Endpoint Security Solutions Directory

Below is a directory of Endpoint Security vendors, tools and software solutions including a company overview, links to social media and contact information for the Top 24 Endpoint security providers. If you would like a printed version of this page including complete solutions profiles and a list of the top questions to ask in an RFP – Request for Proposal, click here for a Free PDF.

Endpoint Security Solutions Directory

Endpoint Security Solutions Review - Bitdefender
Solutions Overview

Bitdefender’s GravityZone Security for Endpoints delivers centralized management and deployment under the umbrella of various virtualization vendors, cloud providers, servers, desktops, laptops, and mobile decides. It is a modular solution that supports licensing for what is obligatory for your business and a specific number of units.

Download this Directory and get our Endpoint Security Solutions Buyers Guide.

From the Company

“Bitdefender’s GravityZone is Bitdefender’s enterprise security solution for medium to large organizations. It’s redesigned from the ground up with a fresh, but proven private cloud computing architecture that takes full advantage of virtualized infrastructures.”

Contact

Bitdefender, LLC
PO Box 667588
Pompano Beach, Florida
United States
+1 (954) 776-6262
www.bitdefender.com

Social

@bitdefenderBitdefender on LinkedInBitdefender on FacebookBitdefender on YouTube


Endpoint Security Solutions Review - Carbon Black
Solutions Overview

Carbon Black software consistently records all endpoint activity making it easy to track potential security threats and determine root causes. Carbon Black offers custom API’s, giving IT teams the ability to integrate security capabilities from a variety of solutions.

Download this Directory and get our Free Endpoint Security Buyers Guide.

From the Company

“Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSSPs and enterprises to shift the balance of power back to security teams.”

Contact

Carbon Black Inc.
1100 Winter street
Waltham, MA 02451
United States
+1 (617) 393-7400
carbonblack.com

Social

@carbonblack_incCarbon Black on LinkedInCarbon Black on FacebookCarbon Black on YouTube

Endpoint Security Solutions Review - Check Point Software
Solutions Overview
Check Point’s solution prevents potential security threats, providing visibility into network worms through malware detection for signatures and behavioral analysis, which can help prevent significant damage before it occurs.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“Since 1993, Check Point has provided protection against threats, reduced security complexity and lowered total cost of ownership. Since its inception, their pure focus has been on IT security and adapting to customers’ changing needs.”

Contact

Check Point Software Technologies
959 Skyway Road Suite 300
San Carlos, CA 94070
+1 (800) 429-4391
www.checkpoint.com

Social

@checkpointswCheck Point Software on LinkedInCheck Point Software on FacebookCheck Point Software on YouTube

Endpoint Security Solutions Review - Code42 Software
Solutions Overview
Code 42 protects users from ‘Datastrophe” with enterprise grade security, desktop OS protection, data storage in private, public or hybrid cloud, and secure mobile file access.

Download this Directory along with our Free Endpoint Security Solutions Buyers Guide.

From the Company

“Our platform enables IT security and business teams to limit risk meet data privacy regulations and recover from data loss, no matter the cause. We’re best known for CrashPlan, an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform.”

Contact

Code42 Inc.
1 Main St. SE #400
Minneapolis, MN 55414
United States
+1 (844)-333-4242
www.code42.com

Social

@code42Code42 on LinkedInCode42 on FacebookCode42 on YouTube

Endpoint Security Solutions Review - Comodo
Solutions Overview

Comodo’s Endpoint Security Manager provides centralized management of a 7-layered security suite that protects endpoints and their applications against malware and threats.

Download this Directory and get our Free EndpointSecurity Solutions Buyers Guide.

From the Company

“Building on its deep history in SSL certificates, antivirus and endpoint security leadership, and true containment technology, individuals and enterprises rely on Comodo’s proven solutions to authenticate, validate and secure their most critical information.”

Contact

Comodo Group, Inc.
1255 Broad Street
Clifton, NJ 07013
United States
+1 (888) 266-6361
www.comodo.com

Social

@comododesktopComodo on LinkedInComodo on FacebookComodo on YouTube

Endpoint Security Solutions Review - CounterTack
Solutions Overview

CounterTack leverages big data and behavioral analytics with a next-generation endpoint security solution called Sentinel, that fuses efficient threat detection, data collection and correlation with Big Data technology to scale endpoint detection and response.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“Built on Big Data architecture to counter endpoint threats at-scale and leveraging tamper-resistant collection for pure behavioral capture on enterprise endpoints. CounterTack dramatically reduces the impact of advanced threats in real-time and post-incident, giving teams an opportunity to defend the enterprise across the entire cyber kill chain.”

Contact

CounterTack, Inc.
100 Fifth Ave
Waltham, MA 02451
+1(855)-893-5428
www.countertack.com

Social

@CounterTackCounterTack on LinkedInCounterTack on FacebookCounterTack on YouTube

Endpoint Security Solutions Review - CrowdStrike
Solutions Overview

CrowdStrike’s solution integrates into your current environment and enables your IT team to detect and block suspicious activity in order to prevent damage to your business.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“The solution provides real-time visibility into adversary activity on every endpoint, and the lightweight falcon sensor immediately detects attacks and protects your data without having to rely on ‘sweeps and scans’ of the environment.”

Contact

CrowdStrike
15440 Laguna Canyon Road
Irvine, CA 92618
United States
+1 (888) 512-8906
www.crowdstrike.com

Social

@CrowdStrikeCrowdStrike on LinkedInCrowdStrike on FacebookCrowdStrike on YouTube

Endpoint Security Solutions Review - ESET
Solutions Overview

ESET provides an endpoint security solution that detects and blocks trojans, adware, viruses, worms and other forms of malware, including emerging threats. The software includes a firewall, which can help block malicious traffic and prevent the accidental spread of malware.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“ESET provides proactive threat protection and develops software that reacts immediately to new and merging threats. They also ensure protection through two methods of detection (comparing known virus signatures and using heuristics to anticipate new ones) as opposed to one.”

Contact

ESET LLC.,
Aupark Tower, 16th Floor
Einsteinova 24
851 01 Bratislava
Slovak Republic
+421 (2) 32244
www.eset.com

Social

@ESETESET on LinkedInESET on FacebookESET on YouTube

Endpoint Security Solutions Review - F-Secure
Solutions Overview

Client Security offers proactive, heuristic protection against the latest emerging threats, complete with automated software updates, and continuous endpoint protection against known vulnerabilities

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“F-Secure Client Security is award-winning endpoint protection for PCs running the Windows® operating system. It’s much more than just Anti-Virus. Client Security is proactive, heuristic protection against the latest emerging threats. Complete with automated software updates, Client Security provides the ultimate endpoint protection against known vulnerabilities.”

Contact

Tammasaarenkatu 7
P.O. Box 24
00181 Helsinki
Finland
+ 09 8862 5050
www.f-secure.com

Social

@Fsecuref-secure on LinkedinF-Secure on FacebookF-Secure on YouTube

Endpoint Security Solutions Review - FireEye
Solutions Overview

FireEye is renowned for having invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide, against the next generation of cyber attacks.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“Every endpoint is a cyber security risk: a first point of attack and network vulnerability. An attacker only needs to breach one, but you have to protect them all. To protect those endpoints, and your network, FireEye offers a unified endpoint defense: the Secure Endpoint and Mobility solution.”

Contact

FireEye Inc.
1440 McCarthy Blvd.
Milpitas, CA 95035
United States
+1-(408) 321-6300
www.fireeye.com

Social

@FireeyeFireeye on LinkedinFireEye on Facebook FireEye on YouTube

Endpoint Security Solutions Review - Forcepoint
Solutions Overview

Users are prevented from accessing dangerous URLs, and administrators control access to data by blocking, removing, quarantining, auditing or encrypting data.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“A key object of the Forcepoint Triton security platform is to minimize the time between compromise and remediation, known as “dwell time”, and to stop theft by focusing on insider threat protection, cloud data protection and network security..”

Contact

ForcePoint LLC.
10900-A Stonelake Blvd.
Quarry Oaks 1, Ste. 350
Austin, Texas
United States
+1 (800) 723-1166
www.forcepoint.com

Social

@forcepointsecForcePoint on Linkedin ForcePoint on FacebookForcePoint on YouTube

Endpoint Security Solutions Review - Heat Software
Solutions Overview

Short for, Helpdesk Expert Automation Tool, Heat Software now delivers flexible and scalable hardware security modules and user environment management solutions.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“IT needs a comprehensive endpoint management solution that helps them manage the infrastructure in a quick, flexible, and reliable way.”

Contact

HEAT Software, Inc.
490 N. McCarthy Blvd., Suite 100
Milpitas, CA
United States
+1 (800) 776 7889
www.heatsoftware.com/

Social

@HEAT_SoftwareHEAT software on LinkedinHEAT Software on FacebookHEAT Software on YouTube


Endpoint Security Solutions Review - Kaspersky Lab
Solutions Overview

The company’s Anti Targeted Attack Platform is a solution that enables businesses to detect attacks and other malicious actions by monitoring web, e-mail and network activity attacks at any stage

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“When businesses face an adversary with the skill, knowledge and determination to overcome the many existing security technologies, they need knowledge of possible attack vector details of the indicators of compromise, and the ability to distinguish normal operations from malicious activity.”

Contact

Kaspersky Lab
500 Unicorn Park
Woburn, MA 01801
United States
+1 866-328-5700
www.kaspersky.com

Social

@kasperskyKaspersky on LinkedinKaspersky on FacebookKaspersky on YouTube

Endpoint Security Solutions Review -LANDesk
Solutions Overview

LANDesk’s intuitive console integrates several security layers and enforces security policies on users and devices in the private or public cloud.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“LANDESK Security Suite boosts compliance with industry standards, ensures your user environment is stable and secure, and integrates with systems management to further reduce risk and extend protection and control.”

Contact

LANDesk
698 West 10000 South Suite 500
South Jordan, Utah
United States
+1 (801) 208-1500
www.landesk.com

Social

@landeskLANDesk on LinkedinLANDesk on FacebookLANDesk on YouTube

endpoint Security Solutions Review - Intel Security (McAfee)
Solutions Overview

McAfee offers advanced endpoint protection for large enterprises that includes behavioral anti-malware, smart scanning, and dynamic whitelisting, in addition to essential antivirus, antispam, web security, firewall, and intrusion prevention for desktops and laptops.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“This proven enterprise and small business endpoint security solution delivers operational efficiencies and cost savings with the convenience of a single suite. It includes real-time anti-malware and antivirus protection.”

Contact

McAfee Inc.
2821 Mission College Blvd.
Santa Clara, CA 95054
United States
+1 (877)-852-3500
www.mcafee.com/

Social

@intelsec_bizIntel Security on LinkedinIntel Security on FacebookIntel Security on YouTube

Endpoint Security Solutions Review - Microsoft
Solutions Overview

Microsoft’s cloud-first approach provides an integrated set of solutions that are designed to work together from the ground up, avoiding the need for complicated integration efforts across point capabilities.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“Our innovative new technology, Microsoft Advanced Threat Analytics is designed to help you identify advanced persistent threats in your organization before they cause damage.”

Contact

Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052
United States
+1 (800) 642-7676
www.microsoft.com/

Social

@microsoftmicrosoft on LinkedinMicrosoft on FacebookMicrosoft on YouTube

Business Intelligence Solutions Review - Palo Alto
Solutions Overview

Palo Alto’s Traps endpoint solution focuses on the attacker’s core techniques and when the attacker’s path becomes known, the program blocks advanced attacks originating from executables, data files or network-based exploits

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“As the next-generation security company, we are leading a new era in cybersecurity by safely enabling all applications and preventing advanced threats from achieving their objectives for tens of thousands of organizations around the world.”

Contact

Palo Alto Networks
4401 Great America Parkway
Santa Clara, CA 95054
United States
+1 (866) 320-4788
www.mendix.com/

Social

@PaloAltoNtwksPalo Alto on LinkedinPalo Alto on FacebookPalo Alto on YouTube

Endpoint Security Solutions Review - Panda Security
Solutions Overview

Panda Security´s portfolio of solutions include SaaS based protection of endpoints, email and web traffic, cloud-based systems management, as well as an integrated on-premises endpoint protection platform

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“For more than 20 years, Panda Security has achieved major technological milestones in the global security industry. Today Panda is a solid, internationally acclaimed company with a direct presence in 80 countries.”

Contact

Panda Security
Gran Vía Don Diego Lopez de Haro 4.
Bilbao, Vizcaya 48001
Spain
+34 94 425 11 00

www.pandasecurity.com/

Social

@PandaSecurityPanda Security on LinkedinPanda Security on FacebookPanda Security on YouTube

Endpoint Security Solutions Review - RSA
Solutions Overview

RSA ECAT offers an endpoint threat detection and response solution that exposes targeted, advanced malware, highlights suspicious activity for investigation, and instantly determines the scope of a compromise to help security teams stop advanced threats faster

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“When a network is at risk, analysts must be able to detect the issue quickly, and rapidly understand the type of attack along with the affected systems to understand the extent of malicious activity at the endpoints.”

Contact

RSA ECAT
176 South Street
Hopkinton, MA 01748
508-435-1000
+1 (508) 435-1000

www.rsa.com/ECAT

Social

@RSAsecurityRSA on LinkedinRSA on FacebookRSA on YouTube

Endpoint Security Solutions Review - SentinelOne
Solutions Overview

SentinelOne uses predictive execution inspection to monitor endpoints and detect unknown threats. The solution offers real-time forensics to deliver investigative capabilities much like “sandboxing” during a breach.

Download this Directory and get our Endpoint Security Solutions Buyers Guide.

From the Company

“SentinelOne is shaping the future of endpoint security by unifying prevention, detection and response in a single platform that uses machine learning and intelligent automation to defeat even the most advanced zero-day threats.”

Contact

SentinelOne Inc.
2513 E. Charleston Rd (Suite 100)
Palo Alto CA, 94043
United States
+1 (855) 868 3733
www.sentinelone.com

Social

@sentinelsecSentinelOne on LinkedinSentinelOne on FacebookSentinelOne on YouTube

Endpoint Security Solutions Review - Sophos
Solutions Overview

Sophos develops products for communication, endpoint protection, encryption, network security, email/mobile security and unified threat management

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“From malicious traffic detection integrated into the endpoint, to cloud-managed policies that follow users across devices and platforms, we’re redefining what it means to provide comprehensive enduser security.”

Contact

Sophos Group, PLC.
3 Van de Graaff Drive
2nd Floor
Burlington, MA 01803
United States
+1 (781) 494-5800
www.sophos.com/

Social

@sophos_newsSophos on LinkedinSophos on FacebookSophos on YouTube

Endpoint Security Solutions Review - OutSystems
Solutions Overview

Symantec offers a cloud-based, endpoint protection solution that monitors your computer for misbehaving programs and threats.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“Advanced attacks are more complex and difficult to uncover than ever before. They exploit unknown vulnerabilities and are highly stealthy and persistent, using novel techniques to hide themselves while compromising critical systems and data. Symantec’s Threat Protection solutions block, detect, and quickly respond to all of today’s threats.”

Contact

Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
United States
+1 (650) 527-8000
www.symantec.com

Social

@symantecSymantec on LinkedinSymantec on FacebookSymantec on YouTube

Endpoint Security Solutions Review - Trend Micro
Solutions Overview

Trend Micro endpoint security solutions ensure mobile and desktop protection against everything from traditional threats to the latest sophisticated targeted attacks.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“Endpoint Security Solutions are part of the Trend Micro Smart Protection Suites. These interconnected, multi-layered security suites protect your users and their data regardless of the device they use, or where they are working.”

Contact

Trend Micro Incorporated
225 E. John Carpenter Freeway, Suite 1500
Irving, Texas 75062 U.S.A.
+1 (817) 569-8900
www.trendmicro.com/

Social

@TrendMicro Trend Micro on LinkedinTrend Micro on FacebookTrend Micro on YouTube

Endpoint Security Solutions Review - Trend Micro
Solutions Overview

Webroot recently announced its BrightCloud Security Services, a new portfolio of services for enterprise-class businesses, including integration for Next-Generation Firewalls and SIEMs.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

From the Company

“By combining innovative SecureAnywhere file pattern and predictive behavior recognition technology with the almost limitless processing power of cloud computing, Webroot effectively stops malware and zero-day threats at the moment of attack.”

Contact

Webroot, Inc.
385 Interlocken Crescent #800
Broomfield, CO 80021
United States
+1 (800) 772-9383
www.webroot.com

Social

@WebrootWebroot on LinkedinWebroot on FacebookWebroot on YouTube