17 years helping British businesses
choose better software

Endpoint Protection Software

Endpoint Protection software provides security against malware, system attacks, viruses, and other threats. IT security professionals use endpoint protection software to ensure data, virtual machines, physical laptops and servers, and everything within their network is resistant to hackers. Related directories include Computer Security software, Network Security software, Mobility software, Mobile Device Management software, Identity Management software, and

Featured software

United Kingdom Show local products
ThreatLocker Endpoint Protection cybersecurity solutions proactively defend your business by reducing the attack surface. Try for Free Learn more about ThreatLocker
Endpoint protection is crucial in today's cyber threat landscape to secure your organization from malicious attacks. ThreatLocker cybersecurity solutions proactively defend your business by reducing the attack surface, with granular controls over what is permitted. We enable organizations to only allow what their users need to complete their work while blocking everything else by default, enhancing productivity and mitigating cyber vulnerabilities. Schedule a demo with ThreatLocker today. Learn more about ThreatLocker

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
On-prem & cloud-based unified endpoint management and security tool that helps manage organization endpoints from single console. Learn more about ManageEngine Endpoint Central
Endpoint Central is the toolkit for your endpoint security needs, bundled with threat and vulnerability management, BitLocker management, peripheral devices management, allowlist/blocklist applications, application privilege management, enterprise browser security, endpoint data loss prevention and ransomware Protection. Learn more about ManageEngine Endpoint Central

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
A prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching. Learn more about ManageEngine Vulnerability Manager Plus
Vulnerability Manager Plus delivers comprehensive coverage, continual visibility, risk-based assessment, and integral remediation of vulnerabilities and misconfigurations from a central console. It offers extensive features including vulnerability assessment, automated patching, CIS compliance management, security configuration management, high-risk software audit, antivirus audit and active port audit. Vulnerability Manager Plus comes with plenty of reports, dashboards, and endless scalability. Learn more about ManageEngine Vulnerability Manager Plus

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
A revolutionary, 100% signature-free component that provides market-leading detection and remediation of ransomware attacks. Learn more about Heimdal Ransomware Encryption Protection
Heimdal Ransomware Encryption Protection is an innovative and signature-free cybersecurity module with market-leading detection and remediation capacities that prevent any type of ransomware. This includes both fileless and file-based strains for complete, round-the-clock safety. It can detect any encryption attempt, even those that have no signatures or behavioral patterns. Our solution was built to be universally compatible with any antivirus, be it Heimdal’s own NGAV or something else. Learn more about Heimdal Ransomware Encryption Protection

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
The ultimate next-generation antivirus powered by market-leading threat intelligence, forensics, and firewall integration. Learn more about Heimdal Next-Gen Endpoint Antivirus
Heimdal Next-Gen Endpoint Antivirus is an NGAV solution designed to provide market-leading endpoint detection and response through local signature-based file scanning, sandbox and backdoor analysis, process and behavior-based examination, and real-time cloud inspection. It is the detection-oriented counterpart to our threat prevention offering, Heimdal Threat Prevention. Besides its EDR features, Heimdal NGAV comes with complete firewall integration, which will further secure your workstations. Learn more about Heimdal Next-Gen Endpoint Antivirus

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Endpoint DLP Plus is an integrated DLP solution designed to safeguard sensitive endpoint data and effectively mitigate insider risks. Learn more about ManageEngine Endpoint DLP Plus
Endpoint DLP Plus leverages advanced data loss prevention strategies to safeguard sensitive data within endpoints. Its capabilities enable administrators to locate, consolidate and categorize sensitive information as well as monitor and limit its movement across various exit routes such as cloud applications, email, peripheral devices and more in order to prevent accidental or deliberate disclosure. It is a versatile and scalable solution ideal for SMB's and enterprises. Learn more about ManageEngine Endpoint DLP Plus

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Automox is a cloud-based patch management platform - modern cyber hygiene to raise the world's security confidence. Learn more about Automox
Automox uses a lightweight, cloud-native agent which can be installed on all endpoints in just a few minutes, ensuring that no device or server is left unpatched or untracked. With Automox, you'll have the ability to see all endpoints and applications from a single console which enables administrators to identify misconfigured systems, missing patches, or compliance issues. Learn more about Automox

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications. Learn more about Versa SASE
Versa simplifies enterprise connectivity and security by linking users, devices, and sites to applications, boosting security, user experience, and efficiency. Learn more about Versa SASE

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Designed to adapt — secure network access solutions tailored to evolving business needs. Learn more about NordLayer
Internal threats are as challenging as external ones — user-controlled devices are associated with potential risks of data leakage, malware files, and malicious activity easily triggered by human error. NordLayer endpoint protection consists of real-time device activity monitoring, detection of jailbroken/rooted devices to block from a company network, and ThreatBlock protection to mitigate endpoint security issues. Learn more about NordLayer

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Ninja Protect provides unprecedented visibility & control over endpoints, robust patching, and backup capabilities. Learn more about NinjaOne
Ninja Protect is NinjaOne’s single-pane solution for endpoint protection and is ranked #1 on G2. Providing unprecedented visibility & control over endpoints, robust patching, endpoint hardening, backup, and data protection capabilities alongside Bitdefender’s industry-leading next-generation AV & EDR capabilities, Ninja Protect is a holistic solution for endpoint protection. By combining these two solutions, Ninja Protect helps IT leaders reduce their attack surface and stop ransomware threats. Learn more about NinjaOne

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Cynet All-in-One includes the essential security technologies you need to protect your organization – backed by 24/7 security experts. Learn more about Cynet 360
Cynet’s end-to-end, natively automated All-in-One platform, backed by 24/7 security experts, was purpose-built to enable lean IT security teams to achieve comprehensive and effective protection regardless of their resources, team size or skills. Cynet All-in-One includes the essential security technologies you need to protect your organization – including your endpoints, users, email, network, SaaS and Cloud apps - in one automated, simplified platform that delivers enterprise-grade protections with less manual effort and lower cost. Learn more about Cynet 360

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
We’re Kandji: the Apple device management and security platform that empowers secure and productive global work. Learn more about Kandji
Kandji is the Apple device management and security platform that empowers secure and productive global work. With Kandji, Apple devices transform themselves into enterprise-ready endpoints, with all the right apps, settings, and security systems in place. Through advanced automation and thoughtful experiences, we’re bringing much-needed harmony to the way IT, InfoSec, and Apple device users work today and tomorrow. Learn more about Kandji

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
EventLog Analyzer is a comprehensive log management solution that provides multiple security capabilities on a centralized platform. Learn more about ManageEngine EventLog Analyzer
EventLog Analyzer, a comprehensive log management solution, collects, analyzes, correlates, searches, and archives log data from endpoints, firewalls, servers, databases, applications, and more. It provides visibility into network activity, spots suspicious activities through incident detection mechanisms such as event correlation, threat intelligence and more, mitigates potential threats and offers audit-ready report templates that help enterprises to comply with IT mandates at ease. Learn more about ManageEngine EventLog Analyzer

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Netwrix PolicyPak is a policy management solution that helps businesses manage access rights, device policies, browser access, & more. Learn more about Netwrix PolicyPak
In today's hybrid work environment, users need to access their desktops, laptops and other devices at the office, at home, while traveling, through kiosks and virtually. Netwrix PolicyPak enables you to solve your endpoint management and endpoint protection challenges wherever users get work done, modernizing and extending the power of your existing enterprise technology assets. Learn more about Netwrix PolicyPak

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Industry-leading Endpoint Protection Software. Discover, monitor and protect your sensitive data. Learn more about Netwrix Endpoint Protector
Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as GDPR, PCI DSS, CCPA, HIPAA etc. Learn more about Netwrix Endpoint Protector

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Prevent macOS malware, detect from Mac-specific threats, and monitor endpoints for compliance with Jamf Protect. Learn more about Jamf Protect
Jamf Protect provides a complete endpoint protection solution to maintain macOS compliance, prevent macOS malware, detect and remediate Mac specific threats with minimal impact to the enduser experience. With known customizable prevention, intuitive dashboards, real-time alerts, and extensive reporting all of which is designed only for Macs, you can be certain that your Mac fleet is well secured and you always have full visibility into your Apple computers. Learn more about Jamf Protect

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform.
Cloud-based Endpoint Protection rated #1 for ease-of-use to help businesses identify, analyze, and remediate threats on a unified platform. Learn more about Malwarebytes for Business

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
1Password helps businesses improve security, visibility and control over how their passwords and company data are protected.
Securing your business starts with 1Password. Trusted by over 100,000 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture. Learn more about 1Password

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers.
Endpoint protection solution providing security management and real-time data collection for desktops, virtual systems, and servers. Learn more about Trellix Endpoint Security

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Multilayered technology, machine learning, and human expertise combined with automated security management.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. Learn more about ESET Endpoint Security

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
VPN solution that provides businesses with remote access, policy management, threat protection, and more.
VPN solution that provides businesses with remote access, policy management, threat protection, and more. Learn more about Cisco AnyConnect

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Security is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network. Learn more about Symantec Endpoint Security

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
Simplified endpoint management for desktops, servers, and mobile laptops.
GoTo Central is a powerful, easy-to-use endpoint management solution enabling IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. Whether you have remote employees or endpoints scattered across the globe, GoTo Central provides IT organizations with the speed, flexibility, and insight needed to increase productivity, reduce IT costs, and mitigate risk. Learn more about LogMeIn Central

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
On-premise & web-based solution for businesses that helps manage hosts' identity, endpoint visibility & compliance, attacks, and more.
On-premise & web-based solution for businesses that helps manage hosts' identity, endpoint visibility & compliance, attacks, and more. Learn more about FortiClient

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Try a free Trial of WebTitan today, support included. Learn more about WebTitan

Features

  • Device Management
  • Activity Tracking
  • Application Security
  • Compliance Management
  • Encryption