128 results
Why Capterra is free
SolarWinds® N-central® is a powerful tool with advanced protection beyond antivirus to provide a full layered security solution. Learn more about SolarWinds N-central
SolarWinds® N-central® gives you comprehensive security features with maximum flexibility. A powerful tool that provides risk intelligence, web content filtering, two-way firewalls, and fast backup and recovery, N-central offers a strong layered approach to your customers' IT security. It can also help protect them against today's cyber threats. Go beyond antivirus and build trust with your clients! Learn more about SolarWinds N-central
SolarWinds® N-central® gives you comprehensive security features with maximum flexibility. A powerful tool that provides risk intelligence, web content filtering, two-way firewalls, and fast backup and...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Multi-layered defense delivering smart endpoint protection through AI-powered technology. Learn more about Malwarebytes
Malwarebytes Endpoint Protection is a complete malware protection and remediation solution with predictive threat detection, proactive threat blocking, and integrated end-to-end protection. Comprehensive protection built for speed. Quickly deploy, improve end user productivity Precision detection at the point of attack. Innovative advanced endpoint protection. Scales to combat growing threats. Simple to use protection from a single pane of glass. Learn more about Malwarebytes
Malwarebytes Endpoint Protection is a complete malware protection and remediation solution with predictive threat detection, proactive threat blocking, and integrated end-to-end protection. Comprehensi...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Try a free Trial of WebTitan today, support included. Learn more about WebTitan
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Go ahead. Forget your passwords. 1Password remembers them all for you. Save your passwords and log in to sites with a single click. Learn more about 1Password Business
1Password is a secure, scalable, and easy-to-use password manager thats trusted by the worlds leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password is part of their workflow, good security habits will become second nature. When everyone uses 1Password, your risk goes down and your productivity goes up. Learn more about 1Password Business
1Password is a secure, scalable, and easy-to-use password manager thats trusted by the worlds leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password i...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
All-in-one award winning antivirus solution ready to protect every part of your business. Available for PCs, Macs and servers. Learn more about Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-999 employees). Works on PCs, Macs and Windows servers. It is enhanced with cutting - edge features to keep your company's life fully secure. Includes powerful antivirus, server, email and network security, CyberCapture, firewall and much more. It can be used either with cloud console or without. Price from $49.99 Learn more about Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-999 employees). Works on PCs, Macs ...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats. Learn more about Webroot SecureAnywhere Endpoint Protection
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date. Learn more about Webroot SecureAnywhere Endpoint Protection
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits,...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the ...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
ADAudit Plus is an Active Directory, Azure AD, file server (including NetApp and EMC), and workstation change monitoring software. Learn more about ADAudit Plus
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active Directory, Azure AD, and Windows servers. Additionally it provides insight on workstation and file server access (including NetApp and EMC). ADAudit Plus helps you track user logon and logoff; analyze account lockouts; audit ADFS, ADLDS, and printers; forward logs to SIEM tools; and do much more. Learn more about ADAudit Plus
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active Dire...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Industry-leading Endpoint Protection Software. Discover, monitor and protect your sensitive data. Learn more about Endpoint Protector
Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as GDPR, PCI DSS, CCPA, HIPAA etc. Learn more about Endpoint Protector
Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file t...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Secure your Team's cloud infrastructure, databases, and servers with our affordable Dedicated IP VPN for Teams. Try 14 days for Free. Learn more about GoodAccess
Perfect for small-medium teams to SECURE their cloud infrastructure, databases, and servers with our affordable Dedicated IP VPN. Say goodbye to manual whitelisting. Phone & Desktop apps. Easy-to-use access control and monitoring. Great price-point! $19/mo per 10 users and 1 Dedicated VPN gateway. Try the 14 days Free Full version - No credit card required. Learn more about GoodAccess
Perfect for small-medium teams to SECURE their cloud infrastructure, databases, and servers with our affordable Dedicated IP VPN. Say goodbye to manual whitelisting. Phone & Desktop apps. Easy-to-use a...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers.
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers.
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers....
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Network security solution that protects systems from viruses, hackers, and spam using encryption, machine learning tools and more.
Network security solution that protects systems from viruses, hackers, and spam using encryption, machine learning tools and more.
Network security solution that protects systems from viruses, hackers, and spam using encryption, machine learning tools and more....
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Protection is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network.
Symantec Endpoint Protection is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention ...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Simplified endpoint management for desktops, servers, and mobile laptops.
LogMeIn Central is a powerful, easy-to-use endpoint protection and management solution enabling IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. Whether you have remote employees or endpoints scattered across the globe, LogMeIn Central provides IT organizations with the speed, flexibility, and insight needed to increase productivity, reduce IT costs, and mitigate risk.
LogMeIn Central is a powerful, easy-to-use endpoint protection and management solution enabling IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. Whether you ha...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Endpoint data loss protection and security platform that enables small businesses to manage recovery of deleted files and more.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the recovered files can be tracked through status reports.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the r...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint protection solution built to stop the widest range of attacks. Intercept X combines multiple techniques including signatureless exploit prevention, deep learning malware detection, anti-ransomware capabilities, root cause analysis, and more.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint protection solution built to stop the widest range of attacks. Intercept X combines multiple techniques including signaturel...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
On-premise & web-based solution for businesses that helps manage hosts' identity, endpoint visibility & compliance, attacks, and more.
On-premise & web-based solution for businesses that helps manage hosts' identity, endpoint visibility & compliance, attacks, and more.
On-premise & web-based solution for businesses that helps manage hosts' identity, endpoint visibility & compliance, attacks, and more....
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
NinjaRMM is the easiest, all-in-one remote IT management and monitoring solution that IT professionals love for endpoint protection.
NinjaRMM is an all-in-one SaaS multi-tenant endpoint management and monitoring platform. It has integrations with award-winning endpoint protection software like Webroot and Bitdefender, giving you a single-pane-of-glass console to manage, monitor, and remediate all from one easy to use interface. Bulk configure policies, run scripts, automate patching and manage the protection of thousands of endpoints with just a few clicks.
NinjaRMM is an all-in-one SaaS multi-tenant endpoint management and monitoring platform. It has integrations with award-winning endpoint protection software like Webroot and Bitdefender, giving you a s...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Unified endpoint management solution that helps manage servers, laptops, desktops, smartphones, and tablets from a central location.
Desktop Central is a unified endpoint management solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location. Its intuitive, web based interface allows you to automate regular endpoint management routines like installing patches, deploying software, imaging and deploying OS, deploying profiles and policies to mobile devices, remote troubleshooting, and much more! It also has a mobile app that allows you to manage endpoints anywhere, anytime!
Desktop Central is a unified endpoint management solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location. Its intuitive, web based interface allows ...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Automatic, insightful, all-in-one endpoint security from the trusted leader.
Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of protection is delivered via an architecture that uses endpoint resources more effectively and ultimately outperforms the competition on CPU and network utilization.
Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares t...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Cloud-based and on-premise platform that allows businesses to secure critical data with multi-factor authentication.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall. Does your company have three or more SaaS or internal web apps? If so, then you will benefit from the security of OneLogin's cloud-based single sign-on solution.
Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure an...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time....
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing.
Cloud-based mobile endpoint security platform that helps firms with preventing compromise of corporate data and phishing....
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Load balancing solution that enables businesses to manage global servers, detect power outages, distribute network traffic, and more.
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing service offers the functionality required to support a single data center with multiple servers, site failover (for DR scenarios), and Global Server Load Balancing (GSLB). Incapsula provides real-time health monitoring and notifications to ensure that traffic is always routed to a vi
Incapsula's Load Balancing & Failover service enables organizations to replace their costly appliances with an enterprise-grade cloud-based solution. Based on a global CDN, Incapsulas Load Balancing ...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Reboot to Restore is System Restore technology helps to restore Windows and Mac to a pristine, pre-configured state with just a reboot.
Deep Freeze Reboot to Restore Software provides ultimate endpoint protection by freezing a snapshot of your desired computer configuration and settings. With an instant reboot, any unwanted or unauthorized changes are completely erased from the system, restoring it back to its pristine Frozen state. Deep Freeze provides unrestricted system access to end-users while preventing permanent configuration changes and ensures 100% workstation recovery with every restart..
Deep Freeze Reboot to Restore Software provides ultimate endpoint protection by freezing a snapshot of your desired computer configuration and settings. With an instant reboot, any unwanted or unauthor...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Advanced protection for all of your workstations, the leading virtualization systems, Android devices and Exchange servers.
Centralized and advanced protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices. This complete protection covers all vectors: Network (firewall), Email, Web, and External devices. Panda Endpoint Protection Plus also includes protection for Exchange servers. No spam and no browsing unauthorized websites for a more productive workforce.
Centralized and advanced protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices. This comp...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, and other malware.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint Security protects at the file, application and network layer, combining multiple layers of security with network- and application-agnostic DNS protection at no a at no additional charge. Meet Compliance and Duty of Care with VIPREs Web Access Control.
VIPRE Endpoint Cloud protects against ransomware, zero-day attacks, phishing, exploit kits, mobile threats and other malware that easily evade traditional signature-based antivirus. VIPRE Endpoint Secu...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Barkly Endpoint Protection replaces legacy antivirus with the strongest protection, the smartest technology and simplest management.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, executables, and ransomware. Barkly's patented 3-level architecture enables unmatched visibility into all levels of the system, including the CPU, to block attacks. Barkly is incredibly simple to manage and deploy: no policies, configuration or security expertise required.
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, execu...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Powertech Antivirus is enterprise level malware protection that's built to work seamlessly with your AIX, Linux and IBM Power servers.
Powertech Antivirus is enterprise level malware protection that's built to work seamlessly with your AIX, Linux and IBM Power servers, providing significant security and performance advantages over software that is not built for your systems. It boasts one of the most comprehensive sets of virus signatures available and keeps itself up to date by automatically downloading the latest virus definitions. You'll have peace of mind knowing that your scan engine is backed by battle-tested technology.
Powertech Antivirus is enterprise level malware protection that's built to work seamlessly with your AIX, Linux and IBM Power servers, providing significant security and performance advantages over sof...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.
Netsurion EventTracker, our flagship managed security platform, is architected to scale with organizations of any size and any stage of maturity. Whether you need a targeted supplement to your existing capabilities and staff or a complete outsourced solution, the EventTracker platform is uniquely customizable to your needs. Our architecture lets you enable capabilities such as endpoint protection, SIEM, vulnerability management, threat hunting, and more all within one centrally managed console.
Netsurion EventTracker, our flagship managed security platform, is architected to scale with organizations of any size and any stage of maturity. Whether you need a targeted supplement to your existing...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Deliver powerful, layered protection to multiple customers quickly and easily.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits.
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve ...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Identify and resolve APTs, fileless malware and zero-day attacks across all your assets, 100% remotely deployed and managed MDR option.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of breaches are missed by existing cyber defense tools. Infocyte offers agentless install; you get identification, investigation and response to sophisticated fileless, in-live memory cyber attacks in minutes, so you can contain, remediate and recover quicker.
Ideally suited for mid-market to enterprise organizations and MSP/MSSPs whose cybersecurity teams manage networks with hundreds, thousands, and hundreds of thousands of nodes/endpoints. Over 50% of br...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment.
Chrome extension that protects from phishing, malware, removes pop-ups, and creates a safe browsing environment....
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s).
AccessPatrol provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s).
AccessPatrol provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s)....
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company ...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Idaptive Next-Gen Access is an integrated platform delivering identity and access management solutions as a service.
Idaptive delivers Next-Gen Access, protecting organizations from data breaches through a Zero Trust approach. Idaptive secures access to applications and endpoints by verifying every user, validating their devices, and intelligently limiting their access. Idaptive Next-Gen Access is the only industry-recognized solution that uniquely converges single single-on (SSO), adaptive multifactor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA).
Idaptive delivers Next-Gen Access, protecting organizations from data breaches through a Zero Trust approach. Idaptive secures access to applications and endpoints by verifying every user, validating t...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Endpoint protection solution that helps businesses monitor operating system activities to detect & clean suspicious or unknown threats.
Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS.
Security management platform that provides web url filtering, antivirus engine, file auto-sandboxing, behavior analysis, and HIPS....
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Next-generation endpoint protection software that detects, prevents, and responds to attacks....
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Managed security platform that includes monitoring and management of security infrastructure around the clock.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your organization is monitored by our expert Security Operations Center analysts. SilverSky is uniquely qualified to help small and mid-sized businesses in regulated industries meet their security and compliance needs.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Next-generation Apple device management for macOS, iOS, iPadOS, and tvOS.
Kandji is an MDM solution for IT teams at businesses that run on Apple. We work with Apple Business Manager to automate device deployment so new employees can use pre-configured devices right out of the box. The only MDM with a pre-built library of 150+ automations, take advantage of features like app patching, compliance templates, and the industry's first macOS agent that auto-remediates, even when devices are offline. Save time with 1-click configurations for Mac, iPhone, iPad, and Apple TV.
Kandji is an MDM solution for IT teams at businesses that run on Apple. We work with Apple Business Manager to automate device deployment so new employees can use pre-configured devices right out of th...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data.
Offers centrally-managed endpoint threat protection, enterprise-level encryption, and BIOS check technology for your systems and data....
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors.
Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors. Designed for ease of use, the platform saves time by applying AI to automatically eliminate threats in real time for both on-prem and cloud environments and is the only solution to provide visibility into encrypted traffic across networks directly from the endpoint. SentinelOne is a converged EPP + EDR solution that seamlessly integrates with diverse IT environments.
Autonomous endpoint protection through a single agent that prevents, detects and responds to attacks across all major vectors. Designed for ease of use, the platform saves time by applying AI to automa...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security
Traps advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks.
Traps advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks....
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud
Consolidated endpoint security platform, delivering an extensible collection of innovative security services through the cloud...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware.
Protects PCs from all internet threats. It uses a four-layer prevention dual-engine to fight viruses and malware....
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
A unified asset management, endpoint protection and security solution that simplifies managing your workplace devices and data.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software updates; endpoint protection with antivirus/malware.
A unified endpoint management and security solution that simplifies managing your workplace devices. It delivers asset management; IT policy management; employee monitoring; automated software updates;...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management
Automated WAF with a built-in vulnerability assessment, cloud inventory, and management service for any REST/GraphQL API or legacy apps
Wallarm reinvents WAF to protect websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the platforms, such as AWS, GCP, Azure, K8s, Istio and so on. Wallarm works perfectly for hybrid infrastructure with bare-metal, VPS, and cloud assets by unifying application security in the one place. Wallarm is the only WAF that secures any REST, GraphQL, SOAP, JSON API as well as legacy CGI apps.
Wallarm reinvents WAF to protect websites, APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives. It supports all the pl...
  • Encryption
  • Whitelisting/Blacklisting
  • Activity Log
  • Device Management