Best StellarProtect Alternatives in 2025
Find the top alternatives to StellarProtect currently available. Compare ratings, reviews, pricing, and features of StellarProtect alternatives in 2025. Slashdot lists the best StellarProtect alternatives on the market that offer competing products that are similar to StellarProtect. Sort through StellarProtect alternatives below to make the best choice for your needs
-
1
Cynet equips MSPs and MSSPs with a fully managed, all-in-one cybersecurity platform that brings together essential security functions in a single, user-friendly solution. By consolidating these capabilities, Cynet simplifies cybersecurity management, reduces complexity, and lowers costs, eliminating the need for multiple vendors and integrations. With multi-layered breach protection, Cynet delivers robust security for endpoints, networks, and SaaS/Cloud environments, ensuring comprehensive defense against evolving threats. Its advanced automation enhances incident response, enabling swift detection, prevention, and resolution. Supported by a 24/7 Security Operations Center (SOC), Cynet’s CyOps team provides continuous monitoring and expert guidance to keep client environments secure. Partnering with Cynet allows you to deliver cutting-edge, proactive cybersecurity services while improving operational efficiency. See how Cynet can redefine your security offerings and empower your clients today.
-
2
Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines the most advanced threat-hunting technologies in existence: Heimdal Next-Gen Antivirus, Heimdal Privileged Access Management, Heimdal Application Control, Heimdal Ransomware Encryption Protection, Heimdal Patch & Asset Management, and Heimdal Threat Prevention. With 6 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
-
3
SentinelOne Singularity
SentinelOne
$45 per user per year 6 RatingsOne intelligent platform. Unprecedented speeds Infinite scale. Singularity™, enables unrestricted visibility, industry-leading detection and autonomous response. Discover the power of AI powered enterprise-wide security. Singularity is used by the world's largest enterprises to detect, prevent, and respond to cyberattacks at machine speed, greater scale, with higher accuracy, across endpoints, cloud, and identities. SentinelOne's platform offers cutting-edge security by providing protection against malware, scripts, and exploits. SentinelOne's cloud-based platform is innovative, compliant with industry standards and high-performance, whether you are using Windows, Mac, or Linux. The platform is prepared for any threat thanks to constant updates, threat hunting and behavior AI. -
4
Acronis Cyber Protect
Acronis
$85 5 RatingsAcronis Cyber Protect gives you the peace of mind to know your business is covered, with zero-day malware and ransomware protection, backup and forensic investigations. Cyberthreats are evolving at an incredible rate — and simple data backup and cybersecurity tools are no longer enough to contain them. Acronis’ all-in-one cyber protection solutions combine cybersecurity, data backup, disaster recovery, and more to ensure the integrity of the data and systems you rely on. If you’re like other businesses, you probably use a complex patchwork of solutions to defend against data loss and other cyberthreats — but this approach is tough to manage and leads to security gaps. Acronis’ integrated cyber protection solutions safeguard entire workloads with greater efficiency and a fraction of the complexity, freeing up resources and enabling you to focus on protection and enablement rather than juggling tools. Protect entire workloads without the friction. Getting started with Acronis' cyber protection solutions is simple and painless. Provision multiple systems with just a click, and manage everything — from backup policies to vulnerability assessments and patching — through a single pane of glass. -
5
Arctic Wolf
Arctic Wolf Networks
The Arctic Wolf®, Platform and Concierge Security® Team will help you improve your organization's security effectiveness. Cybersecurity is a complex field that requires constant adaptation and 24x7 monitoring. The cloud native platform of Arctic Wolf and the Concierge Security®, Team deliver unique solutions. The Arctic Wolf®, Platform processes more than 65 billion security events per day across thousands of installations. The platform gathers and enriches network, endpoint, and cloud telemetry and then analyzes it using multiple detection engines. Your organization will be protected with machine learning and custom detection rules. The Arctic Wolf®, a vendor-neutral platform, allows for broad visibility. It seamlessly integrates with existing technology stacks and eliminates blind spots and vendor lock-in. -
6
Fortinet, a global leader of cybersecurity solutions, is known for its integrated and comprehensive approach to safeguarding digital devices, networks, and applications. Fortinet was founded in 2000 and offers a variety of products and solutions, including firewalls and endpoint protection systems, intrusion prevention and secure access. Fortinet Security Fabric is at the core of the company's offerings. It is a unified platform which seamlessly integrates security tools in order to deliver visibility, automate, and real-time intelligence about threats across the network. Fortinet is trusted by businesses, governments and service providers around the world. It emphasizes innovation, performance and scalability to ensure robust defense against evolving cyber-threats while supporting digital transformation.
-
7
OfficeScan
Trend Micro
The threat landscape used be simple. You kept the good stuff out and the bad stuff in. It's difficult to distinguish the good from the evil. Traditional signature-based antivirus methods are weak against ransomware and other unknown threats. While some threats can be addressed by next-generation technology, others cannot. Adding multiple anti-malware products to a single device results in too many products that don’t work together. Users are increasingly able to access corporate resources from many locations, devices, and even the cloud. This can make matters more complicated. Endpoint security must be smart, optimized, connected, and from a trusted vendor. Trend Micro™, OfficeScan™, combines high-fidelity machine learning with a combination of threat protection techniques to eliminate security holes across all user activities. -
8
RAV Endpoint Protection
Reason Cybersecurity
$32.83 per monthRAV Endpoint Protection, a next-generation anti-virus solution, uses AI-powered Endpoint Detection and Response technology (EDR) to provide real-time security against advanced cyber-threats. Its lightweight engine uses less device resources than other antivirus programs to ensure seamless operation without technical knowledge. The platform provides comprehensive online protection, including identity monitoring. It protects users from phishing attacks, ransomware and adware during web activity. It has digital identity management tools, such as dark web scanning and personal data monitoring, that alert users when they have been compromised. The dynamic malware protection and ransomware defense feature uses advanced heuristics in order to alert and block users from potentially unknown ransomware. RAV Endpoint Protection also emphasizes privacy, with tools such as webcam and mic protection, minimizing possible entry points for attackers. -
9
WatchGuard Endpoint Protection Platform (EPP)
WatchGuard Technologies
3 RatingsWatchGuard EPP goes beyond antivirus products that are signature-based to protect against malware, ransomware, and other threats that exploit unknown, zero-day vulnerabilities. It's also managed via a Cloud-based console and lightweight agent that don't impact endpoint performance. WatchGuard EPP protects endpoints from malware, spyware, and phishing. We employ a wide range of security techniques, including signatures, local cache, as well as our own intelligence feeds that are derived from malware detected previously with our EDR products. This allows us to identify zero-day exploits by using behavioral heuristics as well as known indicators of attacks, also known as "contextual laws". WatchGuard EPP is the centralization of next-generation antivirus for all your Windows and macOS desktops, laptops and servers. -
10
FortiClient
Fortinet
3 RatingsMultilayered endpoint security that includes behavior-based analysis to protect against known and unknown threats. All your global software inventory can be viewed in real-time. You can see your global software inventory from anywhere, anytime. FortiClient cloud-delivered endpoint protection service for small and medium-sized businesses. An integrated endpoint protection platform that provides next-generation threat protection, visibility, and control over your entire hardware and software inventory across the entire security network. Identify and remediate compromised hosts on your attack surface. FortiClient is a key component of the Fortinet Security Fabric. It integrates endpoints within the fabric to prevent advanced threats and early detection. Security events such as zero-day malware, botnet detections and vulnerabilities are reported in real time. -
11
Sophos Intercept X Endpoint
Sophos
$28 per user per yearWith remote response capabilities and powerful querying, you can take threat hunting and IT security operations up to the next level. Ransomware file protection, automatic recovery, and behavioral analysis are all available to stop ransomware attacks and boot record. Deep Learning Technology Artificial intelligence integrated into InterceptX that detects known and unknown malware, without relying upon signatures. Blocking exploits and techniques that are used to distribute malware, steal credentials and escape detection will deny attackers. An elite team of threat hunters and experts in response to take targeted actions for you to eliminate even the most sophisticated threats. Active adversary mitigation stops persistence on machines, credential theft protection and malicious traffic detection. -
12
Comodo Dragon Platform
Comodo
Our cloud-native framework provides zero day protection against undetectable threats and protects your endpoints against known threat signatures. Comodo has created a new approach for endpoint protection that addresses the problem of legacy security solutions. The Dragon platform provides the foundation principles for next-generation endpoint security. The Dragon Platform's lightweight agent delivers artificial intelligence (AI), and Auto Containment to protect against all threats. This makes it easy to improve your cybersecurity and performance. Comodo provides everything you need to activate breach protection immediately. 100% trust verdict in 45 seconds for 92% of signatures via analysis and 4 hours SLA for the remaining 8% via human specialists. Automated signature updates simplify deployment across your entire environment, reducing operational costs. -
13
Panda Endpoint Protection
WatchGuard
Our endpoint protection stops malware and ransomware and threats that leverage unknown vulnerabilities (zero-day). It uses an easy-to use cloud-based console and lightweight agent that does not interfere with the performance endpoints. Endpoint protection against malware, ransomware and other threats. Real-time, detailed security monitoring and reporting. Easy-to-use cloud-based console and lightweight agent. You can increase security by adding patch management or encryption without having to deploy a new installation. This Cloud-native security solution for servers, desktops, and laptops centrally manages security endpoints both within and outside the corporate network. Our Endpoint Protection (EPP), which uses our Collective Intelligence, a consolidated and incremental repository of all binaries, applications, and other files, is used to prevent infections. -
14
CrowdStrike Falcon
CrowdStrike
8 RatingsCrowdStrike Falcon, a cloud-native security platform, provides advanced protection from a wide range cyber threats including malware, ransomware and sophisticated attacks. It uses artificial intelligence (AI), machine learning, and incident response to detect and respond in real-time to threats. The platform uses a lightweight, agent-based solution that continuously monitors the endpoints to detect malicious activity. This provides visibility and protection with minimal impact on system performance. Falcon's cloud architecture ensures rapid updates, scalability and rapid threat response in large, distributed environments. Its comprehensive security capabilities help organizations detect, prevent, and mitigate cyber risks. This makes it a powerful tool in modern enterprise cybersecurity. -
15
Deep Instinct
Deep Instinct
Deep Instinct is unique in applying end-to-end deeplearning to cybersecurity. Deep Instinct's approach is preemptive, unlike response-based solutions that wait for an attack to occur before reacting. Deep Instinct's preventative approach ensures customers are protected in no time. Files and vectors are automatically analyzed before execution. This is crucial in a dangerous environment where it is impossible to act quickly. Deep Instinct is designed to eradicate cyber threats from an enterprise. It detects and blocks the most evasive known as well as unknown cyberattacks with unmatched accuracy. Third-party tests are performed regularly and have the highest detection rates. The lightweight solution provides protection for endpoints, networks and servers as well as mobile devices. It can be applied to all OSs and protects against file-based and fileless attacks. -
16
VIPRE Endpoint Security
VIPRE Security Group
$34/seat/ year VIPRE Endpoint Protection offers robust defense against today’s sophisticated malware, providing ultimate protection without the unnecessary complexity found in other endpoint solutions. Designed to keep your total cost of ownership low, VIPRE combines advanced machine learning, real-time behavioral analysis, and a global threat intelligence network to deliver effective, proactive security. This cloud-based solution combines a modern, streamlined endpoint defense with time-saving efficiencies that help keep your organization running smoothly. VIPRE protects at the file, application, and network level, providing comprehensive malware defense across all attack vectors. It also allows organizations to enforce detailed internet usage policies with granular safeguards that meet employers’ duty-of-care responsibilities. Dynamic, real-time dashboards offer an intuitive, comprehensive view of your endpoint environment, making it easier to monitor security status and take action when needed. VIPRE Endpoint Protection helps safeguard your organization with less complexity and greater efficiency. Available as a core next-generation AV solution, a full EDR solution, or a combined EDR+MDR solution, we have a package that will work for you. -
17
N-able EDR
N-able
You need to be able to adapt to new threat patterns. Zero-day attacks, ransomware, fileless threats all can evade the antivirus solutions that your customers rely upon. Endpoint Detection and Response takes threat protection to the next level. It uses AI to keep you one step ahead of any cyberattack. Automated protection against evolving threats at every endpoint. Use AI engines to perform static and behavioral analysis of new threat patterns. Machine learning can be used to develop threat responses. One dashboard allows you to manage, operate, and monitor endpoint protection. MSP clients believe that antivirus solutions will protect them from all threats. They don't realize that ransomware and other zero-day threats can slip through these programs. To protect against zero-day and fileless attacks, you can allow and block devices using custom policies. Reverse ransomware can be reversed with the Windows OS rollback function in minutes. -
18
WildFire
Palo Alto Networks
WildFire®, which uses near-real-time analysis, detects targeted malware and advanced persistent threats that are previously unknown. This keeps your organization safe. Advanced file analysis capabilities are available to protect web portals and integrate with SOAR tools. WildFire's unique malware analysis capabilities that cover multiple threat vectors result in consistent security outcomes throughout your organization via an API. You can submit files and query volumes as you need them without the need for a next-generation firewall. Use industry-leading advanced analysis and prevent engine capabilities, regional cloud deployments, and a unique network effect. WildFire combines machine-learning, dynamic and static analysis with a custom-built environment to detect even the most complex threats across multiple stages. -
19
You can scale visibility and security analytics across the business. Secure Network Analytics (formerly Stealthwatch) offers industry-leading machine learning, behavioral modeling, and predictive analytics that will help you outsmart emerging threats to your digital business. Telemetry from your network infrastructure allows you to see who is on the network, and what they are doing. Detect advanced threats quickly and respond to them. Smarter network segmentation can protect critical data. You can do all this with an agentless solution that grows along with your business. High-fidelity alerts that are rich in context, such as user, device location, timestamp, application, and timetamp, can be used to detect attacks across the dynamic network. Analyze encrypted traffic without encryption to determine compliance and threats. Using advanced analytics, quickly detect unknown malware and insider threats such as data exfiltration, policy violations, or other sophisticated attacks. Telemetry data can be stored for long periods of time for forensic analysis.
-
20
CatchPulse
SecureAge
$3 per monthEnterprises who want to be 100% protected from known and unknown malware threats can have 24/7 monitoring. CatchPulse Pro is powered by an intelligent AI engine that provides the right combination of control, detection, and insight. CatchPulse Pro works in tandem with cloud anti-virus scanners, and is controlled by a central dashboard. It protects and informs all sizes of enterprises without interfering or interrupting existing systems and employee processes. CatchPulse Pro is powered by an intelligent AI engine and supported by multiple cloud anti-virus scanners. CatchPulse Pro detects unknown threats in real time by using a centralized dashboard. CatchPulse Pro informs and protects. It is a trusted guide for non-cyber security professionals and an information ally for those seeking high-level security insights. Auto-Protect ON is the CatchPulse AI that, along with third-party antiviral scanners, determines the best course for you in the face of a potential threat. -
21
Secure endpoints against cyberattacks. Detect anomalous behavior in real-time and remediate. IBM®, QRadar®, EDR remediates known or unknown endpoint threats with ease-of-use intelligent automation, requiring little to no human interaction. With attack visualization storyboards, you can make quick, informed decisions and use automated alert management. A user-friendly interface and AI capabilities that are constantly learning put security staff in control, and help to safeguard business continuity. The average organization manages thousands of endpoints, which are the most vulnerable and exploited parts of any network. As malicious and automated cyber activities targeting endpoints increase, organizations that rely solely on traditional endpoint protection methods are left struggling to protect themselves against attackers who easily exploit zero-day vulnerabilities and launch a barrage ransomware attacks.
-
22
WatchGuard EDPR
WatchGuard Technologies
WatchGuard EPDR combines our Endpoint Protection (EPP), Endpoint Detection and Response(EDR) capabilities into a single easy-to-buy product that provides maximum security against sophisticated threats. For a comprehensive, unique offering, we combine signature-based techniques with advanced services and features. We are able to detect, classify, and monitor all activity at the endpoint, and thus identify and block any anomalous behavior of users, machines, and processes. We also discover and quickly arm our customers with new hacking and evasion strategies and tactics. These innovations are provided at no additional cost and instantly add an intelligent layer of protection to keep attackers away. EDR is a continuous monitoring system that prevents unknown processes from being executed. Automatic detection and response to targeted attacks and in-memory vulnerabilities. -
23
eScan
MicroWorld Technologies
$58.95/one-time/ user eScan's next generation antivirus solution protects your home network from malware, viruses, ransomware, and other threats using a layered approach. eScan is able to block a wide range of attacks thanks to its unique combination of modern and basic techniques. It includes web filtering, signature-based Malware detection and behavior analysis, as well as innovative techniques such deep learning malware detection, exploit prevention and heuristic scanning. eScan provides business endpoint protection, endpoint detection and response solutions (EDR), as well as anti-spam solutions email and multi-factor authentication. -
24
Panda Adaptive Defense 360
WatchGuard
Unified Endpoint Protection and Endpoint Detection & Response (EDR) capabilities are combined with our unique Zero Trust Application Service and Threat Hunting Service to provide a single solution that effectively detects and classifies 100% of the processes running on endpoints within your company. Cloud-delivered endpoint detection, containment, and response technologies against advanced threat. It also offers IDS, firewall and device control, as well as URL and content filtering capabilities. It automates detection, containment, and response to any advanced threat such as zero day malware, ransomware and phishing. -
25
REVE Endpoint Security
REVE Antivirus
REVE Endpoint Security software, which is enterprise-grade, provides strong protection for your network against any type of intrusion. REVE EPS uses machine learning technology to detect zero day threats. This makes it easy to identify advanced attacks and mitigate them quickly so that your organization's security is not compromised. -
26
C-Prot Endpoint Security
C-Prot
FreeYou can manage your endpoint devices easily with a user-friendly control panel, cloud-based management, or on-premises options. C-Prot Endpoint Security provides multi-layered security against all types of potential threats, without disrupting the workflows and institutions of businesses and organizations. It is supported by advanced machine-learning technology and comprehensive threat-intelligence. It offers effective protection against all threats, including fileless threats, hacking attempts, and rootkits. C-Prot Endpoint Security safeguards your organization's computers, servers and mobile devices against viruses, trojans and worms. It offers comprehensive protection by detecting malware, viruses, and spyware on mobile devices within your organization. It protects your employees against phishing and prevents them from clicking on harmful emails. -
27
Webroot BrightCloud®, Threat Intelligence Services are integrated by top security vendors worldwide to help you provide proactive protection against modern threats to your customers. Webroot BrightCloud®, Threat Intelligence Services help protect your customers against malicious URLs, files, IPs, and mobile apps. They integrate accurate, near-real-time threat intelligence into both your network and endpoint security. The platform scans billions upon billions of URLs and millions upon millions of domains. It also leverages machine learning to classify each threat according to its importance to your business. Cloud-based solutions that provide instantaneous updates are essential in today's cyber threat landscape. Many of the malware we see today may disappear tomorrow.
-
28
Blackberry Spark
BlackBerry
Trusted Unified Endpoint Security & Unified Endpoint Management BlackBerry Spark®, provides visibility and protection across all endpoints including personal laptops and smartphones that are used for work. It uses AI, machine learning, and automation to improve cyber threat prevention. BlackBerry Spark comes with a comprehensive Unified Endpoint Security layer (UES), which seamlessly integrates with BlackBerry Unified Endpoint Management to deliver Zero Trust security and Zero Touch experience. One size does not fit all, especially when remote workers are using devices that may not be owned or controlled by your company. BlackBerry Spark Suites offer a variety of options to meet your UEM//UES needs. BlackBerry Spark provides the most comprehensive security capabilities, management tools, and visibility to cover people, devices and networks. -
29
Trellix XDR
Trellix
The Trellix Platform is a composable XDR platform that adapts to your business's challenges. The Trellix Platform learns to adapt for living protection. It provides native and open connections, expert support, and embedded support for your employees. Adaptive prevention is a method of protecting your organization from threats. It responds in machine-time to them. Trellix is trusted by 75M customers. Zero trust principles allow for maximum business agility and protect against back-door, side-door and front-door attacks. This allows for simplified policy management. Secure agile DevOps, visible deployment environments, and comprehensive protection for cloud-native apps. Our email and collaboration tool security protects you against high-volume attackers and exposure points. This automates for optimal productivity and allows for secure and agile teamwork. -
30
Bitdefender Antivirus Plus
Bitdefender
$17.38 first year 1 RatingA lightweight antivirus provides essential protection for your device or computer. The most advanced technologies are available to detect, prevent, detect, and remedy any cyber-threats anywhere in the world. Bitdefender Antivirus Plus is the next-generation cybersecurity product that was awarded the "Product Of The Year" award by AV-Comparatives. It protects computers from all online threats and includes privacy tools like Bitdefender VPN or Bitdefender Safepay. Bitdefender's multi-layered protection is unbeatable and keeps your devices safe against all new and existing threats. Bitdefender Antivirus Plus responds immediately to e-threats without compromising your system's performance. Bitdefender Antivirus Plus protects your privacy online and personal information. Compare our award-winning products to get the best protection. This allows you to continue doing the things that are important while we take care of security. -
31
Trellix Endpoint Security HX performs targeted, fast forensic investigations on thousands of endpoints. Protect and empower your employees with an integrated security system that protects all endpoints. Trellix Endpoint Security Solutions apply proactive threat intelligence, defenses and protections across the entire attack cycle to keep your organization more resilient and safer. Keep your endpoints safe in today's dynamic threats landscape. Discover how our integrated suites of endpoint protection technology can help you monitor threats and avert them by combining machine learning and actionable intelligence. Endpoint security is a practice that involves safeguarding data and workflows on the devices that connect to the network. Endpoint protection platforms (EPPs) examine files as they enter your network.
-
32
You need to protect every device, including laptops and mobile devices, on your network as more business operations are going digital. Select Tier combines multi-layered technologies and flexible cloud management with centralized application, web, and device controls to protect sensitive data at every endpoint. Our security doesn't slow down your system. The Remediation Engine can undo most malicious actions if you are attacked. Users can continue working without interruption. You can be assured of world-class security, including post execution Behavior Detection (and Machine Learning) technologies. This will help to reduce attack risk and keep your endpoints safe and secured. There is no need to download frequent updates. Easy migration from third-party endpoint security, ensuring a smooth transition. You can be sure of optimal configuration with our post-deployment quality audit service.
-
33
Jamf Protect
Jamf Protect
$5 per user, per monthEndpoint protection designed exclusively for Mac. Jamf Protect protects MacOS from malware. It can detect and remove Mac-specific threats and monitor endpoints to ensure compliance. Jamf Protect is designed for Mac. Jamf Protect shines a spotlight on Apple, assisting security and IT teams with Macs in organizations of all sizes. Tools that are familiar with the Mac platform will help you scale your teams. Jamf Protect helps you maintain Mac endpoint compliance. It also addresses anti-virus needs by preventing macOS-specific malware. It can also control Mac applications within the organization. Jamf Protect has minimal impact on the device and end-user experience. Jamf Protect provides comprehensive information about Mac-specific malware to help you prevent it from running on your device and quarantine them for further analysis. Jamf Protect can limit the execution of unwanted software to protect your computer. Detect. Protect your Mac from sophisticated attacks -
34
Forget about identity theft, malware, and phishing. Guardio is a lightweight extension that allows you to browse securely and quickly. It will clean your browser and speed it up. It also protects your private information. How it works. In seconds, add. Remove threats Continue browsing as usual. Cleans your web browsing experience. This tool removes unwanted popups and malware from your computer. Protects you from online threats Protects against phishing, malicious websites and scams that could lead to identity theft or worse. Keep your secrets secret. Notify the public if personal data is leaked and ensure that your accounts are protected with security best practices. The hood. Explore Guardio's powerful technology. Safe web, great technology. Guardio must stay at the forefront of many technology disciplines in order to effectively combat new threats from ever-evolving malign actors. Machine Learning, Big Data, Cloud Infrastructure
-
35
ESET PROTECT
ESET
$239 per year 1 RatingESET's multilayered technology protects your business endpoints, business data, and users. ESET PROTECT platform provides customizable security solutions that are easy to manage via a cloud console. Cyber risk management and visibility into the IT environment. Keep one step ahead of unknown or known threats. IT staff can quickly respond to any new threats with up-to-date information. IT administrators can save time and protect themselves against future attacks by using predefined policies and automating tasks. Scheduled reporting and dozens customizable templates make it easy to meet reporting requirements. A malicious email might be opened by a user in your network that contains ransomware. Programmers who use code on their work computers may create false positives from compiling software. -
36
Symantec Endpoint Protection
Broadcom
2 RatingsSymantec Endpoint Security is the best integrated endpoint security platform available. Symantec Endpoint Security is available as an on-premises, hybrid or cloud-based platform. It protects both your mobile and traditional endpoint devices and uses artificial intelligence (AI), to optimize security decisions. Unified cloud-based management makes it easy to detect, protect and respond to advanced threats that target your endpoints. Keep your business running. Compromised endpoints can be disruptive to your business. Innovative attack prevention and attack surfaces reduction provide the best security throughout the attack life cycle (e.g. stealthy malware and credential theft, fileless and "living off the land". Avoid the worst-case scenario. Full-blown breaches are CISOs worst nightmare. Provide detection and remediation for persistent threats using sophisticated attack analytics and prevention from AD credential theft. -
37
BUFFERZONE
Bufferzone Security
BUFFERZONE is a patent-pending containment and disarming system that protects endpoints from advanced malware and zero day attacks, while maximising user and IT productivity. BUFFERZONE protects individuals and organisations from advanced threats that evade detection by identifying potentially malicious content in browsers, email, and removable media. BUFFERZONE disarms the content and securely transfers it from the container to its native endpoint and secure network zones. It also provides critical intelligence that can be used for enterprise-wide security analysis. BUFFERZONE, a lightweight solution, is easy to deploy and configure. It provides cost-effective containment up to thousands of endpoints. -
38
Microsoft Defender for Endpoint
Microsoft
You can gain an edge over sophisticated threats such as ransomware and nation state attacks. To prioritize risks and improve your security posture, give time back to defenders. You can move beyond endpoint silos and improve your security by establishing a foundation for XDR (zero trust) and other principles. Microsoft Defender for Endpoint provides industry-leading endpoint protection for Windows, macOS Linux, Android, iOS and network devices. It helps you quickly stop attacks, scale security resources, and improve your defenses. It is delivered at cloud scale with built-in AI which analyzes the largest threat intelligence in the industry. Our comprehensive solution allows you to discover all endpoints and network devices in your environment. It provides endpoint protection, endpoint protection, mobile threat defense, endpoint detection, and response (EDR) all in one, unified platform. -
39
GlobalProtect
Palo Alto Networks
1 RatingModern workers are more mobile than ever. They can access the network from anywhere, on any device, at anytime. Advanced threats can't be stopped by endpoint antivirus and VPN technologies. GlobalProtect subscriptions allow you to extend next-generation firewall capabilities. This will give you greater visibility into all traffic and users, devices, applications, and devices. GlobalProtect allows organizations to extend consistent security policies across all users. It also eliminates remote access blindspots, strengthens security, and can be used to create security policies for all users. GlobalProtect protects your mobile workforce using the capabilities of your Next-Generation Firewall. It inspects all traffic, incoming and outgoing. To ensure transparent access to sensitive data, enable an IPsec/SSL VPN connection between multiple endpoints and operating system. Quarantine compromised devices with immutable properties on internal and externe networks. -
40
Comodo Advanced Endpoint Security (AEP) protects your computer from malware. Malicious applications often attempt to bypass its protection. Comodo AEP has strong self-protection countermeasures to prevent malicious applications from taking control of or bypassing Comodo AEP services. AEP intercepts system calls that could pose a threat to applications. Terminate Process and Create Remote Thread are two examples of calls that might be a concern to AEP. CreateFile is another less obvious, but potentially more dangerous call. It can do much more than just create files. These calls are intercepted by Comodo AEP and allowed to proceed only if they don't cause harm to the Comodo process. Comodo AEP also includes a kernel mode driver, which it uses to stop attempts to modify the system's kernel directly.
-
41
activeDEFENCE
activereach
Threats to your organization's infrastructure range from malware to advanced persistent threats (APT), to extortion and internal breaches. Businesses must now consider smartphones, tablets, and consumerization. This is in addition to telecommuters, contractors and partners and business-critical services hosted on the cloud. Security is more important than ever, and far more complex. You need a multi-layered, flexible defensive strategy to protect your information and systems. This strategy must cover all components of your IT environment. It should include the network, perimeter, data, applications, endpoints, and endpoints. This will minimize and manage the vulnerabilities and weak points that could expose your organization to risk. Activereach's comprehensive portfolio of network security solutions will protect your business against advancing threats, improve network performance, and optimize operational efficiencies. -
42
Huntress
Huntress
Huntress offers a powerful suite that includes detection, response and endpoint protection capabilities. This is backed by a team 24/7 of threat hunters to protect your business against today's determined cybercriminals. Huntress protects your company throughout the modern attack cycle, including against ransomware, malicious footholds and other threats. Our security experts do the heavy lifting, providing 24/7 threat hunting, world-class support, and step-by-step instructions for stopping advanced attacks. We review all suspicious activity and only send an alert when a threat is verified or action is required--eliminating the clutter and false positives found in other platforms. Huntress is easy to use for non-security staff to quickly respond to cyber incidents. It includes one-click remediation and handwritten incident reports. -
43
BlackBerry Cyber Suite
BlackBerry
Protect your users and devices, including BYOD laptops, smartphones, and tablets, with a solution that focuses on building trust across all endpoints and validating that trust at each transaction. Are you able to empower your employees no matter where they are working? It's important that employees have secure access to data and apps even if they are unable to report to work. The BlackBerry®, Cyber Suite provides total security, effectively protecting against breaches and protecting against sophisticated threats with advanced AI. It offers a complete Zero Trust solution that covers all devices, ownership models and networks. It authenticates users continuously and dynamically adjusts security policies to provide a Zero Touch experience that improves security without user interruption. -
44
AhnLab EPS
AhnLab
AhnLab EPS is a lightweight agent that ensures system availability of fixed function systems such as Industrial Control Systems, Point of Sale (POS), Terminals, KIOSKs and ATMs. AhnLab EPS is a whitelisting technology that ensures business continuity and advanced endpoint protection. This technology ensures system availability and productivity for critical infrastructures. Configured settings and security policies allow simulation of expected results to minimize unexpected errors that are often found in untested deployments. It is crucial to quickly identify any threats in critical infrastructures to ensure smooth operation and service. However, it is common for security updates and patches to slow down or even stop the operation. -
45
AVG AntiVirus Business Edition
Avast
$44.99 per year 17 RatingsUnrecognized files are downloaded to one of your computers. A copy will be sent to Threat Labs experts to determine if it is safe. It checks webpages before they open in your web browser. To help you surf the internet with more confidence, it displays a safety rating in search engine results. Cloud-based proactive AI Detection and Real-Time Outbreak Detection provide better protection against the latest malware. Protects against online security threats such as spam, viruses, hackers, and malware Anti-Spyware protects you from spyware and adware which track personal information. Our Windows file server security keeps it private, secure, and out of hackers' reach. Advanced File Shredder securely deletes files in order to prevent unintended recovery. It scans your computer when you're not using it to ensure that it doesn't get in your way. It does all the work so that you and your employees can concentrate on your business without any costly delays or distractions. -
46
G DATA
G Data Software
G DATA prepares your optimally for cyber threats. It opens up all possibilities for the digital future. G DATA was the first company to develop antivirus software. It was launched in 1987. We protect our customers from all types of cybercrime today with end-to–end solutions and services using the latest security software and AI technologies. We also offer online security awareness training to teach employees safe behavior. G DATA customer support is available 24 hours a day, with support teams and the G DATA SafetyLab working together at the same place. Independent tests have shown that G DATA IT security solutions offer the highest attack detection rates to effectively combat Trojans, malware, and other unknown viruses. -
47
Next DLP
Next DLP
Reveal helps you to identify risks, educate employees and enforce policies. It also prevents data loss. Your people, users, and data are dynamic. They change and move constantly. People create, manipulate, and share data dynamically in the hybrid world of work. This is possible through a variety of channels. There are many data leakage opportunities. Your people are the main target. Securing your organization begins with securing you people. Reveal Cloud is cloud-native so it is easy to install, buy, and use. Automatic protection is available from day one with out-of the-box policies and machine-learning, as well as smart remediation that works even when computers are not connected to the network. The lightweight agent ensures that your data and employees are always protected without slowing down. Continuous monitoring gives you visibility into user behavior, data access, system use, and other system activities. Security personnel can search for file, USB device and connection. They can also search for browser events and other information. -
48
RevBits Endpoint Security
RevBits
Real-time Endpoint Threat Identification, Isolation and Removal RevBits Endpoint Security is an intuitive, high-performance security program that blocks sophisticated attacks. RevBits Endpoint Security is unique in that it performs a three-phase analysis on threats. The comprehensive RevBits Endpoint Detection and Response module (EDR) is feature-rich and provides complete control and access from anywhere. Ransomware and malware attacks are examples of failed endpoint security. RevBIts Endpoint Security provides better protection and will make organizations safer by preventing malware from lateral movement. -
49
Zemana Endpoint Security
Zemana
Zemana Endpoint Security. Protect your business' endpoints with proactive protection. Rapid and effective malware scanning. Protection against future malware infections in real-time. Every website is scanned to determine if it's safe. It also blocks any interaction with malicious sites. It makes it possible to transmit your login credentials, social security numbers, credit card numbers and credit card numbers securely, leaving attackers powerless. Zemana AntiLogger lets you disguise your online activities, such as shopping, calling, texting and banking, so that intruders cannot get a hold of it. It uses heuristic algorithms that recognize and defeat unknown malware types for zero-day detection. Any untrusted application from your network is stopped from running. You can verify that any website is safe before you interact with it. -
50
WithSecure Elements
WithSecure
You need a simple way to identify and prioritize threats, reduce attack surface, and prevent breaches from happening. Protect your endpoints from sophisticated, automated, and targeted threats such as ransomware, exploits, and fileless attacks. WithSecure Elements Endpoint Security is AI-powered, cloud-native endpoint protection that can be deployed instantly from your browser. It can also be managed easily from one console. It works across all endpoints to protect your organization from attacks. WithSecure Elements Endpoint Protection includes everything you need, including vulnerability management and collaboration protection. It also provides detection and response capabilities. You can combine them all or use individual solutions to meet your specific needs.