Best Endpoint Protection Software in Germany - Page 8

Find and compare the best Endpoint Protection software in Germany in 2025

Use the comparison tool below to compare the top Endpoint Protection software in Germany on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Microsoft Endpoint Manager Reviews
    Revolutionary management and security that aligns with your current needs while facilitating your transition to the cloud is now available. This integrated management solution is designed to be secure and efficient. Implement a comprehensive management system that merges the capabilities, data, and advanced intelligent features offered by Microsoft Intune and Microsoft System Center Configuration Manager. Enjoy seamless connectivity with cloud-based security measures from Microsoft, including risk-driven conditional access for applications and sensitive information. Leverage analytics to gain insights and resolve issues that may affect user experience. Enhance productivity and teamwork by providing the intuitive environment that users are accustomed to. Empower IT with the ability to accommodate a variety of situations for both personal devices and corporate assets. Expedite the realization of benefits with quick deployment of services and hardware through full integration across our offerings. Aim to reduce interruptions for IT, users, and operational workflows while maximizing your security and investment returns. Furthermore, this solution ensures that your organization stays agile and competitive in a rapidly evolving digital landscape.
  • 2
    ColorTokens Xtended ZeroTrust Platform Reviews
    The cloud-delivered ColorTokens Xtended ZeroTrust Platform protects the inside with unified visibility, microsegmentation and zero-trust network access. It also protects endpoints, workloads, and endpoints with endpoint protection. Visibility across multiclouds and on-premise. Protection of cloud workloads via micro-segment Stop ransomware taking control of your endpoints. You can see all communications between processes, files and users. With built-in vulnerability and threat assessment, you can identify security gaps. Simpler and quicker time-to-compliance for HIPAA, PCI and GDPR. You can easily create ZeroTrust Zones™ and dramatically reduce the attack surface. Dynamic policies that protect cloud workloads. Without the need for cumbersome firewall rules or VLANs/ACLs, you can block lateral threats. By allowing only whitelisted processes, you can lock down any endpoint. Stop communication to C&C servers and block zero-day exploits.
  • 3
    Adaptiva OneSite Anywhere Reviews
    Adaptiva OneSite anywhere allows IT admins to have total visibility and control of all endpoints regardless of their location - whether they are at home, work, or a coffee shop. Content delivery is more difficult with most employees working remotely. This includes getting patches, operating systems, and updates to endpoints without causing issues for production traffic, bandwidth degradation or software delivery success rates. OneSite Anywhere allows you to manage endpoints securely at an unprecedented scale and speed, whether they are connected remotely via VPN or on the Internet, without a VPN connection. OneSite Anywhere combines a world-class software distribution engine and a new, revolutionary architecture in the cloud to seamlessly extend the boundaries within the enterprise network across the internet.
  • 4
    Adaptiva OneSite Health Reviews
    Adaptiva OneSite Health checks endpoint configurations, diagnoses problems, and fixes any issues. It does this at a massive scale, hundreds of thousands endpoints, without bandwidth throttling and without disrupting business processes. Adaptiva OneSite Health, the fastest and most scalable solution for managing endpoint health at large scale, includes over 100 prebuilt checks and remediations. Endpoint Health is used by our customers to ensure that endpoints are working properly and securely. Over 100 built-in tests can ensure Bitlocker has been turned on or ConfigMgr works as expected. Adaptiva OneSite Health was used by a major national retailer on over 11,000 production endpoints. They found that 55% of the endpoints failed. Endpoint Health was capable of automatically remediating 89% of failed devices, resulting in an immediate saving of over $1m.
  • 5
    ConfigOS Reviews
    ConfigOS has been deployed across both classified and unclassified settings, including tactical and weapon system applications, isolated laboratories, and commercial cloud environments. This innovative solution operates without any client software, eliminating the need for installation of software agents. ConfigOS efficiently scans endpoint systems and can rectify hundreds of STIG controls in less than 90 seconds. It also offers automated rollback for remediation processes, alongside detailed compliance reports and outputs from the STIG Viewer Checklist. Designed for efficiency, ConfigOS can fortify every CAT 1/2/3 STIG control based on an application baseline in roughly 60 minutes, significantly reducing the time needed for RMF accreditation from what typically takes weeks or months. The system supports various Microsoft Windows workstation and server operating systems, as well as SQL Server, IIS, Internet Explorer, Chrome, and all components of Microsoft Office. Additionally, it is compatible with Red Hat versions 5, 6, and 7, SUSE, Ubuntu, and Oracle Linux. With over 10,000 STIG and CIS controls within its content, ConfigOS ensures comprehensive coverage across diverse platforms. Furthermore, the latest enhancements in the Command Center feature a patent-pending technology that enhances its operational capabilities.
  • 6
    ManageEngine Application Control Plus Reviews
    Application Control Plus is an enterprise solution that combines application control and privilege management features to strengthen endpoint security. With application discovery, rule-based whitelisting/blacklisting, management of application-specific privileges, and just-in-time access enabled for temporary requirements, this software ensures that it caters to the end-to-end application needs of businesses.
  • 7
    Becrypt Reviews
    When it comes to endpoint devices, ensuring they remain uncompromised is crucial. Organizations that are at a heightened risk can benefit from high assurance products and services tailored to their needs. These high assurance solutions cater specifically to desktops, laptops, and thin clients. The infrastructures are informed by research and development supported by government initiatives. This range of offerings includes managed services, security monitoring, and specialized research and development. Implementing zero trust architectures enhances the security of cloud and online services, integrating both device health and identity assessments for service access. Frequently, allowing access to corporate services from unmanaged endpoints poses significant risks to supply chain integrity. By focusing on robust device health and identity management, organizations can effectively mitigate third-party IT risks. Moreover, established cloud and mobile architectures are provided through managed services, streamlining secure collaboration with third parties, thus fostering a safer digital environment. Ultimately, strong security measures are vital to protect sensitive information and maintain operational integrity.
  • 8
    OpenText ZENworks Endpoint Security Management Reviews
    OpenText ZENworks Endpoint Security Management offers fine-grained policy-based control over your Windows desktops and mobile PCs, including the ability to change security configurations automatically based on a user’s role and location. ZENworks' central console allows users to create and manage policies, allowing them to implement and enforce highly adaptive, tightly controlled security policies, without putting any burden on the end user. ZENworks Endpoint Security Management features robust client selfdefense abilities that ensure security policies are not bypassed. It also has a full suite of monitoring tools, alerts, reporting and auditing. Bring comprehensive, centralized protection to your most vulnerable assets - the mobile PCs at your organization's edges.
  • 9
    BlackBerry Cyber Suite Reviews
    Ensure the safety and protection of your users and devices, including personal laptops and smartphones, through a solution that prioritizes building trust across all endpoints and consistently verifies that trust during every interaction or transaction. Is your organization fully equipped with the necessary tools to empower its workforce, regardless of their location? In scenarios where team members cannot access the office, it becomes crucial for them to maintain secure connections to the data and applications they require, irrespective of whether they are using company-issued or personal devices. The BlackBerry® Cyber Suite offers comprehensive security, effectively thwarting breaches and defending against complex threats through its advanced AI capabilities. This solution delivers a complete Zero Trust framework, encompassing a wide array of devices, ownership types, networks, applications, and personnel. By continuously authenticating users and dynamically adjusting security protocols, it ensures a seamless Zero Touch experience that enhances security without disrupting the user’s workflow. With such robust measures in place, organizations can confidently support remote work while minimizing risks.
  • 10
    Chimpa Reviews
    Activating Chimpa takes only a few moments, and its user-friendly design ensures that even those who are not tech-savvy can navigate it effortlessly. Compatible with iOS, iPadOS, tvOS, and Android platforms, Chimpa streamlines the process of managing mobile devices. Mobile Device Management (MDM) typically involves the deployment of various applications, configurations, corporate guidelines, security certificates, and backend support to enhance and simplify IT management for end-user devices. In today's corporate IT landscape, effectively managing the diverse array of devices and user behaviors is crucial for MDM solutions, which provide a structured and scalable approach to device and user management. The primary objectives of MDM are to enhance usability, bolster security, and expand functionality while still offering users a degree of flexibility. Features such as kiosk mode, security enforcement, remote initialization, and the ability to collect analytical data on app usage and network performance contribute to a comprehensive management experience. Ultimately, Chimpa represents a modern solution to the complexities of device management in a dynamic work environment.
  • 11
    Cisco Secure Endpoint Reviews
    Our cloud-based solution offers comprehensive protection, detection, and response to various threats, achieving a remarkable reduction in remediation times by up to 85 percent. It minimizes the attack surface through advanced endpoint detection and response (EDR), threat hunting, and endpoint isolation techniques. With the integrated SecureX platform, users benefit from a cohesive overview, streamlined incident management, and automated playbooks, making our extended detection and response (XDR) system the most extensive available in the industry. Additionally, the Orbital Advanced Search feature quickly provides essential information about your endpoints, enabling faster identification of sophisticated attacks. By employing proactive, human-led threat hunting aligned with the MITRE ATT&CK framework, we empower you to intercept attacks before they inflict any harm. Secure Endpoint ensures comprehensive coverage for protection, detection, response, and user access, effectively fortifying your endpoints against potential threats. By implementing these strategies, organizations can enhance their overall security posture and maintain resilience in the face of evolving cyber challenges.
  • 12
    AhnLab V3 Endpoint Security Reviews
    As the threat landscape evolves at a rapid pace, numerous companies find it challenging to efficiently implement and oversee endpoint security solutions while maintaining compliance and security integrity. AhnLab V3 Endpoint Security offers a robust and comprehensive solution that empowers businesses to safeguard their critical assets with enhanced confidence and agility. Among the available options, AhnLab V3 Endpoint Security stands out as one of the most user-friendly and cost-effective endpoint protection solutions on the market today. Additionally, it utilizes minimal system resources in comparison to rival products, ensuring optimal performance. By harnessing the capabilities of this powerful software, businesses can elevate their level of threat protection significantly. Furthermore, when paired with AhnLab's centralized management system, it enables effective device control, providing extensive oversight of removable media, including USB devices, Bluetooth connections, and CD/DVD drives. This integrated approach not only enhances security but also streamlines management processes, making it an ideal choice for organizations looking to bolster their defenses.
  • 13
    AhnLab EPP Reviews
    AhnLab EPP serves as a comprehensive endpoint protection platform designed for enhanced interoperability and streamlined management of various security functions. By offering a truly centralized approach to endpoint security management and operations, AhnLab EPP delivers a more robust defense against threats compared to solutions that operate in isolation. Since sensitive organizational data is often stored on endpoints, these devices frequently face numerous security risks. Furthermore, the growing variety of operating systems and devices necessitates that organizations broaden their protective scope and objectives. In light of the intricate security challenges present today, many organizations are adopting multiple security solutions; however, the difficulties associated with operating and managing these varied solutions can create vulnerabilities in overall security. Ultimately, the need for a unified and efficient security strategy becomes paramount in mitigating these risks.
  • 14
    AhnLab EPS Reviews
    By employing a lightweight agent, AhnLab EPS guarantees the operational stability of various fixed-function systems such as Industrial Control Systems (ICS), Point of Sale (POS) terminals, KIOSKs, and ATMs. AhnLab EPS also provides business continuity alongside advanced endpoint protection through its proprietary whitelisting technology. This system prioritizes productivity and ensures the availability of critical infrastructures, even for systems that function offline. Additionally, users can simulate expected results by configuring specific settings or security policies, which helps mitigate unexpected errors that typically occur in untested environments. In the realm of critical infrastructures, swiftly identifying threats is essential for maintaining uninterrupted operations or services. However, the frequent need for security updates and patches can disrupt these operations, consuming valuable time and system resources. Hence, AhnLab EPS stands out by balancing robust security with minimal operational impact, ensuring both safety and efficiency in vital systems.
  • 15
    WinMagic SecureDoc Reviews
    SecureDoc is a solution for encryption and security management that protects data at rest. The software consists of two components: client software to encrypt and decrypt data, and server software to configure and manage the organization's laptops and desktops. SecureDoc uses a FIPS140-2 validated AES256-bit cryptographic algorithm to ensure compliance with industry regulations. The software protects sensitive data on multiple platforms (Windows, macOS, and Linux) with features such as pre-boot authentication, central management, and encryption.
  • 16
    Admin By Request Reviews
    Rapidly provisioning Just-In Time privilege elevation across your entire staff. Workstations and servers can be managed and onboarded via an easy-to-use portal. Through thread and behavioral analysis, identify and prevent malware attacks and data breaches by revealing risky users and assets. By elevating apps - not users. Save time and money by delegating privileges according to the user or group. There's an appropriate method of elevation for every user, whether it's a developer within the IT department, or a tech novice in HR, to service your endpoints. Admin By Request comes with all features and can be customized to meet the needs of users or groups.
  • 17
    WildFire Reviews

    WildFire

    Palo Alto Networks

    WildFire® employs near real-time analytics to identify novel, targeted malware and advanced persistent threats, ensuring the safety of your organization. It offers sophisticated file analysis features to safeguard applications such as web portals and can seamlessly integrate with SOAR tools among other resources. By utilizing WildFire’s distinct malware analysis capabilities across various threat vectors, your organization can achieve uniform security results through an API. You can select flexible file submission options and adjust query volumes based on your needs, all without the necessity of a next-generation firewall. Take advantage of top-tier advanced analysis and prevention engine capabilities, coupled with regional cloud deployments and a distinctive network effect. Additionally, WildFire merges machine learning, dynamic and static evaluations, alongside a specially designed analysis environment, to uncover even the most intricate threats throughout different stages and attack vectors, thus enhancing your overall security posture. With its comprehensive approach, WildFire ensures that organizations remain resilient against evolving cyber threats.
  • 18
    Hysolate Reviews
    Hysolate offers a software solution that allows for the local deployment and remote management of highly secure virtual environments on a single device, all while being controlled from the cloud. This platform provides a cohesive and user-friendly experience, enabling organizations to enforce robust OS-level isolation to safeguard corporate access and enhance user productivity simultaneously. Employees can safely surf the internet, install applications, and download files without risking the integrity of corporate security. Additionally, it facilitates safe access to corporate applications and sensitive data for employees and third-party users on devices that are not managed by the organization. Moreover, Hysolate simplifies the protection of privileged user access with a straightforward and scalable Secure Application Workspace (SAW) program, ensuring comprehensive security across various user interactions. With Hysolate, companies can strike a perfect balance between security and operational efficiency, adapting to the needs of a modern workforce.
  • 19
    Zemana Endpoint Security Reviews
    Zemana Endpoint Security offers robust protection for businesses by delivering proactive endpoint safeguarding. It ensures rapid and effective scanning of malware, while also providing real-time defense against potential future infections. Each website is meticulously assessed for safety, actively preventing users from engaging with malicious sites. This comprehensive protection guarantees that sensitive information such as credit card details, social security numbers, and login credentials are transmitted securely, rendering attackers powerless. Additionally, Zemana AntiLogger safeguards your online activities—including shopping, messaging, and banking—by obscuring them from prying eyes. To combat zero-day malware, it employs advanced heuristic algorithms to identify and neutralize unknown malware threats. Furthermore, it blocks any untrusted applications from executing within your network and conducts thorough safety checks on websites before any user interaction takes place, ensuring a secure online experience. With such extensive features, Zemana Endpoint Security stands out as a reliable solution for maintaining the integrity of your digital environment.
  • 20
    dotDefender Reviews

    dotDefender

    Applicure Technologies

    dotDefender is the leading software solution for Web Application Firewall (WAF) security. Renowned for its enterprise-level protection, it offers sophisticated integration options, straightforward maintenance, and a low total cost of ownership (TCO). This makes dotDefender an ideal choice for safeguarding your website and web applications in the present day. Uniquely, dotDefender is adaptable to various environments, functioning seamlessly wherever your business operates. No matter the web applications you utilize—be it in a Windows or Linux setting, on dedicated servers, virtual machines, or through cloud services—dotDefender Web Application Security is equipped to secure your operations effectively. You can obtain dotDefender through either a perpetual or annual license from Applicure or one of its authorized global partners. Furthermore, it is also available as a Software as a Service (SaaS) through our extensive network of hosting and managed services partners, ensuring flexibility in how you choose to implement this crucial security solution.
  • 21
    Kntrol Reviews

    Kntrol

    Kriptone Digital Security

    Kntrol offers advanced tracking of behavioral patterns and monitoring of endpoints to safeguard organizations against insider threats. Our solutions not only promote adherence to regulations but also enhance visibility within the organization while securing sensitive information. Utilizing Kntrol's proactive security strategies allows companies to strengthen their defense systems and foster a safe working environment. Rely on Kntrol for thorough insider threat prevention and endpoint monitoring solutions designed to protect your business effectively. With our innovative approach, you can be confident in your organization's security measures.
  • 22
    Proofpoint Mobile Defense Reviews
    Businesses are increasingly confronted with the dangers posed by harmful Wi-Fi hotspots and the myriad of applications found on employee-owned devices. Among these applications are not only malware but also what is termed "riskware" – software that, while not directly harmful, can engage in activities that jeopardize the security of company data. These various threats collectively put enterprise users at risk of data leaks, identity theft, and the unauthorized transfer of sensitive information, which can be exploited to conduct sophisticated attacks targeting specific individuals. Employees often connect to public Wi-Fi networks and unwittingly grant extensive permissions to these riskware applications, failing to recognize that their personal and organizational information could be transmitted to distant servers and advertising platforms worldwide, creating opportunities for cybercriminals to exploit this data. As such, organizations must prioritize educating their employees about these risks to safeguard their sensitive information more effectively.
  • 23
    OpenText Data Protector Reviews
    OpenText™, Data Protector, standardizes and consolidates the backups across multiple platforms. It offers comprehensive, secure backup protection for business critical data and applications, whether they are virtual, physical or online in the Cloud. Data Protector and the OpenText™, Data Protector Cloud Workloads provide backup and disaster recovery in physical, virtual, cloud, and container environments. Native integrations allow for application-aware recovery and backup. A self-service recovery option is available through an enhanced interface. Built-in features enable businesses to recover quickly. From granular file restorations to automated bare steel recovery, built-in capabilities allow businesses to recover quickly.
  • 24
    Polymorphing Reviews
    Polyverse is a leader in zero-trust software cybersecurity solutions. Polymorphing technology, which protects against sophisticated attacks on legacy and unpatched systems, is used by Polyverse. Polyverse is used by security-conscious organisations worldwide to protect against memory exploits and script injections. It also protects against supply-chain attacks and other attacks anywhere Linux runs, from devices and the cloud. CNBC named Polyverse one of the top 100 startups in the world. Contact info@polyverse.com for more information.
  • 25
    Sequretek Percept EDR Reviews
    Cloud-native Percept EDR is a comprehensive, centrally-managed technology that works across platforms and detects and protects against advanced threats. Percept EDR, an intelligent, easy to manage, simple-to deploy product, works efficiently in heterogeneous environment. Percept EDR enhances detection capabilities by using AI-ML and EDR telemetry analytics. It is one of only a few products with on-agent artificial intelligence, ensuring devices are protected even when they are in offline mode. Percept EDR offers real-time protection against zero-day attacks, advanced persistent threats (APTs), ransomware, and other malicious activities. Percept EDR integrates components like device control, application blacklisting, and vulnerabilities management into a single, unified product. This gives you a dashboard view of your endpoint security.