Endpoint Security Software

TrustRadius Top Rated for 2023

Top Rated Products

(1-4 of 4)

1
CrowdStrike Falcon

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment…

2
Watchguard Endpoint Security

WatchGuard EPDR (formerly Panda Adaptive Defense 360) combines next-generation antivirus protection, endpoint detection and response (EDR), patch management, content filtering, email security, full disk encryption, and more, into one package. The platform touts a unique zero-trust…

3
Qualys TruRisk Platform

Qualys TruRisk Platform (formerly Qualys Cloud Platform, or Qualysguard), from San Francisco-based Qualys, is network security and vulnerability management software featuring app scanning and security, network device mapping and detection, vulnerability prioritization schedule and…

4
Symantec Endpoint Security

Symantec Endpoint Protection is the company's flagship antivirus / endpoint security product.

All Products

(26-50 of 169)

26
Trend Micro Worry-Free Services Suite

Trend Micro offers an end-to-end hosted security solution which they call the Worry-Free Business Security suite for midsize and larger enterprises, which provides a wide range of services such as endpoint protection, email encryption, general antivirus and threat detection and prevention,…

27
Huntress

Huntress is a security platform that surfaces hidden threats, vulnerabilities, and exploits. The platform helps IT resellers protect their customers from persistent footholds, ransomware and other attacks.

28
VMware Carbon Black Endpoint

The VMware Carbon Black Endpoint solution (formerly Cb Defense) is an endpoint security and "next-gen antivirus (NGAV)" that uses machine learning and behavioral models to analyze endpoint data and uncover malicious activity to stop all types of attacks before they reach critical…

Explore recently added products

29
Jamf Protect

Developed exclusively for macOS, Jamf Protect provides a solution to maintain endpoint compliance, monitor for, respond to, and remediate security incidents on macOS with minimal impact to the device and end-user experience. Jamf Protect detects Mac-specific threats, and prevents…

30
Sophos Intercept X for Server

Sophos now offers Intercept X for Server, as a server-specific version of its popular endpoint security solution, featuring advanced malware detection and prevention, ransomware protection, and hacker deterrents.

31
ThreatLocker

ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic.

32
BeyondTrust Endpoint Privilege Management

BeyondTrust Endpoint Privilege Management, powered by PowerBroker and Avecto reduces the risk of privilege abuse by eliminating unnecessary privileges, and can elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity.

33
Endpoint Protector by CoSoSys

Endpoint Protector by CoSoSys is an all-in-one Data Loss Prevention (DLP) solution for Windows, macOS, and Linux computers, Thin Clients, and Desktop-as-a-Service (DaaS) platforms. The solution protects from data leaks, theft, and exfiltration, it minimizes the risk of insider threats…

34
Morphisec

Morphisec, headquartered in Boston, provides advanced security solutions for midsize to small enterprises around the globe. They aim to simplify security and can automatically block modern attacks from the endpoint to the cloud. Contrasted with security solutions that rely on human…

35
Comodo Advanced Endpoint Protection (AEP)

Comodo Cybersecurity headquartered in Clifton offers Comodo Advanced Endpoint Protection (AEP) provides malicious file quarantine, malware protection, antivirus, and other endpoint security features.

36
Cybereason Defense Platform

Cybereason EDR consolidates intelligence about each attack into a Malop (malicious operation), a contextualized view of the full narrative of an attack. Each Malop organizes the relevant attack data into an easy-to-read, interactive graphical interface, providing a complete timeline,…

37
Check Point Harmony Endpoint

Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.

38
Microsoft System Center Endpoint Protection

Microsoft System Center Endpoint Protection is a malware, spyware, antivirus and endpoint protection application available formerly with System Center Configuration Manager (SCCM), which later became Microsoft Endpoint Manager. It is a legacy product, with older versions reaching…

39
Taegis ManagedXDR

Secureworks Taegis ManagedXDR is a managed detection and response (MDR) solution that delivers security analytics software, 24x7 support, threat hunting, and incident response in a single solution.

40
SparkCognition EPP

SparkCognition in Austin offers the eponymous SparkCognition EPP software (formerly DeepArmor), their endpoint protection and antivirus application that uses artificial intelligence instead of signature based protection.

41
WithSecure Business Suite

The WithSecure Business Suite (formerly F-Secure Business Suite) is an endpoint protection and Internet content filtering suite deployed on-premises for enterprises, from the WithScure Corporation headquartered in Helsinki.

42
Attivo Endpoint Detection Net (EDN)

The Attivo Endpoint Detection Net (EDN) is an agentless product designed to complement existing endpoint security solutions by detecting an attacker early in the attack cycle, preventing them from stealing credentials and establishing a foothold. The EDN product tackles endpoint…

43
OpenText EnCase Endpoint Security

OpenText EnCase Endpoint Security, is an endpoint security solution designed to provide 360-degree visibility across laptops, desktops and servers for proactive discovery of sensitive data, identification and remediation of threats and discreet, forensically-sound data collection…

44
Minerva Labs Ransomware Prevention Platform

Minerva Labs, headquartered in Petah Tikva, Israel, supports endpoint security by introducing new and different approaches to stopping threats that other tools may miss, regardless of the size of the user's team, their skillset, or their toolset. It is an endpoint threat prevention…

45
StormShield Endpoint Security

StormShield Endpoint Security provides advanced threat protection for business endpoints, from French company StormShield.

46
Venn Software

Venn Software is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated…

47
WithSecure Elements Endpoint Protection

WithSecure (formerly F-Secure) Elements Endpoint Protection is cloud-native, AI-powered endpoint protection that can be deployed instantly from a browser and managed from a single console.

48
ManageEngine EventLog Analyzer

ManageEngine's EventLog Analyzer provides log management, auditing, and IT compliance management. It can be downloaded for Windows or Linux.

49
Ivanti Endpoint Security

Ivanti Endpoint Security reduces the known exploitable surface area on endpoints, detects exploits targeting environment, and responds to threats before they can wreak havoc on the organization.

50
Hacker Combat EDR

Hacker Combat (HC) Endpoint security software, an EDR tool that allows organizations to detect and respond to cyber threats quickly. Every cyber security expert and every size of organization can protect against threat actors and cyber criminals by utilizing this top-notch endpoint…

Endpoint Security Software TrustMap

TrustMaps are two-dimensional charts that compare products based on trScore and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Learn More About Endpoint Security Software

What is Endpoint Security Software?

Endpoint security software protects enterprise-connected devices from malware and cyber attacks. Endpoint protection involves a multifaceted approach combining scanning and antivirus / antimalware, threat detection, and infiltration prevention. Beyond simple antivirus software, endpoint security includes endpoint protection platforms (EPP) as well as endpoint detection and remediation (EDR) software.

Endpoint security software has become increasingly crucial as Bring Your Own Device (BOYD) policies have become the norm for many businesses. Under BOYD policies, employees can use their personal devices, most commonly smartphones or laptops, for doing professional work or accessing business systems. Each of these personal devices are an endpoint that could be a vulnerability to the business.

Endpoint security software can help mitigate the risks that BOYD poses. It allows administrators to centrally manage the business’s endpoint vulnerabilities using a variety of tools at scale. This centralization is far more preferable than trusting each endpoint owner individually.

Vendors providing total endpoint protection software generally offer basic antivirus as well as higher tier applications providing additional security and remediation features for businesses. The specific advanced features offered will vary by each product.

Machine learning in particular has taken a key role in modern endpoint security. Machine learning methods allow endpoint security products to adapt to new threats more quickly than humans could manually achieve. This improved efficiency has made machine learning a mainstay in most leading endpoint security software.

Features of Endpoint Security Software

Endpoint security software offers the following features:

  • Traditional endpoint scanning and antivirus /antimalware capabilities
  • Scheduled or continuous monitoring of files and connected devices
  • Lock down or restricted access of endpoints by administrator
  • Restrict endpoint users from accessing various websites and applications
  • Integrated firewall
  • Policy-based configuration and compliance controls
  • Automated updates

Endpoint Security Comparison

Comparing endpoint security software “apples-to-apples” can be difficult. Consider these factors when comparing different products:

  1. Mobile Device Support: Mobile devices come with their own unique security challenges and requirements vs. more traditional computers. Consider how well each product support mobile device protection. An additional factor would be how unobtrusive the software is, which can make a big difference in adoption when trying to implement the software in BOYD environments.
  2. Policy Management: How easily can administrators establish, manage, and customize security policies for different groups of devices, down to individual devices? Consider not only whether each product can do so, but also how easy to manage those processes are, since centralized management is such a core benefit of endpoint security software in the first place.
  3. Hosted vs. On-Premise Software: Consider whether it is better for the business to deploy the software on an on-premise server vs. having the software provider host the product. Hosted solutions let businesses outsource the continual updates and improvements necessary to maintain effective security. In contrast, on-premise solutions allow in-house IT administrators to have a higher level of control at the cost of additional maintenance requirements.

Start an endpoint security comparison here

Pricing Information

Simple antivirus and threat detection software is relatively inexpensive, with a device per year pricing model. These simple tools can range in price from free to several hundred Dollars depending on the number of devices supported. More complex endpoint protection platforms including remediation can cost more.

Related Categories

Frequently Asked Questions

What does endpoint security software do?

Endpoint security software protects endpoint devices, such as mobile devices and laptops, from malware and cyberattacks by installing agents directly on the endpoint itself.

What is included in endpoint security software?

Endpoint security software can include several different security methods. Some of the most common technologies include firewalls, antivirus, and IP blocking.

Who uses endpoint security software?

Endpoint security software is most commonly used by midsize and larger organizations. The software is usually managed by IT administrators.

What are the benefits of endpoint security software?

Endpoint security software enables centrally-managed, controlled, and monitored security across a range of devices.

How much does endpoint security software cost?

Most leading products range from $30-100/year per device, although pricing will vary dramatically depending on the package and features that are purchased, as well as the number of devices being protected.