and across WAN. It automates regular desktop management activities like installing software, patches, and service packs, standardize the desktops by applying uniform configurations such as wallpapers, shortcuts, printer, etc. In simple terms, it helps administrators to automate, standardize, secure, and audit their windows network. View Profile

Helps administrators to automate, standardize, secure, and audit their windows network. Desktop Central now supports MDM also. View Profile

Avast for Business Premium Endpoint Protection is a premium simple and efficient solution to protect business data and files from malwares, cyber threats and attacks. No installation needed. Accessible and managed from anywhere. Protects your file, sharepoint, SBS, exchange and email servers, Windows and Macs. Companies can protect as many devices as needed. It includes also enhanced firewall, antispam and data shredder. View Profile

Avast provides businesses with premium, simple and efficient web based managed antivirus to protect data and files from cyber threats. View Profile

SECDO is transforming life for security teams, enabling them to investigate and respond to incidents faster than ever. With a combination of automated alert validation, contextual investigation, threat hunting and rapid remediation, SECDO gives security professionals the power to keep the enterprise free from threats. Only SECDO automatically validates every SIEM alert, using detailed endpoint activity history and causality analysis to provide the full context of the alert back to the root cause View Profile

Secdos next-gen incident response platform includes automated alert validation, contextual investigation and rapid remididation View Profile

Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware. View Profile

Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware. View Profile

SecureAnywhere

by Webroot Software

Advanced protection against viruses and malware offering full protection against all of todays sophisticated malware threats. View Profile

Advanced protection against viruses and malware offering full protection against all of todays sophisticated malware threats. View Profile

Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control. View Profile

Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control. View Profile

Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. View Profile

Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. View Profile

Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers. View Profile

Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers. View Profile

Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS. View Profile

Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS. View Profile

VIPRE Antivirus Business

by ThreatTrack Security

Business antivirus and mobile device management system that includes small-footprint anti-malware agent and email protection for PCs. View Profile

Business antivirus and mobile device management system that includes small-footprint anti-malware agent and email protection for PCs. View Profile

Web filtering, WAN optimization, application firewall, and antivirus/anti-malware functionality for laptops, PCs, and mobile devices. View Profile

Web filtering, WAN optimization, application firewall, and antivirus/anti-malware functionality for laptops, PCs, and mobile devices. View Profile

360factors

by 360factors

Comprehensive modular regulatory risk and compliance management suite for oil and gas, banking, finance, power & utilities sectors. View Profile

Comprehensive modular regulatory risk and compliance management suite for oil and gas, banking, finance, power & utilities sectors. View Profile

Duo Security

by Duo Security

Duo's endpoint security identifies, blocks and warns users with outdated, vulnerable devices to protect your apps from a data breach. View Profile

Duo's endpoint security identifies, blocks and warns users with outdated, vulnerable devices to protect your apps from a data breach. View Profile

Cloud solution with data loss prevention and mobile device management, subscription and client deployment management functionality. View Profile

Cloud solution with data loss prevention and mobile device management, subscription and client deployment management functionality. View Profile

WildFire

by Palo Alto Networks

Cloud-based malware analysis solution for automated unknown malware detection and threat prevention. View Profile

Cloud-based malware analysis solution for automated unknown malware detection and threat prevention. View Profile

Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data. View Profile

Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data. View Profile

Adept Secure

by Adept Technologies

Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking. View Profile

Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking. View Profile

Connected MX

by Hewlett-Packard

Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing. View Profile

Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing. View Profile

Enables endpoint security control providing behavior-based detection and analysis of malware. View Profile

Enables endpoint security control providing behavior-based detection and analysis of malware. View Profile

Endpoint Policy Management

by Check Point Software Technologies

Provides a single management console, security compliance verification, media encryption, anti-malware and program control. View Profile

Provides a single management console, security compliance verification, media encryption, anti-malware and program control. View Profile

Enterprise antivirus solution built to centrally manage and monitor the security with device control and anti-malware protection tools. View Profile

Enterprise antivirus solution built to centrally manage and monitor the security with device control and anti-malware protection tools. View Profile

EventTracker

by EventTracker

By owning both the technology and the expertise, we quickly deliver advanced threat protection and security orchestration. View Profile

By owning both the technology and the expertise, we quickly deliver advanced threat protection and security orchestration. View Profile

Falcon Host

by CrowdStrike

Next-generation endpoint protection software that detects, prevents, and responds to attacks. View Profile

Next-generation endpoint protection software that detects, prevents, and responds to attacks. View Profile

GFI EndPointSecurity reduces risk of data leaks and other malicious activity View Profile

GFI EndPointSecurity reduces risk of data leaks and other malicious activity View Profile

Heimdal CORP

by Heimdal Security

Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. View Profile

Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering. View Profile

Endpoint security and management solution with integrated antivirus and whitelisting capabilities. View Profile

Endpoint security and management solution with integrated antivirus and whitelisting capabilities. View Profile

SecPod

by SecPod Technologies

SecPod creates computer security software for proactively managing endpoint computer risks. View Profile

SecPod creates computer security software for proactively managing endpoint computer risks. View Profile

Endpoint protection solution designed to secure laptops, file servers, virtual and physical desktops, ATMs and POS endpoints. View Profile

Endpoint protection solution designed to secure laptops, file servers, virtual and physical desktops, ATMs and POS endpoints. View Profile

Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more. View Profile

Modular endpoint protection solution that includes policy scanning, file integrity monitoring, Windows log collection, and more. View Profile

UpGuard

by UpGuard

Get complete visibility into the configuration of every server, network device, and cloud app you're running. View Profile

Get complete visibility into the configuration of every server, network device, and cloud app you're running. View Profile

Filter Results (31)

Product Rating

Number of Users

Deployment

Features