Best Endpoint Security SoftwareSymantec Endpoint Protection1https://media.trustradius.com/product-logos/F3/E3/FXW4JNANO7TF.PNGWebroot Business Endpoint Protection2https://media.trustradius.com/vendor-logos/Zp/BI/TZTASWT8R27Q-180x180.JPEGESET Endpoint Security3https://media.trustradius.com/vendor-logos/db/iK/TTC8O3TI5SN9-180x180.JPEGBitdefender GravityZone4https://media.trustradius.com/vendor-logos/4f/RI/FS87QQ1GMP8R-180x180.PNGSophos Intercept X5https://media.trustradius.com/vendor-logos/aW/xM/0AFACIEHNKRT-180x180.JPEGTrend Micro Apex One (formerly OfficeScan)6https://media.trustradius.com/vendor-logos/ad/Vt/9I9JZSMX7IHN-180x180.PNGKaspersky Endpoint Security7https://media.trustradius.com/vendor-logos/RZ/RK/QTA0JQCKJP1L-180x180.JPEGCylancePROTECT8https://media.trustradius.com/product-logos/99/8z/LIQDEV3ZBQIW.PNGFortiClient9https://media.trustradius.com/vendor-logos/MZ/NA/I0WLZ36A46RB-180x180.JPEGMcAfee Endpoint Security10https://media.trustradius.com/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEGCb Defense11https://media.trustradius.com/product-logos/XA/fO/PO3SRD20BJKB.PNGPanda Security for Desktops12https://media.trustradius.com/vendor-logos/bv/kw/BBVQJTX5OU84-180x180.JPEGLookout13https://media.trustradius.com/vendor-logos/mP/16/6JTL8VHM9P02.pngPalo Alto Networks Traps14https://media.trustradius.com/vendor-logos/MK/NG/UKHCVB1FA0XT-180x180.PNGSentinelOne15https://media.trustradius.com/vendor-logos/Ck/NH/HCKSBUR9UL23-180x180.JPEGCheck Point Endpoint Security (Sandblast Agent)16https://media.trustradius.com/product-logos/el/42/U27D2GRE44ZS.jpegCrowdStrike Falcon Endpoint Protection17https://media.trustradius.com/vendor-logos/QJ/nR/NGAP2XUTKHMV-180x180.JPEGAlert Logic Essentials18https://media.trustradius.com/vendor-logos/6s/Kj/LNDO4FAX2DHG-180x180.JPEGStormShield Endpoint Security19https://media.trustradius.com/product-logos/gU/s3/DZCZX3AB3FDO.jpegIvanti Endpoint Security for Endpoint Manager, powered by Landesk20https://media.trustradius.com/vendor-logos/2m/YN/CD77EEAQ0FMW-180x180.JPEGF-Secure Protection Service for Business21https://media.trustradius.com/vendor-logos/4u/3k/1J9AT1MUARJN-180x180.JPEGWindows Defender Advanced Threat Protection (Hexadite AIRS)22https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGMalwarebytes Endpoint Protection23https://media.trustradius.com/vendor-logos/P2/yF/LD2Z4EHZK5ZP.pngCisco Advanced Malware Protection (AMP) for Endpoints24https://media.trustradius.com/vendor-logos/KP/BJ/EKH5RFTLCO4X-180x180.PNGComodo Advanced Endpoint Protection (AEP)25https://media.trustradius.com/vendor-logos/QG/sV/G1522B0P2EWE-180x180.JPEG

Endpoint Security Software

Best Endpoint Security Software

TrustMaps are two-dimensional charts that compare products based on satisfaction ratings and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Endpoint Security Software Overview

What is Endpoint Security Software?

Endpoint security software protects enterprise connected devices from malware and cyber attacks. Endpoint protection involves a multifaceted approach combining scanning and antivirus / antimalware, threat detection, and infiltration prevention. Beyond simple antivirus software, endpoint security includes endpoint protection platforms (EPP) as well as endpoint detection and remediation (EDR) software. Vendors providing total endpoint protection software generally offer basic antivirus as well as higher tier applications providing additional security and remediation features for businesses.

Features of Endpoint Security Software

Endpoint security software offers the following features:
  • Traditional endpoint scanning and antivirus /antimalware capabilities
  • Scheduled or continuous monitoring of files and connected devices
  • Lock down or restricted access of endpoints by administrator
  • Restrict endpoint users from accessing various websites and applications
  • Integrated firewall
  • Policy-based configuration and compliance controls
  • Automated updates

Pricing Information

Simple antivirus and threat detection software is relatively inexpensive, with a device per year pricing model. These simple tools can range in price from free to several hundred Dollars depending on the number of devices supported. More complex endpoint protection platforms including remediation can cost more.

Endpoint Security Products

Listings (1-25 of 44)

Bitdefender GravityZone

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
30 Ratings

Bitdefender GravityZone is combines multiple security services into a single platform to reduce their cost of building a trusted environment for endpoints

FortiClient

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
26 Ratings

Fortinet offers FortiClient, their endpoint security system emphasizing automated advanced threat protection, security fabric integration, secure remote access, endpoint quarantine, and a comprehensive reporting dashboard.

9 Ratings

Carbon Black offers Cb Defense, which is designed to go beyond a machine-learning antivirus to stop all types of attacks before they compromise an organization’s systems. The vendor says Cb Defense, with its prevention model, detection and response capabilities and single lightweight agent, is th...

Alert Logic Essentials is the company's core service package providing asset discovery and vulnerability scanning and alerting, and now also integrates endpoint protection, cloud vulnerability scanning, and container security. Barkly antivirus and endpoint security software was acquired by Alert...