Best Endpoint Protection Software for Active Directory

Find and compare the best Endpoint Protection software for Active Directory in 2025

Use the comparison tool below to compare the top Endpoint Protection software for Active Directory on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    1Password Reviews
    Top Pick

    1Password

    1Password

    $3.99/month/user
    16,089 Ratings
    See Software
    Learn More
    1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password.
  • 2
    DriveStrike Reviews

    DriveStrike

    DriveStrike

    $0.99 per month
    23 Ratings
    See Software
    Learn More
    DriveStrike is simple to use, implement, and manage. DriveStrike allows you to perform remote wipe, remote lock, or remote locate commands on any platform. Mobile device management MDM for mobile platforms. Integrated drive encryption support. Our support team is available to answer any questions, help you install our services, or manage your account. It's never been easier to protect your data and devices. We are happy to answer any questions you may have or help you understand how to best protect your data. Protect your business with a device- and data protection platform that keeps all devices protected with a single solution. Your Workstations, iPads and iPads, Smartphones as well as Tablets, Tablets, Tablets, and Laptops will be protected, organized, secure, & protected.
  • 3
    JumpCloud Reviews

    JumpCloud

    JumpCloud

    $9/user
    3,325 Ratings
    See Software
    Learn More
    Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
  • 4
    Splashtop Remote Support Reviews

    Splashtop Remote Support

    Splashtop

    $40/month for 25 computers
    3 Ratings
    Remotely support client and internal computers using unattended remote access. Users can also access the computer remotely. Splashtop Remote Support is the right tool for you, whether you are just starting with remote support tools or looking for an alternative to expensive products. Splashtop Remote Support, a best-in class remote support tool, allows you to access your managed computers from any device at any time thanks to our fast, high-definition connections.
  • 5
    SafeDNS Reviews
    Top Pick

    SafeDNS

    SafeDNS

    $0.9/user/month
    11 Ratings
    At SafeDNS, we are committed to creating a safer and more secure online environment for SMBs, enterprises, ISPs, MSPs, OEMs, and Education. We have a global footprint, making the internet safer for millions of users in over 60 countries. With years of experience in the field of cybersecurity and DNS filtering, we offer cutting-edge solutions to safeguard your digital life. Our innovative technologies help you stay protected against malware, phishing attacks, inappropriate content, and more. SafeDNS currently serves over 4000 institutions and home users around the world.
  • 6
    Hexnode UEM Reviews
    Hexnode UEM is a Unified Endpoint Management solution that manages devices across multiple platforms from a single pane of glass. With a user-centric approach, the management process is streamlined throughout the entire device lifecycle- starting from enrollment up until device retirement. Trusted by SMBs to Fortune 500 companies around the world, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams. These include endpoint management for all types of devices (including iOS, iPadOS, Android, Windows, macOS, tvOS, Apple TV, Android TV, and fireOS), an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking and so much more.
  • 7
    Trend Micro ServerProtect Reviews
    Enterprise servers can be vulnerable and a central point of information exchange. Users and applications can upload infected files to a server even from within the network. This can spread to other systems. Large organizations may have thousands or hundreds of servers that need to be monitored, configured, and maintained. Today's sophisticated attacks can target multiple points in a network, leaving behind undetected trails of damage and the possibility of re-infection. Trend Micro™, ServerProtect™, delivers the most reliable virus, rootkit and spyware protection in the industry while simplifying and automating server security operations. ServerProtect scans for malware in real-time and includes cleanup capabilities to remove malicious code and repair any system damage.
  • 8
    Zip Security Reviews
    Zip does not require any special knowledge to run a complete security program. Reduce hassles with workflows that are as simple as a single click. This includes everything from account recovery through to CrowdStrike deployment. We provide all the tools you need to get started instantly. Never miss a compliance standard again. Monitor your system devices, identities and 3rd-party tools from a bird's-eye view to get each metric where it needs to go. We integrate best-in class security tools like CrowdStrike Jamf and Intune into the enterprise security stack to scale with you. All of this is done behind a single window. Set up consistent security policies for Windows and macOS without having to worry about platform-specific configuration. Zip is the only partner you need to manage, configure, deploy and procure your enterprise security program. We will manage all the software that you need to purchase to meet the standards set by your customers, insurers and compliance regimes.
  • 9
    Admin By Request Reviews
    Rapidly provisioning Just-In Time privilege elevation across your entire staff. Workstations and servers can be managed and onboarded via an easy-to-use portal. Through thread and behavioral analysis, identify and prevent malware attacks and data breaches by revealing risky users and assets. By elevating apps - not users. Save time and money by delegating privileges according to the user or group. There's an appropriate method of elevation for every user, whether it's a developer within the IT department, or a tech novice in HR, to service your endpoints. Admin By Request comes with all features and can be customized to meet the needs of users or groups.
  • Previous
  • You're on page 1
  • Next