Compare the best Endpoint Protection software currently available using the table below.
SecPod Technologies
SecPod SanerNow is a unified platform which offers both endpoint management and security solutions in a centralized cloud-based console. SanerNow helps administrators with their day-to-day IT management and security tasks by offering features like patch management, IT asset management, vulnerability management, application control, device control, endpoint management, software deployment, endpoint threat detection and response etc. All these tasks can be automated and remotely performed to secure the systems from the emerging wave of cyberattacks.
DriveStrike
DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have questions or need help understanding how best to protect your data please contact us and we will gladly answer your questions. Protect your business with a device and data protection platform that keeps all devices safe with a single solution and Dashboard. Keep your Workstations, MacBooks, iPads, Smartphones, Tablets, Laptops safe, secure, and organized.
Splashtop
Remotely support internal and client computers with unattended remote access and provide users with remote access. Whether you’re just getting started with remote support tools, or looking to find an alternative to another product due to high prices, Splashtop Remote Support is the solution for you. Splashtop Remote Support is a best-in-class remote support tool that gives you the freedom to remote into your managed computers from any device, at any time, thanks to our fast, high definition connections.
BetterCloud
BetterCloud is the first SaaS Operations Management platform, empowering IT to secure user interactions across SaaS applications. Over 2,500 customers in 60+ countries rely on BetterCloud for continuous event monitoring, quickly remediating threats, and fully automating policy enforcement. Common use cases for BetterCloud include: - Automated user onboarding and offboarding - Content scanning and data protection policies - Privileged access management For more information about BetterCloud, visit www.bettercloud.com.
1Password
1Password is a secure, scalable, and easy-to-use password manager that's trusted by the world's leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password is part of their workflow, good security habits will become second nature. 1Password Advanced Protection is now available with 1Password Business. Set Master Password policies, enforce two-factor authentication team-wide, restrict access with firewall rules, review sign-in attempts and require your team to use the latest version of 1Password. Our award-winning apps are available for Mac, iOS, Linux, Windows, and Android. 1Password syncs seamlessly across devices, so your employees always have access to their passwords. When everyone uses 1Password, your risk goes down — and your productivity goes up.
WhiteCanyon Software
WipeDrive allows home users, corporations and government entities to securely and permanently erase data from hard drives, removable media, and mobile devices, providing a cost-effective, secure, and socially responsible way of recycling and retiring computer storage. WipeDrive is the world leader in secure data destruction.
Advanced Systems International
USB Control & Lockdown Software to Block USB Devices Access and Lock USB Ports in Windows Systems. Centralized USB Device Management, Monitoring and Whitelisting to Protect Computers in a Network. USB Device Control is an important part of Endpoint Security Management and focuses in the protection of computer systems and data assets from threats posed by unauthorized USB device usage. Controlling USB devices access to endpoints is required to secure networks that control machinery or store sensitive information. - Centralized USB Device Management. - Secures Groups of Computer or Specific Computers. - Whitelists Specific Devices by Hardware ID and Blocks the rest. - Receives Alerts & Logs Device Connections in the Network Automatically. - Presents Full Screen Locking upon Blocking Devices (includes your company logo). - Monitors & Encrypts File Transfers from Endpoints to Authorized USB drives (ON/OFF). - Easy Client Deployment through Group Policy (Windows Installer MSI).
Duo Security
Founded in 2010, Duo Security is a software organization based in the United States that offers a piece of software called Duo Security. Duo Security features training via documentation, live online, webinars, and in person sessions. The Duo Security software suite is SaaS software. Duo Security offers business hours, and online support. Duo Security offers a free version, and free trial. Duo Security is endpoint protection software, and includes features such as credential management, multifactor authentication, password synchronization, single sign on, and user management. Software pricing starts at $1.00/month/user. Some competitor software products to Duo Security include JumpCloud DaaS, 1Password, and Identity Manager.
Fortinet
Multilayered endpoint security with behavior based analysis for prevention against known and unknown threats. Complete real-time visibility of all your global software inventory. Here, there, anywhere. Cloud-delivered FortiClient endpoint protection service designed for small and medium-sized business. Integrated endpoint protection platform that provides automated next-generation threat protection, visibility and control of your software and hardware inventory across the entire security fabric. Identify & remediate vulnerable or compromised hosts across your attack surface. As a key piece of the Fortinet Security Fabric, FortiClient integrates endpoints into the fabric for early detection and prevention of advanced threats. Security events including zero-day malware, botnet detections, and vulnerabilities are reported in real-time.
ManageEngine
Keep all your production businesses up to date by automating the entire patching process using Patch Manager Plus. Available as both cloud-based and on-premise software, Patch Manager Plus offers features that include scanning for and detecting missing patches, automated scheduled patch deployments, test and approve patches, patch tracking, patch compliance and reporting. Patch Manager Plus also enables users to provide detailed audit and compliance reports.
Webroot Software
Founded in 1997, Webroot Software is a software organization based in the United States that offers a piece of software called Webroot Business Endpoint Protection. Webroot Business Endpoint Protection features training via documentation, webinars, and in person sessions. The Webroot Business Endpoint Protection software suite is SaaS, Mac, Windows, Android, iPhone, and iPad software. Webroot Business Endpoint Protection offers online, business hours, and 24/7 live support. Webroot Business Endpoint Protection offers a free trial. Webroot Business Endpoint Protection is IT management software. Software pricing starts at $30.00/year. Some competitor software products to Webroot Business Endpoint Protection include EventLog Analyzer, Kaspersky Endpoint Security, and AVG Antivirus Business Edition.
Avast
Founded in 1988, Avast is a software organization based in Czech Republic that offers a piece of software called Avast Business Antivirus Pro Plus. Avast Business Antivirus Pro Plus offers online support. Avast Business Antivirus Pro Plus features training via documentation. The Avast Business Antivirus Pro Plus software suite is SaaS, Mac, and Windows software. Avast Business Antivirus Pro Plus is IT management software, and includes features such as anti spam, anti virus, internet usage monitoring, IP protection, and spyware removal. Software pricing starts at $39.99/year/user. Avast Business Antivirus Pro Plus offers a free trial. Some competitor software products to Avast Business Antivirus Pro Plus include ESET Endpoint Security, AVG Antivirus Business Edition, and Kaspersky Endpoint Security.
Lookout
Lookout is a software company and offers a software product called Lookout. Lookout is endpoint protection software. Some alternative products to Lookout include CrowdStrike Falcon, Adept Secure, and VIPRE Antivirus Business.
ManageEngine
ManageEngine's Desktop Central is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Desktop Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
Veriato 360
Track and monitor employee activity with Veriato 360, an employee monitoring solution. Veriato 360 enables employers and managers to collect and monitor full fidelity data on the activity of employees. With Veriato 360, users are able to control data collection and tracking monitor activities. Veriato 360 also offers playback on video records along with other features such as alerts, search, quick review panels, and scheduled reports.
Hexnode
Hexnode MDM is a Unified Endpoint Management solution that manages devices across multiple platforms from a single pane of glass. With a user-centric approach, the management process is streamlined throughout the entire device lifecycle- starting from enrollment up until device retirement. Trusted by SMBs to Fortune 500 companies around the world, Hexnode offers a wealth of MDM tools perfect for today's increasingly mobile, modern teams. These include endpoint management for all types of devices (including iOS, Android, Windows, macOS, tvOS, and fireOS), an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking and so much more.
CurrentWare Inc.
AccessPatrol is a proactive solution for securing company endpoints to prevent the illicit transfer of data and download of malware from unauthorized devices, resulting in an increase of network security for businesses of all sizes. You can restrict or permit device access to computers within your network by type device, device brand, and device serial number. Investigate file transfer activity using AccessPatrol's report generator to determine any file modifications and file locations.
Infocyte
The Infocyte Managed Detection and Response platform helps security teams proactively hunt, detect, and respond to cyber threats and vulnerabilities resident within their network—across physical, virtual, and serverless assets. Our MDR platform provides asset and application discovery, automated threat hunting, and on-demand incident response capabilities. Combined, these proactive cyber security practices help organizations control attacker dwell time, reduce overall cyber risk, maintain compliance, and streamline security operations.
HiddenApp
Maintain complete control over key mobile assets and sensitive data. Centrally monitor and track your Apple device fleet with one easy to install solution, that fully complements any MDM.
SentinelOne
SentinelOne delivers cutting-edge security with this platform by offering protection against malware, exploits, and scripts. SentinelOne cloud-based platform has been perfected to be innovative compliant with security industry standards, and high-performance whether the work environment is Windows, Mac or Linux. Thanks to constant updating, threat hunting, and behavior AI, the platform is ready for any threat.
JumpCloud
JumpCloud® Directory-as-a-Service® is Active Directory® and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems – whether Mac, Linux, or Windows – and provides access to cloud and on-prem resources such as Office 365™, G Suite, AWS™ cloud servers, Salesforce™, and Jira® among thousands of others. The same login also connects users to networks and file shares via RADIUS and Samba, respectively, securing your organization’s WiFi and file server access. Leveraging cloud-based directory services, IT organizations can choose the best IT resources for the business enabling users to be as productive as possible.
Kandji
The modern MDM for Apple. Manage your macOS, iOS, iPadOS, and tvOS devices. Kandji works with Apple Business Manager, formerly the Device Enrollment Program (DEP), to automate device deployment so your employees can use their devices right out of the box without a visit to IT. Save time with automated patching by choosing from Kandji’s library of Auto Apps. You can also sync App Store apps from Apple Business Manager, upload and deploy custom apps, or even blacklist unwanted software. Choose from the largest library of configuration settings to customize the way your organization uses everything from Wi-Fi profiles to email accounts to custom scripts. With Kandji, compliance is never an afterthought. As the only MDM with a pre-built library of security controls (over 150 and growing), Kandji includes the industry’s first macOS compliance agent that automatically enforces and remediates issues, even when your devices are offline.
Wallarm
Wallarm Advanced WAF protects websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. Protect from all types of threats. XSS, XXE, SQL Injections, RCE and other OWASP Top 10 threats. Brute-force attacks, dirbusting, and account takeover (ATO). Application abuse and logic bombs, bots. 88% of customers use Wallarm Advanced Cloud-Native WAF in blocking mode. Signature-free rules are created automatically and customized for every application. Robust, fast, highly available filtering nodes. A variety of deployment in any cloud. Modern tech stack support: Docker, Kubernetes, websockets. Managed and scaled by DevOps toolchain.
ManageEngine
Enterprise vulnerability management software. Vulnerability Manager Plus is an integrated threat and vulnerability management software that delivers comprehensive vulnerability scanning, assessment, and remediation across all endpoints in your network from a centralized console. Scan and discover exposed areas of all your local and remote office endpoints as well as roaming devices. Leverage attacker-based analytics, and prioritize areas that are more likely to be exploited by an attacker. Mitigate the exploitation of security loopholes that exist in your network and prevent further loopholes from developing. Assess and prioritize vulnerabilities based on exploitability, severity, age, affected system count, as well as the availability of the fix. Download, test, and deploy patches automatically to Windows, Mac, Linux, and over 250 third-party applications with an integral patching module—at no additional cost.
Heimdal Security
Thor Foresight Enterprise is a revolutionary, modular, and cost-effective approach to endpoint security. It was developed by Heimdal Security, a company founded in Denmark in 2011 by Defcon CTF champions. Thor Foresight Enterprise is a proactive DNS filtering and patch management solution that features EDR and HIPS capabilities to prevent evolving threats and fully secure your business. Its embedded VectorN Detection is a unique threat communication filtering algorithm that uses behavioral traffic analysis to prevent attacks that cannot be detected by signature-based, reactive solutions. It also combines Darklayer GUARD, an essential EDR tool that brings unique traffic-based malware blocking to prevent endpoint compromise and eliminate data exfiltration. Through X-Ploit Resilience, organizations can also automatically patch security-critical software across the board, with no location or scheduling restraints, eliminating vulnerabilities and extraneous costs all in one go.