Best Microsoft Defender for Endpoint Alternatives in 2024
Find the top alternatives to Microsoft Defender for Endpoint currently available. Compare ratings, reviews, pricing, and features of Microsoft Defender for Endpoint alternatives in 2024. Slashdot lists the best Microsoft Defender for Endpoint alternatives on the market that offer competing products that are similar to Microsoft Defender for Endpoint. Sort through Microsoft Defender for Endpoint alternatives below to make the best choice for your needs
-
1
Cynet equips MSPs and MSSPs with a fully managed, all-in-one cybersecurity platform that brings together essential security functions in a single, user-friendly solution. By consolidating these capabilities, Cynet simplifies cybersecurity management, reduces complexity, and lowers costs, eliminating the need for multiple vendors and integrations. With multi-layered breach protection, Cynet delivers robust security for endpoints, networks, and SaaS/Cloud environments, ensuring comprehensive defense against evolving threats. Its advanced automation enhances incident response, enabling swift detection, prevention, and resolution. Supported by a 24/7 Security Operations Center (SOC), Cynet’s CyOps team provides continuous monitoring and expert guidance to keep client environments secure. Partnering with Cynet allows you to deliver cutting-edge, proactive cybersecurity services while improving operational efficiency. See how Cynet can redefine your security offerings and empower your clients today.
-
2
VersaONE
Versa Networks
89 RatingsThe AI-powered platform enables unified security and network. AI-powered data and threat protection minimizes human error and increases the speed of detection. AI-powered networks improve user and app experiences, as well as performance and reliability. Reduce your TCO with a converged infrastructure that simplifies your infrastructure and reduces point products sprawl, fragmented operation, and complex management. VersaONE offers seamless connectivity and unified protection for all users, devices and locations, including offices, branches and edge locations. It provides secure access to all of your workloads, cloud applications, and wireless networks from a single platform. This ensures that data and resources can be accessed and secured across any network, whether it is WAN, WLAN, cellular, or satellite. This unified platform approach simplifies network management and reduces complexity while enhancing security. It meets the demands of modern IT environments. -
3
Cortex XDR
Palo Alto Networks
292 RatingsSmarter security operations, fewer alerts, and end-to-end automation. The industry's most comprehensive security product suite, providing enterprises with the best-in class detection, investigation, automation, and response capabilities. Cortex XDR™, the industry's only detection platform, runs on integrated network, endpoint, and cloud data. Cortex XSOAR is the industry's best security orchestration, automation, and response platform. It can manage alerts, standardize processes, and automate actions for over 300 third-party products. Palo Alto Networks solutions can be enabled by integrating security data from your enterprise. Get the best threat intelligence available with unrivalled context to power investigation, prevention, and response. -
4
Trustifi
Trustifi
12 RatingsTrustifi provides industry-leading email security solutions that help small, medium, and large enterprises manage threat detection, regulatory compliance and data encryption. Easily deployable on Outlook, Gmail, and any other email server via relay **Advanced Threat Protection** -Malware/ransomware virus detection and BEC attack prevention and alarms **Data Loss Prevention** --100% compliant HIPAA/HITECH and PII, GDPR. FSA, LGPD, CCPA and more **Encryption** -NSA-grade. Only select Enterprise customers have access the company branding and product white-labeling. One-on-one training for teams. There are many encryption requirements, so there is no one-size-fits all solution for email security. Many times, customized solutions are available on request and often free of charge. -
5
ThreatLocker
ThreatLocker
12 RatingsFor IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. -
6
Rapid7 Managed Threat Complete
Rapid7
$17 per asset per monthManaged Threat Complete combines comprehensive risk and threat coverage in a single subscription. Managed Detection and Response Services & Solutions. Multiple advanced detection techniques, including proprietary threat information, behavioral analytics and Network Traffic Analysis as well as human threat hunting, find evil in your environment. Our team will immediately contain user and endpoint risks to cut off the attacker. The detailed findings reports will guide you in taking additional remediation and mitigating actions tailored to your program. Let our team be your force multiplier. Experts in detection and response, from your security advisor to your SOC, can help you strengthen your defenses. Take immediate action. It's not as easy as purchasing and implementing the newest security products to set up a detection and response program. -
7
SentinelOne Singularity
SentinelOne
$45 per user per year 6 RatingsOne intelligent platform. Unprecedented speeds Infinite scale. Singularity™, enables unrestricted visibility, industry-leading detection and autonomous response. Discover the power of AI powered enterprise-wide security. Singularity is used by the world's largest enterprises to detect, prevent, and respond to cyberattacks at machine speed, greater scale, with higher accuracy, across endpoints, cloud, and identities. SentinelOne's platform offers cutting-edge security by providing protection against malware, scripts, and exploits. SentinelOne's cloud-based platform is innovative, compliant with industry standards and high-performance, whether you are using Windows, Mac, or Linux. The platform is prepared for any threat thanks to constant updates, threat hunting and behavior AI. -
8
Webroot Business Endpoint Protection
Webroot
$30 per year 1 RatingEndpoint protection software is required to protect your business. It must be stronger and more intelligent than traditional antivirus. Endpoint protection or endpoint security is a general term for cybersecurity services that protect network endpoints such as laptops, desktops and smartphones, tablets, servers and virtual environments. These services can include antimalware and web filtering. Endpoint protection is essential for businesses to protect their critical systems, intellectual property, customers, employees, and guests from ransomware and other cyberattacks. You may be asking yourself, "Do I really need endpoint protection?" The truth is that criminals are constantly inventing new ways to attack networks, steal data, and take advantage of employee trust. Although smaller businesses may believe they are not at risk, this is false. Small businesses with 100 employees and fewer are now at the same risk as larger enterprises with 20,000 employees. -
9
Fortinet, a global leader of cybersecurity solutions, is known for its integrated and comprehensive approach to safeguarding digital devices, networks, and applications. Fortinet was founded in 2000 and offers a variety of products and solutions, including firewalls and endpoint protection systems, intrusion prevention and secure access. Fortinet Security Fabric is at the core of the company's offerings. It is a unified platform which seamlessly integrates security tools in order to deliver visibility, automate, and real-time intelligence about threats across the network. Fortinet is trusted by businesses, governments and service providers around the world. It emphasizes innovation, performance and scalability to ensure robust defense against evolving cyber-threats while supporting digital transformation.
-
10
Huntress
Huntress
Huntress offers a powerful suite that includes detection, response and endpoint protection capabilities. This is backed by a team 24/7 of threat hunters to protect your business against today's determined cybercriminals. Huntress protects your company throughout the modern attack cycle, including against ransomware, malicious footholds and other threats. Our security experts do the heavy lifting, providing 24/7 threat hunting, world-class support, and step-by-step instructions for stopping advanced attacks. We review all suspicious activity and only send an alert when a threat is verified or action is required--eliminating the clutter and false positives found in other platforms. Huntress is easy to use for non-security staff to quickly respond to cyber incidents. It includes one-click remediation and handwritten incident reports. -
11
IBM Trusteer
IBM
IBM Trusteer allows you to identify customers and protect them from malicious users across all channels. IBM®, Trusteer®, helps organizations detect fraud and authenticate users, while establishing identity trust throughout the omnichannel journey. Trusteer's cloud-based intelligence is backed by AI, patented machine learning and cloud-based intelligence to identify new and existing users, while improving user experience. Trusteer is trusted by more than 500 leading companies to secure their customers' digital journeys and support business growth. Transparently identify unauthorized activities and access. Establish cross-organizational, actionable insights through real-time assessments. Assess risk, reduce costs and improve security and efficiencies. To build digital identity trust, use behavioral biometrics and AI to outwit account takeover attempts. -
12
Trellix Endpoint Security HX performs targeted, fast forensic investigations on thousands of endpoints. Protect and empower your employees with an integrated security system that protects all endpoints. Trellix Endpoint Security Solutions apply proactive threat intelligence, defenses and protections across the entire attack cycle to keep your organization more resilient and safer. Keep your endpoints safe in today's dynamic threats landscape. Discover how our integrated suites of endpoint protection technology can help you monitor threats and avert them by combining machine learning and actionable intelligence. Endpoint security is a practice that involves safeguarding data and workflows on the devices that connect to the network. Endpoint protection platforms (EPPs) examine files as they enter your network.
-
13
Malwarebytes
Malwarebytes
$47.22 per user per year 12 RatingsCyberthreats are eradicated Restores confidence. Traditional antivirus is no longer sufficient. Malwarebytes eliminates all new threats before other antivirus systems even know they exist. Malwarebytes blocks viruses, malware, malicious sites, ransomware, hackers, and other threats that traditional antivirus can't stop. Organizations of all sizes use our cutting-edge protection and response strategies. Traditional antivirus is slow to respond to new threats. It's also "dumb". We use layers like anomaly detection (an artificial intelligence type), behavior matching, application hardening, and behavior matching to destroy malware that has never been seen before. It's not like traditional antivirus. -
14
Check Point Harmony Endpoint
Check Point Software Technologies
1 RatingCheck Point Harmony is the first industry-leading unified security solution that protects users, devices, and access. The solution protects devices, internet connections from the most sophisticated attackers while ensuring zero-trust access to corporate applications. To protect today's hyper-distributed workspace, there are endless security functions that must be applied across all devices, applications, and networks. But, putting together point solutions can leave security gaps and create a cumbersome infrastructure that is difficult and costly to manage. Harmony is a better alternative that reduces overhead and increases security. Harmony combines 6 cloud-based security products to ensure your safety. No matter where you connect, no matter what you connect to, no matter how you connect, Harmony protects your home, your devices and your organization data from any cyber threat. -
15
Sequretek Percept EDR
Sequretek
Cloud-native Percept EDR is a comprehensive, centrally-managed technology that works across platforms and detects and protects against advanced threats. Percept EDR, an intelligent, easy to manage, simple-to deploy product, works efficiently in heterogeneous environment. Percept EDR enhances detection capabilities by using AI-ML and EDR telemetry analytics. It is one of only a few products with on-agent artificial intelligence, ensuring devices are protected even when they are in offline mode. Percept EDR offers real-time protection against zero-day attacks, advanced persistent threats (APTs), ransomware, and other malicious activities. Percept EDR integrates components like device control, application blacklisting, and vulnerabilities management into a single, unified product. This gives you a dashboard view of your endpoint security. -
16
ESET PROTECT
ESET
$239 per year 1 RatingESET's multilayered technology protects your business endpoints, business data, and users. ESET PROTECT platform provides customizable security solutions that are easy to manage via a cloud console. Cyber risk management and visibility into the IT environment. Keep one step ahead of unknown or known threats. IT staff can quickly respond to any new threats with up-to-date information. IT administrators can save time and protect themselves against future attacks by using predefined policies and automating tasks. Scheduled reporting and dozens customizable templates make it easy to meet reporting requirements. A malicious email might be opened by a user in your network that contains ransomware. Programmers who use code on their work computers may create false positives from compiling software. -
17
Symantec Endpoint Protection
Broadcom
2 RatingsSymantec Endpoint Security is the best integrated endpoint security platform available. Symantec Endpoint Security is available as an on-premises, hybrid or cloud-based platform. It protects both your mobile and traditional endpoint devices and uses artificial intelligence (AI), to optimize security decisions. Unified cloud-based management makes it easy to detect, protect and respond to advanced threats that target your endpoints. Keep your business running. Compromised endpoints can be disruptive to your business. Innovative attack prevention and attack surfaces reduction provide the best security throughout the attack life cycle (e.g. stealthy malware and credential theft, fileless and "living off the land". Avoid the worst-case scenario. Full-blown breaches are CISOs worst nightmare. Provide detection and remediation for persistent threats using sophisticated attack analytics and prevention from AD credential theft. -
18
Trend Vision One
Trend Micro
3 RatingsOne platform is all you need to stop adversaries faster and take control of your cyber risk. Manage security holistically using comprehensive prevention, detection and response capabilities powered AI, leading threat intelligence and research. Trend Vision One provides expert cybersecurity services and supports hybrid IT environments. The increasing attack surface is a challenge. Trend Vision One provides comprehensive security for your environment, including monitoring, securing, and supporting. Siloed software creates security gaps. Trend Vision One provides teams with robust capabilities for prevention detection and response. Understanding risk exposure should be a priority. Utilizing internal and external data across the Trend Vision One eco-system allows you to better control your attack surface risks. With deeper insight into key risk factors, you can minimize breaches or attacks. -
19
Sophos Intercept X Endpoint
Sophos
$28 per user per yearWith remote response capabilities and powerful querying, you can take threat hunting and IT security operations up to the next level. Ransomware file protection, automatic recovery, and behavioral analysis are all available to stop ransomware attacks and boot record. Deep Learning Technology Artificial intelligence integrated into InterceptX that detects known and unknown malware, without relying upon signatures. Blocking exploits and techniques that are used to distribute malware, steal credentials and escape detection will deny attackers. An elite team of threat hunters and experts in response to take targeted actions for you to eliminate even the most sophisticated threats. Active adversary mitigation stops persistence on machines, credential theft protection and malicious traffic detection. -
20
Morphisec
Morphisec
Unknown attacks can't always be predicted. Protect your assets and inflict maximum damage. Moving Target Defense works across all attack vectors and threat types. There are no indicators or waiting for patches or updates. Morphisec reduces risk exposure and significantly lowers technology cost. Morphisec can help you rethink your security model and increase your ROI. Morphisec's patent-pending moving target defense technology provides end-to-end protection from the most serious cyberattacks. Attackers are unable to identify the resources they need in order to bypass your current defenses because of the power of moving targets defense. This proactive cyber defense solution protects your critical systems using a lightweight, easy-to-install agent that doesn’t require any updates. -
21
WildFire
Palo Alto Networks
WildFire®, which uses near-real-time analysis, detects targeted malware and advanced persistent threats that are previously unknown. This keeps your organization safe. Advanced file analysis capabilities are available to protect web portals and integrate with SOAR tools. WildFire's unique malware analysis capabilities that cover multiple threat vectors result in consistent security outcomes throughout your organization via an API. You can submit files and query volumes as you need them without the need for a next-generation firewall. Use industry-leading advanced analysis and prevent engine capabilities, regional cloud deployments, and a unique network effect. WildFire combines machine-learning, dynamic and static analysis with a custom-built environment to detect even the most complex threats across multiple stages. -
22
Cisco Secure Endpoint
Cisco
Our cloud-native solution provides robust protection, detection, response, and remediation to threats - reducing remediation times up to 85 percent. Advanced endpoint detection and response (EDR), threat hunt and endpoint isolation reduce the attack surface. SecureX's integrated platform provides a unified view, simplified incident handling, and automated playbooks. This makes our extended detection response (XDR), the most comprehensive in the industry. Our Orbital Advanced search capability gives you the answers that you need about your endpoints quickly. You can find sophisticated attacks faster. Our proactive, human-driven hunts to find threats map to the MITRE AT&CK framework to help stop attacks before they cause harm. Secure Endpoint provides protection, detection, response, user access, and coverage to protect your endpoints. -
23
Sentinel IPS
Sentinel IPS
A range of network security services that are affordable, including a Managed Net Detection & Response team, our unique Network Cloaking™, and CINS Active Threat Intelligence. Comprehensive managed security. This service is designed to support IT teams that are lean and allow them to get back to their other projects. We will work with you to detect and deflect external intrusions, detect malicious threats, respond quickly to critical events, and more. Autonomous Threat Defense and Active Threat Intelligence outside the firewall. Another set of eyes monitors traffic within the network. Sentinel Outpost provides advanced threat defense at the network's edges with Network Cloaking™, blocking malware and exploitation attempts, as well as other threats, before they reach the firewall. -
24
Our mission is to empower productivity in a privacy-focused environment where work and play can occur anywhere. It's vital that cybersecurity is with you everywhere you go. This includes protecting your data from the point of origin to the cloud. As most people now work and manage their lives online, mobility and cloud technology are essential. Lookout solutions are customizable for any industry or company size. They integrate endpoint and cloud security technologies. This platform can be used by individuals, large corporations, and government agencies. Cloud access does not have to be limited to certain services. Security should not interrupt productivity or interfere with the user's experience. We provide visibility and insight into all data, enabling you to secure your data.
-
25
Datto SaaS Defense
Datto, a Kaseya company
MSPs can protect their clients from malware, business email compromises (BEC) and phishing attacks by using Datto SaaS Defense. This solution is designed to help MSPs defend against attacks on Microsoft Exchange, OneDrive SharePoint and Teams. Microsoft 365 security solutions can protect your clients against ransomware, malware and phishing attacks. Datto SaaS Defense detects zero-day attacks at the moment of first contact, not days later. Protect your clients' Microsoft 365 files in OneDrive SharePoint and Teams. Our comprehensive security solution allows you to attract new clients, expand your market share and increase your market share without investing in security training or increasing headcount. Email security solutions rely on data from cyber threats that have been detected and successful penetration techniques. This leaves protection gaps that can be exploited by new threats. Datto SaaS Defense works differently. -
26
Juniper Advanced Threat Protection
Juniper Networks
The threat intelligence hub of your network is Juniper Advanced Threat Prevention. It has a number of advanced security services built-in that utilize AI and machine learning in order to detect attacks early and optimize network policy enforcement. Juniper ATP can be deployed as a cloud enabled service on an SRX Series Firewall, or as a local virtual appliance. It detects and blocks zero-day and commodity malware in files, IP traffic and DNS requests. The service analyzes and distributes intelligence from network traffic, connected devices (including IoT), and encrypted and decrypted traffic. This reduces your attack surface and helps you avoid breaches. Automatically discover and mitigate zero-day and known threats. Identify and stop threats hidden within encrypted traffic, without decrypting. Detect targeted attacks against your network including high-risk devices and users, and automatically mobilize defenses. -
27
Trend Micro TippingPoint
Trend Micro
You can go beyond next-generation IPS without compromising security and performance. TippingPoint is integrated with Deep Discovery Advanced Threat Protection to detect and block targeted attacks. This includes preemptive threat prevention and threat insight and prioritization, real-time enforcement, and remediation. Trend Micro Network Defense includes the TippingPoint®, Threat Protection System. It is powered by XGen™, a combination of cross-generational threat defence techniques that provides faster protection against known, unknown and undisclosed threats. Our connected, smart, optimized technology gives you visibility and control over the changing threat landscape. -
28
SandBlast Network
Check Point Software Technologies
Cyber attacks are becoming more complex and difficult to detect. This makes security more difficult and tedious, affecting user workflows. SandBlast Network offers the best zero-day protection, while reducing security overheads and ensuring business productivity. SandBlast Network offers the best zero-day protection available in the industry. It also reduces administration overhead and ensures that businesses are productive. Unknown cyber threats are prevented by AI and threat intelligence. One click setup with out-of the-box profiles optimized to business needs. It is a prevention-first strategy that has no impact on the user experience. Humans are the weakest link of the security chain. Pre-emptive user protections prevent threats from reaching users, regardless of user activity (browsing or email). Real-time threat intelligence, derived from hundreds and millions of sensors around the globe. -
29
Panda Adaptive Defense 360
WatchGuard
Unified Endpoint Protection and Endpoint Detection & Response (EDR) capabilities are combined with our unique Zero Trust Application Service and Threat Hunting Service to provide a single solution that effectively detects and classifies 100% of the processes running on endpoints within your company. Cloud-delivered endpoint detection, containment, and response technologies against advanced threat. It also offers IDS, firewall and device control, as well as URL and content filtering capabilities. It automates detection, containment, and response to any advanced threat such as zero day malware, ransomware and phishing. -
30
Untangle NG Firewall
Untangle
It can be difficult and expensive to manage your network and ensure that every device is protected. NG Firewall simplifies network security by providing a single, modular software platform that can be customized to meet your evolving needs. Designed for companies with limited IT budgets and IT resources, NG Firewall offers a browser-based, responsive, and intuitive interface that allows you to quickly see the traffic on your network. NG Firewall provides a comprehensive enterprise-grade network security platform that can be used to protect any organization, from content filtering to advanced threat prevention, VPN connectivity, and bandwidth optimization. Dedicated hardware appliances offer extensive network control, visibility into traffic and other events, flexible connectivity options and multiple layers of advanced protection. -
31
RevBits Endpoint Security
RevBits
Real-time Endpoint Threat Identification, Isolation and Removal RevBits Endpoint Security is an intuitive, high-performance security program that blocks sophisticated attacks. RevBits Endpoint Security is unique in that it performs a three-phase analysis on threats. The comprehensive RevBits Endpoint Detection and Response module (EDR) is feature-rich and provides complete control and access from anywhere. Ransomware and malware attacks are examples of failed endpoint security. RevBIts Endpoint Security provides better protection and will make organizations safer by preventing malware from lateral movement. -
32
Jamf Protect
Jamf Protect
$5 per user, per monthEndpoint protection designed exclusively for Mac. Jamf Protect protects MacOS from malware. It can detect and remove Mac-specific threats and monitor endpoints to ensure compliance. Jamf Protect is designed for Mac. Jamf Protect shines a spotlight on Apple, assisting security and IT teams with Macs in organizations of all sizes. Tools that are familiar with the Mac platform will help you scale your teams. Jamf Protect helps you maintain Mac endpoint compliance. It also addresses anti-virus needs by preventing macOS-specific malware. It can also control Mac applications within the organization. Jamf Protect has minimal impact on the device and end-user experience. Jamf Protect provides comprehensive information about Mac-specific malware to help you prevent it from running on your device and quarantine them for further analysis. Jamf Protect can limit the execution of unwanted software to protect your computer. Detect. Protect your Mac from sophisticated attacks -
33
FortiProxy
Fortinet
Organizations need a holistic approach to protect themselves from malicious websites, viruses, and web traffic as attacks become more sophisticated. FortiProxy, Fortinet's secure gateway for the web, addresses these issues with a single product that protects against web attacks. It includes URL filtering, advanced threat defense and malware protection. Protect end-users against internet-borne threats and enforce policy compliance. Secure Web Gateway addresses multiple security issues within one product. One solution that protects against web attacks by URL filtering, advanced threats defense and malware protection. This helps users to avoid internet-borne threats and enforces internet policy compliance. FortiProxy, a secure web proxy, protects employees from internet-borne threats by using multiple detection techniques, such as web filtering and DNS filtering, data loss prevention and advanced threat protection. -
34
Barracuda CloudGen Firewall
Barracuda Networks
1 RatingYou can get comprehensive protection for both on-premises and multicloud deployments with the firewall built in or for the cloud. Advanced Threat Protection, which is cloud-hosted, detects and blocks advanced threats including zero-day attacks and ransomware attacks. With the help of a global threat network that is fed by millions data collection points, you can quickly protect yourself against the latest threats. Modern cyber threats like ransomware, advanced persistent threats, targeted attack, and zero-day threat require sophisticated defense techniques that combine accurate threat detection with quick response times. Barracuda CloudGen Firewall provides a comprehensive suite of next-generation firewall technologies that provide real-time protection against a wide range of network threats, vulnerabilities and exploits. This includes SQL injections and cross-site scripting, denial-of-service attacks, trojans and viruses, worms and spyware. -
35
Check Point Infinity
Check Point
In an effort to provide better protection, organizations often implement multiple cyber security solutions. They often end up with a patchwork security system that is costly and leads to high TCO. Businesses can take preemptive measures against advanced fifth-generation attacks by adopting a consolidated security strategy with Check Point Infinity architecture. This allows them to achieve a 50% increase in operational efficiency, and a 20% reduction in security cost. This is the first consolidated security architecture that spans networks, cloud, mobile, and IoT. It provides the highest level of threat prevention against known and unknown cyber-threats. 64 threat prevention engines that block known and unknown threats powered by threat intelligence. Infinity-Vision, the unified management platform of Check Point Infinity is the first modern, consolidated cybersecurity architecture designed to protect today's most sophisticated attacks on networks, endpoints, and cloud. -
36
VMware vDefend ATP
Broadcom
VMware vDefend Advanced Threat Prevention, formerly known as NSX Advanced Threat Prevention, provides the highest fidelity insight into advanced threats in the industry. Detect new threats, including those that are evolving and have not been seen before. Identify malware designed to evade security tools. Get complete visibility of both east-west and north-south traffic, as well as a comprehensive overview on abnormal behavior across the entire network. Combining multiple alerts across different assets and hops into a single intrusion allows your security team quickly to understand the scope of the attack and prioritize their response. Eliminate blindspots and inspect all network traffic in order to detect and prevent known threat from gaining access critical systems and data. Baseline network behavior with ML algorithms to accelerate threat remediation. -
37
CrowdStrike Falcon
CrowdStrike
8 RatingsThe Falcon Platform is flexible, extensible, and adaptable when it comes to your endpoint security requirements. You can choose from the bundles listed above or any of these modules. Additional modules can be added to Falcon Endpoint Protection packages. Individual modules can be purchased without the need for a Falcon Endpoint Protection bundle. Customers who have more stringent compliance requirements or operational requirements will find our specialized products useful. -
38
Palo Alto ATP
Palo Alto
Prevent zero-day threats inline and in real time with the first machine-learning and deep-learning IPS in the industry. The only solution that blocks unknown C2 attacks in real-time, using the industry's first inline deep-learning models. Protect your network against known threats such as malware, spyware, command and control attacks and exploits with market-leading signatures developed by researchers that do not compromise performance. Palo Alto ATP blocks threats on both the network and application layer, including port scanning, buffer overflows and remote code execution. It has a low tolerance of false positives. Payload signatures are used to block the most recent and relevant malware. Hash values do not work. Advanced WildFire security updates are delivered in seconds. Customize your protection with flexible Snort rule conversion. -
39
Blackberry Spark
BlackBerry
Trusted Unified Endpoint Security & Unified Endpoint Management BlackBerry Spark®, provides visibility and protection across all endpoints including personal laptops and smartphones that are used for work. It uses AI, machine learning, and automation to improve cyber threat prevention. BlackBerry Spark comes with a comprehensive Unified Endpoint Security layer (UES), which seamlessly integrates with BlackBerry Unified Endpoint Management to deliver Zero Trust security and Zero Touch experience. One size does not fit all, especially when remote workers are using devices that may not be owned or controlled by your company. BlackBerry Spark Suites offer a variety of options to meet your UEM//UES needs. BlackBerry Spark provides the most comprehensive security capabilities, management tools, and visibility to cover people, devices and networks. -
40
Veritas Alta
Veritas
Veritas Alta™ combines a comprehensive set of data services into a single platform. This robust offering is engineered for modern workloads, and designed to achieve optimal performance and security at scale in any environment - hybrid, multicloud, public, privately hosted, edge or on-premises. Veritas is the only solution you need if you manage data in cloud environments. With intelligent, automated recovery and complete visibility, you can achieve unmatched resilience. Ensure performance, cross-cloud mobility, and availability for the always-on enterprise. Capture and visualize all. Archive anywhere and discover what's important. Our flexible cloud-native architectural design combines artificial intelligence with automation and elasticity for the most cost-effective and resilient cloud data protection. Veritas Alta gives you visibility into your entire environment, while reducing the attack surfaces. -
41
Topsec Managed Email Security
Topsec Cloud Solutions
Topsec Managed Email Security is a powerful cloud-based solution designed to enhance communication while protecting businesses from email-borne threats such as malware, ransomware, phishing, and zero-day attacks. Advanced threat protection, email continuity, data loss prevention, configurable policies, easy-to-use administration tools, real-time monitoring, and reporting are all included in its extensive feature set. Businesses may enjoy improved security, easier administration, more productivity, cost savings, email continuity, and scalable solutions by implementing Topsec. Topsec guarantees protection that leads the industry and adherence to data security laws. Because of their widespread presence and easy-to-use administration interface, businesses can concentrate on their core competencies, knowing that their email security is handled by a reliable supplier. -
42
ColorTokens Xtended ZeroTrust Platform
ColorTokens
The cloud-delivered ColorTokens Xtended ZeroTrust Platform protects the inside with unified visibility, microsegmentation and zero-trust network access. It also protects endpoints, workloads, and endpoints with endpoint protection. Visibility across multiclouds and on-premise. Protection of cloud workloads via micro-segment Stop ransomware taking control of your endpoints. You can see all communications between processes, files and users. With built-in vulnerability and threat assessment, you can identify security gaps. Simpler and quicker time-to-compliance for HIPAA, PCI and GDPR. You can easily create ZeroTrust Zones™ and dramatically reduce the attack surface. Dynamic policies that protect cloud workloads. Without the need for cumbersome firewall rules or VLANs/ACLs, you can block lateral threats. By allowing only whitelisted processes, you can lock down any endpoint. Stop communication to C&C servers and block zero-day exploits. -
43
Azure Data Lake Storage
Microsoft
A single storage platform can eliminate data silos. Tiered storage and policy management can help you reduce costs. Azure Active Directory (Azure AD), and role-based access control(RBAC) can authenticate data. You can also help protect your data with advanced threat protection and encryption at rest. Flexible mechanisms provide protection for data access, encryption, network-level control, and more. Highly secure. A single storage platform that supports all the most popular analytics frameworks. Cost optimization through independent scaling of storage, compute, lifecycle management and object-level Tiering. With the Azure global infrastructure, you can meet any capacity requirement and manage data with ease. Large-scale analytics queries run at high performance. -
44
BUFFERZONE
Bufferzone Security
BUFFERZONE is a patent-pending containment and disarming system that protects endpoints from advanced malware and zero day attacks, while maximising user and IT productivity. BUFFERZONE protects individuals and organisations from advanced threats that evade detection by identifying potentially malicious content in browsers, email, and removable media. BUFFERZONE disarms the content and securely transfers it from the container to its native endpoint and secure network zones. It also provides critical intelligence that can be used for enterprise-wide security analysis. BUFFERZONE, a lightweight solution, is easy to deploy and configure. It provides cost-effective containment up to thousands of endpoints. -
45
StellarProtect
TXOne Networks
Industrial-grade, next generation endpoint security for modernized assets. StellarProtect™, the first all-terrain protection system in the world, is a unique defense solution that was specifically designed for operational technology. Its advanced threat scanning reduces known threats while its next-gen machine-learning engine blocks unknown threats. This protection does not require internet access. StellarProtect's ICS filtering is based on an inventory application and certificate list. This allows for the most lightweight operation. StellarProtect is highly effective in all environmental conditions and has a very low impact on endpoint performance. StellarProtect provides patternless protection against known and unknown malware through machine learning and ICS rootof trust. ICS root of Trust collects over a thousand ICS licenses and certificates, verifying them in advance to reduce overhead protection. -
46
WithSecure Elements
WithSecure
You need a simple way to identify and prioritize threats, reduce attack surface, and prevent breaches from happening. Protect your endpoints from sophisticated, automated, and targeted threats such as ransomware, exploits, and fileless attacks. WithSecure Elements Endpoint Security is AI-powered, cloud-native endpoint protection that can be deployed instantly from your browser. It can also be managed easily from one console. It works across all endpoints to protect your organization from attacks. WithSecure Elements Endpoint Protection includes everything you need, including vulnerability management and collaboration protection. It also provides detection and response capabilities. You can combine them all or use individual solutions to meet your specific needs. -
47
ManageEngine Vulnerability Manager Plus
ManageEngine
$695 per user per yearSoftware for enterprise vulnerability management. Vulnerability manager Plus is an integrated threat management software that provides comprehensive vulnerability scanning, assessment and remediation across all endpoints within your network from a single console. You can scan and find vulnerable areas on all your remote and local office endpoints, as well as roaming devices. Use attacker-based analytics to identify areas most likely to be exploited. Reduce the risk of security loopholes being exploited in your network and prevent new ones from developing. Prioritize vulnerabilities based upon their vulnerability, severity, age, affected systems count, and the availability of a fix. You can download, test, and automatically deploy patches to Windows, Mac, Linux and more than 250 third-party apps with an integrated patching module, all without additional cost. -
48
Bitdefender Sandbox Analyzer
Bitdefender
Sandbox Analyzer detects advanced, zero-day threats before they are executed. Bitdefender's cloud sandbox or an on-prem sandbox is used to analyze suspicious files in depth. Sandbox Analyzer is a powerful forensics tool that uses behavioral heuristics and machine learning models to enhance an organization’s defenses against hidden sophisticated threats. It is a source of verification that provides enhanced visibility and focused investigations while optimizing effective containment. Bitdefender's cloud platform or a secure virtual environment is used to analyze suspicious files in depth by detonating the payloads. Our sandboxing technology simulates a real target to observe malware behavior. After analysis, the appropriate actions are taken in order to effectively neutralize a threat. -
49
Secure endpoints against cyberattacks. Detect anomalous behavior in real-time and remediate. IBM®, QRadar®, EDR remediates known or unknown endpoint threats with ease-of-use intelligent automation, requiring little to no human interaction. With attack visualization storyboards, you can make quick, informed decisions and use automated alert management. A user-friendly interface and AI capabilities that are constantly learning put security staff in control, and help to safeguard business continuity. The average organization manages thousands of endpoints, which are the most vulnerable and exploited parts of any network. As malicious and automated cyber activities targeting endpoints increase, organizations that rely solely on traditional endpoint protection methods are left struggling to protect themselves against attackers who easily exploit zero-day vulnerabilities and launch a barrage ransomware attacks.
-
50
Use global intelligence from the largest cyber intelligence networks in the world, combined with local customer context, to uncover the most dangerous threats that could otherwise go unnoticed. To identify and prioritize systems that are still vulnerable and need immediate remediation, aggregate intelligence from multiple control points. All threats can be contained and remediated with just a click. It provides in-depth threat visibility across IT environments from one place without the need for manual searching. Instant search for Indicators-of-Compromise and visualize all related events of an attack, e.g. All files used in an attack. Email addresses. Malicious IP addresses. Click once to remove any attack artifact anywhere - Symantec-protected network, endpoints, and email. You can quickly isolate any compromised system from your enterprise network.