Endpoint Protection software is an anti-virus and firewall software installed on a computer and can be used to prevent malware and viruses from attacking the system. Endpoint protection software is a type of security software that monitors and manages devices that have access to a company's or... Read more
Researched and Edited by Rajat Gupta
Last updated: July 2025
Researched and Edited by Rajat Gupta
Last updated: July 2025
Common Features
Threat Protection
Access Control
Remote Access
Encryption
+ 3 more
Unique Features
Analytics (Email)
Fraud Detection
Pricing
39% Software offers Free Trial
Showing 21-40 out of 80
Add to compare
Watch Demo
Product Description
OpenText ZENworks Endpoint Security Management simplifies endpoint security and device management by providing centralized control for businesses of all sizes. This powerful solution enables IT teams to efficiently secure, monitor, and manage endpoints across diverse environments, ensuring ...
Read morePricing
Free Trial available, Try Now
Pros & Cons
Includes monitoring and security tools to detect and respond to potential threats.
Reduces administrative workload with streamlined security and device management.
Ensures endpoint security policies align with industry regulations.
Supports businesses of all sizes, making it ideal for growing organizations.
Some advanced security configurations may not be as flexible as specialized solutions.
Any downtime in the management server could impact endpoint security administration.
Add to compare
Watch Demo
Product Description
NetSupport DNA is a comprehensive solution designed to help organizations of all sizes and industries optimize their technology investments. By focusing on impact, evidence, and co-production, it enables businesses to enhance ROI, identify cost savings, and boost productivity. For educational ...
Read morePricing
Free Trial available, Try Now
NetSupport DNA offers custom pricing plan
Pros & Cons
Ensures a safe digital environment with robust monitoring and control features.
Offers tools to monitor and boost employee and student engagement.
Includes classroom management and student safeguarding tools tailored for schools.
Identifies areas where organizations can cut costs and maximize ROI
Initial deployment and configuration may require technical expertise.
Administrators and users may need time to familiarize themselves with all functionalities.
Add to compare
Watch Demo
Product Description
G DATA offers end-to-end cybersecurity solutions that protect businesses from a wide range of cyber threats, utilizing the latest security software and AI technologies. With a focus on proactive defense, G DATA provides advanced protection against Trojans, malware, and even unknown viruses, ...
Read morePricing
Free Trial available, Try Now
Starts from $30/user/year when yearly
Pros & Cons
Tailored for enterprises, ensuring scalability and compliance with industry standards.
Offers real-time protection to mitigate potential threats before they cause damage.
Empowers employees with cybersecurity best practices to prevent human errors.
Guards against malware, Trojans, and ransomware with high detection rates.
Configuration and fine-tuning might require IT expertise.
Certain security features may not be fully available on non-Windows platforms.
Add to compare
Watch Demo
Product Description
EXO5 Endpoint Security Suite(Now Tether) provides businesses with a powerful, cloud-based solution to track laptops and mobile devices, prevent theft, and secure sensitive data. Offering features like mobile device management (MDM), anti-theft response, endpoint security, and IT asset ...
Read morePricing
Free Trial available, Try Now
Starts from $749/year when yearly
Pros & Cons
Helps organizations monitor hardware and software inventory efficiently.
Includes encryption and anti-theft response to safeguard sensitive information.
Provides full control over mobile endpoints, ensuring secure usage.
Offers a centralized, accessible console for managing security and compliance remotely.
Companies without mobile-dependent workflows may not fully benefit.
Cloud-based security solutions may come with ongoing expenses that increase over time.
Add to compare
Watch Demo
Product Description
DriveStrike offers robust security for devices and data in the event of loss, theft, or unauthorized use, providing businesses with the ability to remotely locate, lock, and wipe devices to prevent data breaches. Trusted by organizations of all sizes, from Fortune 500 companies to small ...
Read morePricing
Free Trial available, Try Now
Starts from $1.25/Device when monthly
Pros & Cons
Helps organizations meet regulatory requirements for data security.
Trusted by enterprises and small businesses alike.
Simplifies remote security management for IT teams.
Ensures sensitive information remains secure, preventing breaches
Wiping a device erases data permanently if not backed up.
While devices can be located, physical retrieval isn’t guaranteed.
Add to compare
Watch Demo
Product Description
Devicie empowers businesses to maintain optimal performance by automating device and software management across all environments. By integrating seamlessly with Microsoft Intune, the platform provides zero-touch configuration for effortless device management, ensuring secure and efficient ...
Read morePricing
Devicie offers custom pricing plan
Pros & Cons
Frees up IT teams to focus on strategic initiatives.
Helps organizations meet security and performance standards.
Ensures security updates are applied without disruption.
Simplifies deployment, reducing IT workload and manual effort
IT teams may need time to adjust to automation workflows.
Recurring costs may be high for small businesses.
Add to compare
Watch Demo
Product Description
CyberArk Endpoint Privilege Manager offers flexible, policy-based management for endpoint privileges on Windows, macOS, and Linux systems. By enforcing least privilege access, it helps organizations reduce their attack surface and defend against ransomware, credential theft, and other cyber ...
Read morePricing
Free Trial available, Try Now
Cyberark Endpoint Privilege Manager offers custom pricing plan
Pros & Cons
Prevents unauthorized access by enforcing strict privilege policies.
Provides deep visibility into endpoint activities for better security control.
Mitigates the risks associated with privilege escalation.
Works across Windows, macOS, and Linux environments.
Admins may need training to fully leverage policy-based controls
Enterprise-level pricing may be high for small businesses.
Add to compare
Watch Demo
Product Description
BufferZone provides robust security by isolating browsing sessions and endpoints—two of the largest and most vulnerable attack surfaces in any organization. Using patented containment technology, it proactively defends against threats like ransomware, zero-day exploits, and phishing attacks ...
Read morePricing
BUFFERZONE offers custom pricing plan
Pros & Cons
Works in the background without disrupting workflow.
Secures browsing sessions and endpoints, minimizing attack surfaces.
Neutralizes potential threats from downloads and removable media.
Mitigates advanced threats before they cause harm
Strict containment can interfere with legitimate software.
Requires proper setup to balance security and usability.
Add to compare
Watch Demo
Product Description
HP Wolf Security enhances your organization’s cyber-resilience with a full-stack security approach, providing layered protection from hardware to the cloud. It isolates endpoints to block threats that traditional NGAV and EDR solutions may miss, while also incorporating advanced detection and ...
Read morePricing
Bromium - HP Wolf Enterprise Security offers custom pricing plan
Pros & Cons
Provides strong security without disrupting workflow.
Reduces alert fatigue and streamlines incident response.
Ensures printers and devices recover automatically from attacks.
Blocks threats that bypass traditional NGAV and EDR solutions.
Certain features are exclusive to HP devices.
Advanced security functions may require specialized training.
Add to compare
Watch Demo
Product Description
ConnectWise Automate delivers a powerful endpoint management solution, enabling businesses to proactively monitor, manage, and secure all endpoint devices within their networks. By automating critical maintenance tasks such as patching, security updates, and system health monitoring, it ...
Read morePricing
Free Trial available, Try Now
Pros & Cons
Over 100 pre-defined commands streamline desktop and server management tasks.
Enables IT teams to resolve endpoint issues efficiently via ConnectWise ScreenConnect™.
Supports large networks with fewer resources, optimizing IT operations.
Provides real-time access to Hyper-V® and VMWare® environments without additional agents.
Requires time and expertise to configure automation rules effectively.
The feature-rich interface can be overwhelming for new users.
Add to compare
Watch Demo
Product Description
BlackFog is a global cybersecurity leader specializing in on-device Anti Data Exfiltration (ADX) technology to protect organizations from a wide range of cyber threats, including ransomware, spyware, malware, phishing, and unauthorized data collection. With both enterprise and personal ...
Read morePricing
Starts from $4/month when monthly
Pros & Cons
Offers expert threat intelligence and compliance reporting without the need for a full-time CISO.
Provides real-time monitoring and easy deployment across endpoints.
Consumes less than 1% CPU, ensuring minimal impact on system resources.
Uses intelligent algorithms to block C2 server communications and lateral movement.
Cloud-based monitoring may pose challenges in offline environments.
AI-driven filtering may mistakenly block legitimate communications or applications.
Add to compare
Watch Demo
Product Description
Apex Central provides centralized security management that bridges the gap between IT and SOC teams, helping to eliminate silos and improve both visibility and protection across your organization. By consolidating security tasks into one unified platform, it reduces complexity and minimizes ...
Read moreAdd to compare
Watch Demo
Product Description
Tanium Discover empowers organizations to identify and take control of unmanaged endpoints across remote, on-premises, and cloud environments. By scanning networks with hundreds of thousands of endpoints, it helps administrators gain complete visibility into connected devices, a crucial step ...
Read morePricing
Tanium Discover offers custom pricing plan
Pros & Cons
Helps close security gaps by detecting and securing rogue assets.
Strengthens security by ensuring all endpoints are properly managed and monitored.
Allows administrators to either block or integrate unmanaged devices.
Efficiently scans networks with hundreds of thousands of endpoints.
Requires training to maximize the platform’s full capabilities.
Large-scale endpoint discovery may impact network performance.
Add to compare
Watch Demo
Product Description
Stormshield Endpoint Security Evolution is a sophisticated, multi-layered Endpoint Detection and Response (EDR) solution designed to provide proactive protection against evolving threats. By integrating advanced security features, it delivers comprehensive defense to safeguard endpoints against ...
Read morePricing
Stormshield Endpoint Protection offers custom pricing plan
Pros & Cons
Continuously evolves to defend against emerging risks.
Enhances monitoring and forensic analysis of endpoint activities.
Reduces manual intervention by mitigating threats automatically.
Identifies and responds to security incidents as they occur.
Real-time monitoring could strain device resources.
Initial setup and configuration may require expert knowledge.
Add to compare
Watch Demo
Product Description
Zip simplifies the procurement, deployment, configuration, and management of your enterprise security program. Acting as a single partner, Zip handles the acquisition of software licenses for the underlying technologies and provides a streamlined, user-friendly interface. With built-in, ...
Read morePricing
Zip Security offers custom pricing plan
Pros & Cons
Aligns security infrastructure with regulatory and insurance requirements.
Covers procurement, deployment, configuration, and ongoing security oversight.
Expert-driven security ensures compliance with industry standards.
Streamlined design enhances ease of use and management.
Suitability for large enterprises with diverse security requirements is unclear.
Dependence on a single provider for software acquisition
Add to compare
Watch Demo
Product Description
Centurion SmartShield offers a unique approach to endpoint protection by creating a virtual environment where all unwanted changes are automatically erased upon reboot. This ensures that any potential threats, such as malware or unauthorized alterations, are effectively removed, preserving ...
Read morePricing
Free Trial available, Try Now
SmartShield offers custom pricing plan
Pros & Cons
Ensures security without interfering with daily tasks.
Easy to deploy and manage without extensive IT expertise.
Prevents persistent infections by eliminating unauthorized changes.
Restores system integrity by erasing unwanted changes upon reboot.
Permanent system changes require manual exceptions.
Primarily focused on endpoint security without broader network safeguards.
Add to compare
Watch Demo
Product Description
Endpoint Insights is a powerful solution that provides organizations with unmatched visibility into all devices within their environment, including computers, monitors, docking stations, servers, and printers. It goes beyond native tools like ConfigMgr or ITSMs by delivering critical data such ...
Read morePricing
Endpoint Insights offers custom pricing plan
Pros & Cons
Extends beyond native ITSM and ConfigMgr capabilities for improved decision-making.
Helps IT teams efficiently manage hardware and software resources.
Provides up-to-date device status, warranty details, and replacement information.
Identifies all installed software, even if installed outside traditional methods.
Focuses more on asset management rather than active endpoint security.
Real-time tracking and analytics may impact system performance.
Add to compare
Watch Demo
Product Description
ANSA is an advanced patch management software that offers cross-platform support, enabling seamless management of devices across various operating systems. It provides comprehensive reporting on every device within the enterprise, ensuring complete visibility into the status of patches and ...
Read morePricing
ASNA offers custom pricing plan
Add to compare
Watch Demo
Product Description
Veritas offers a suite of enterprise-grade data management and protection solutions designed to help organizations navigate the complexities of modern IT environments. With a rich history spanning over 30 years, Veritas delivers scalable, flexible, and high-performance solutions that ensure the ...
Read morePricing
Veritas- Desktop and Laptop Option offers custom pricing plan
Pros & Cons
Reduces IT overhead and enhances storage optimization for better resource utilization.
Delivers fast, reliable data management without impacting business operations.
Adapts to enterprises of all sizes with on-premises, cloud, and hybrid support.
Ensures seamless backup, recovery, and data governance across multiple environments.
Initial setup and integration can be challenging for smaller IT teams.
Requires technical expertise to fully utilize advanced features.
Add to compare
Watch Demo
Product Description
Stratodesk NoTouch Desktop is a software solution that enables users to access a secure virtual desktop environment. Designed to optimize the management and deployment of virtualized workspaces, NoTouch Desktop allows organizations to provide remote and virtual desktop experiences with high ...
Read morePricing
Free Trial available, Try Now
Stratodesk No Touch offers custom pricing plan
Pros & Cons
Ensures a smooth, efficient user experience for remote and on-site teams.
Works seamlessly with major virtual desktop infrastructure solutions.
Centralized control streamlines deployment and administration of virtual desktops.
Enables access to virtual desktops from various devices, supporting remote work.
Some older devices may not fully support the software.
Dependent on a stable network connection for optimal performance.
Disclaimer: This research has been collated from a variety of authoritative sources. We welcome your feedback at [email protected].
Connecting Smart Buyers with Leading Sellers
Find the perfect software for your needs or showcase your product to 250,000+ buyers. SpotSaaS makes it easy for everyone to succeed