Endpoint Security Solutions Directory

Below is a Endpoint Security Solutions Directory: vendors, tools and software solutions including a company overview, links to social media and contact information for the Top 25 Endpoint security providers. If you would like a printed version of this Endpoint Security Solutions Directory page including complete solutions profiles and a list of the top questions to ask in an RFP – Request for Proposal, click here for a Free PDF.

Endpoint Security Solutions Directory

Link to Bitdefender
Solutions Overview

Bitdefender’s GravityZone Security for Endpoints delivers centralized management and deployment under the umbrella of various virtualization vendors, cloud providers, servers, desktops, laptops, and mobile decides. It is a modular solution that supports licensing for what is obligatory for your business and a specific number of units.

Download this Directory and get our Endpoint Security Solutions Buyers Guide.

More Detail

Bitdefender’s GravityZone is Bitdefender’s enterprise security solution for medium to large organizations. It’s redesigned from the ground up with a fresh, but proven private cloud computing architecture that takes full advantage of virtualized infrastructures.

Contact

650 Castro St
Mountain View, CA
United States
+1 (800) 388-8062
www.bitdefender.com


Link to Carbon Black
Solutions Overview

Carbon Black software consistently records all endpoint activity making it easy to track potential security threats and determine root causes. Carbon Black offers custom API’s, giving IT teams the ability to integrate security capabilities from a variety of solutions.

Download this Directory and get our Free Endpoint Security Buyers Guide.

More Detail

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSSPs and enterprises to shift the balance of power back to security teams.

Contact

1100 Winter St
Waltham, MA
United States
+1 (617) 393-7400
carbonblack.com

Link to Check Point Software
Solutions Overview

Check Point’s solution prevents potential security threats, providing visibility into network worms through malware detection for signatures and behavioral analysis, which can help prevent significant damage before it occurs.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Since 1993, Check Point has provided protection against threats, reduced security complexity and lowered total cost of ownership. Since its inception, their pure focus has been on IT security and adapting to customers’ changing needs.

Contact

959 Skyway Rd
San Carlos, CA
United States
+1 (800) 429-4391
www.checkpoint.com

Link to Comodo
Solutions Overview

Founded in 1998, Comodo operates out of Clifton, New Jersey. Their endpoint security solutions provide a centrally managed, 7-layered suite protecting end-user devices and their applications against malware and other digital threats. System administrators can terminate suspicious network connections, force-close processes, stop malicious services, and uninstall applications directly.

Download this Directory and get our Free EndpointSecurity Solutions Buyers Guide.

More Detail

Building on its deep history in SSL certificates, antivirus and endpoint security leadership, and true containment technology, individuals and enterprises rely on Comodo’s proven solutions to authenticate, validate and secure their most critical information.

Contact

1255 Broad St
Clifton, NJ
United States
+1 (888) 266-6361
www.comodo.com

Link to CounterTack
Solutions Overview

CounterTack leverages big data and behavioral analytics with a next-generation endpoint security solution called Sentinel, that fuses efficient threat detection, data collection and correlation with Big Data technology to scale endpoint detection and response.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Built on Big Data architecture to counter endpoint threats at-scale and leveraging tamper-resistant collection for pure behavioral capture on enterprise endpoints. CounterTack dramatically reduces the impact of advanced threats in real-time and post-incident, giving teams an opportunity to defend the enterprise across the entire cyber kill chain.

Contact

100 5th Ave
Waltham, MA
United States
+1 (855) 893-5428
www.countertack.com

Link to CrowdStrike
Solutions Overview

California-based CrowdStrike’s endpoint solution, Falcon Host, offers visibility in real-time and detects attacks within your enterprise software. Falcon Host integrates into your current environment and enables your IT security team to detect and block suspicious activity to prevent damage to your business.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

The solution provides real-time visibility into adversary activity on every endpoint, and the lightweight falcon sensor immediately detects attacks and protects your data without having to rely on ‘sweeps and scans’ of the environment.

Contact

15440 Laguna Canyon Rd
Irvine, CA
United States
+1 (888) 512-8906
www.crowdstrike.com

Link to Cylance
Solutions Overview

Cylance offers proactive and preventative next generation anti-virus technology based on artificial intelligence, machine learning, and algorithmic science. Cylance’s signatureless AV provides an alternative to traditional, signature-based tech, and benefits from easy deployment and management.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Cylance’s award-winning product, CylancePROTECT®, quickly and accurately identifies what is safe and what is a threat, not just what is in a blacklist or whitelist. CylancePROTECT provides enterprise endpoint security without a cloud connection or frequent updates and uses a fraction of the system resources associated with legacy solutions.

Contact

8201 Von Karman Ave
Irvine, CA
United States
+1 (844) 295-2623
www.cylance.com

Link to Druva
Solutions Overview

Druva inSync is a unified data protection and information governance solution that delivers a single pane of glass for protecting and managing dispersed data across endpoints and cloud applications, ensuring that data is protected and governable by IT.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Druva inSync provides a single pane of glass for protecting, preserving and discovering information across endpoints and cloud applications – helping customers dramatically increase the availability and visibility of business-critical data while reducing costs, risk and complexity.

Contact

150 Mathilda Pl
Sunnyvale, CA
United States
+1 (800) 375-0160
www.druva.com

Link to FireEye
Solutions Overview

FireEye is renowned for having invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide, against the next generation of cyber attacks.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Every endpoint is a cyber security risk: a first point of attack and network vulnerability. An attacker only needs to breach one, but you have to protect them all. To protect those endpoints, and your network, FireEye offers a unified endpoint defense: the Secure Endpoint and Mobility solution.

Contact

601 McCarthy Blvd
Milpitas, CA
United States
+1 (408) 321-6300
www.fireeye.com

Link to Forcepoint
Solutions Overview

Forcepoint—located in Austin, Texas and a 20-year cybersecurity industry player—emphasizes cloud security in their endpoint protection platforms. They design their systems with remote employees and multiple endpoint connections in mind—essential considerations for the enterprise undergoing digital transformation or planning to do so.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

A key object of the Forcepoint Triton security platform is to minimize the time between compromise and remediation, known as “dwell time”, and to stop theft by focusing on insider threat protection, cloud data protection and network security.

Contact

10900-A Stonelake Blvd
Austin, TX
United States
+1 (800) 723-1166
www.forcepoint.com

Link to Ivanti
Solutions Overview

The result of a 2017 merger between Heat Software and LANDesk, Ivanti is headquartered just outside Salt Lake City in Utah. They seek to combine Heat’s cloud solutions with LANDESK’s IT systems management to deliver simplified service management processes, real-time visibility across services and infrastructure, and facilitate productive interactions in your business.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Ivanti’s solutions should appeal to small-to-midsized businesses without a dedicated IT team looking for easy deployment. With its visibility options and remote capabilities, it is ideal for mobile workforces or for data-transfer heavy industries. Ivanti is still using Heat’s fully automated software, which should be ideal for those looking for thoroughness in their operational endpoint security. Because of the recentness of the merger that formed it, Ivanti is new to the field and that should be a consideration in the selection process.

Contact

698 West 10000 South
South Jordan, UT
United States
+1 (888) 253-6201
www.ivanti.com

Link to Kaspersky Lab
Solutions Overview

Founded in the late 1990s, the now Switzerland-based Kaspersky Lab is renowned for their threat intelligence software and for their network of security experts located around the world. Their mission statement dedicates them to fighting cybercrime and to innovating new techniques to stopping attacks. They focus on internal innovations rather than on acquisitions.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

When businesses face an adversary with the skill, knowledge and determination to overcome the many existing security technologies, they need knowledge of possible attack vector details of the indicators of compromise, and the ability to distinguish normal operations from malicious activity.

Contact

500 Unicorn Park
Woburn, MA
United States
+1 (866) 328-5700
www.kaspersky.com

Link to LogMeIn Central
Solutions Overview

LogMeIn Central is a cloud-based endpoint management solution designed to enable IT professionals to effectively monitor, manage, and secure their endpoint infrastructure.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

The LogMeIn Central security portfolio includes anti-virus, patch management, proactive alerts, software inventory, and computer health monitoring, thereby providing a comprehensive package for enterprises struggling with perimeter security gaps or visibility issues.

Contact

320 Summer St
Boston, MA
United States
+1 (866) 478-1805
www.logmein.com/central

Link to McAfee
Solutions Overview

McAfee offers advanced endpoint protection for large enterprises that includes behavioral anti-malware, smart scanning, and dynamic whitelisting, in addition to essential antivirus, antispam, web security, firewall, and intrusion prevention for desktops and laptops.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

This proven enterprise and small business endpoint security solution delivers operational efficiencies and cost savings with the convenience of a single suite. It includes real-time anti-malware and antivirus protection.

Contact

2821 Mission College Blvd
Santa Clara, CA
United States
+1 (888) 847-8766
www.mcafee.com/

Link to Microsoft
Solutions Overview

Microsoft’s cloud-first approach provides an integrated set of solutions that are designed to work together from the ground up, avoiding the need for complicated integration efforts across point capabilities.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Given the ubiquity of PCs and Windows operating systems, implementation of Window’s Enterprise Mobility and Security will most likely prove straightforward and shouldn’t conflict with Microsoft applications. SMBs and large enterprises via PCs will find this easy to work with.

Contact

One Microsoft Way
Redmond, WA
United States
+1 (425) 882-8080
www.microsoft.com/

Link to Palo Alto Networks
Solutions Overview

Palo Alto’s Traps endpoint solution focuses on the attacker’s core techniques and when the attacker’s path becomes known, the program blocks advanced attacks originating from executables, data files or network-based exploits

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

As the next-generation security company, we are leading a new era in cybersecurity by safely enabling all applications and preventing advanced threats from achieving their objectives for tens of thousands of organizations around the world.

Contact

3000 Tannery Way
Santa Clara, CA
United States
+1 (866) 320-4788
www.paloaltonetworks.com/

Link to RSA
Solutions Overview

RSA ECAT offers an endpoint threat detection and response solution that exposes targeted, advanced malware, highlights suspicious activity for investigation, and instantly determines the scope of a compromise to help security teams stop advanced threats faster

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

When a network is at risk, analysts must be able to detect the issue quickly, and rapidly understand the type of attack along with the affected systems to understand the extent of malicious activity at the endpoints.

Contact

174 Middlesex Tpke
Bedford, MA
United States
+ 1 (781) 515-5000
www.rsa.com

Link to SentinelOne
Solutions Overview

SentinelOne uses predictive execution inspection to monitor endpoints and detect unknown threats. The solution offers real-time forensics to deliver investigative capabilities much like “sandboxing” during a breach.

Download this Directory and get our Endpoint Security Solutions Buyers Guide.

More Detail

SentinelOne is shaping the future of endpoint security by unifying prevention, detection and response in a single platform that uses machine learning and intelligent automation to defeat even the most advanced zero-day threats.

Contact

605 Fairchild Dr
Mountain View, CA
Unites States
+1 (855) 868-3733
www.sentinelone.com

Link to Sophos
Solutions Overview

Headquartered in the United Kingdom with offices around the globe, Sophos released Sophos Intercept X — a set of signatureless detection and prevention technologies designed to protect against endpoint attacks —in 2016. Intercept X targets exploits in applications and operating systems and provides specific countermeasures to ransomware.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

From malicious traffic detection integrated into the endpoint, to cloud-managed policies that follow users across devices and platforms, we’re redefining what it means to provide comprehensive enduser security.

Contact

3 Van de Gaaff Dr
Burlington, MA
United States
+1 (781) 494-5800
www.sophos.com/

Link to Symantec
Solutions Overview

Founded in 1982, veteran Symantec’s deep bench of endpoint security technologies spans a range of prevention, detection, and remediation capabilities. Cloud-based and shifting to a signatureless detection method, Symantec is regarded as a thorough anti-malware solution globally.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Advanced attacks are more complex and difficult to uncover than ever before. They exploit unknown vulnerabilities and are highly stealthy and persistent, using novel techniques to hide themselves while compromising critical systems and data. Symantec’s Threat Protection solutions block, detect, and quickly respond to all of today’s threats.

Contact

350 Ellis St
Mountain View CA
United States
+1 (650) 527-8000
www.symantec.com

Link to Trend Micro
Solutions Overview

Trend Micro endpoint security solutions ensure mobile and desktop protection against everything from traditional threats to the latest sophisticated targeted attacks.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Endpoint Security Solutions are part of the Trend Micro Smart Protection Suites. These interconnected, multi-layered security suites protect your users and their data regardless of the device they use, or where they are working.

Contact

225 E. John Carpenter Fwy
Irving, TX
United States
+1 (800) 864-6027
www.trendmicro.com/

Link to Webroot
Solutions Overview

Founded in 1997 and headquartered out of Broomfield, Colorado, Webroot’s EPP Solution— SecureAnywhere Business Endpoint Protection—utilizes behavioral analysis, machine learning, and contextual threat intelligence. It allows Webroot to protect enterprises’ networks while remaining lightweight and unobtrusive to business processes. Their solution provides multi-vector protection for all stages of endpoint attacks, mitigating long-term damage.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

By combining innovative SecureAnywhere file pattern and predictive behavior recognition technology with the almost limitless processing power of cloud computing, Webroot effectively stops malware and zero-day threats at the moment of attack.

Contact

385 Interlocken Crescent
Broomfield, CO
United States
+1 (800) 772-9383
www.webroot.com