Endpoint Security Solutions Directory

Below is an Endpoint Security Solutions Directory: vendors, tools, and software solutions including a company overview, links to social media, and contact information for the Top Endpoint Security providers. If you would like a printed version of this Endpoint Security Solutions Directory page including complete solutions profiles and a list of the top questions to ask in an RFP – Request for Proposal, click here for a Free PDF.

Endpoint Security Solutions Directory

Link to Bitdefender
Solutions Overview

Information security company Bitdefender’s GravityZone Enterprise Security is a modular solution delivering centralized management and deployment for a range of endpoints: cloud providers, servers, desktops, laptops, and mobile devices. Updates to the endpoint security suite emphasize protecting antiransomware attacks and anti-exploit technology. Recently released products include GravityZone Ultra Suite. Additionally, Bitdefender continues to innovate their cloud workload security and their browser isolation tools and capabilities.

Download this Directory and get our Endpoint Security Solutions Buyers Guide.

More Detail

Bitdefender is a good choice for enterprises, small and large, valuing malware detection accuracy, performance, and full support for data center and cloud workloads from a single solution provider. The GravityZone Ultra solution includes an integrated EDR platform and a monitored EDR solution. It appeared in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms as a Niche Player; additionally, it was named a Top Player in Endpoint Security by analyst company Radicati, and a Strong Performer in the Forrester Wave for EDR 2020.

Contact

650 Castro St
Mountain View, CA
United States
+1 (800) 388-8062
www.bitdefender.com



Link to cylance
Solutions Overview

Cylance built its reputation on the back of proactive and preventive antivirus technology based on proprietary artificial intelligence, machine learning, and algorithmic science. Cylance was founded by a team of recognized and respected security industry professionals and scientists with the goal to “redefine the endpoint standard of protection by preventing threats from ever executing.” Acquired by Blackberry in 2018, in 2019 they expanded CylanceProtect to mobile devices. In fact, Blackberry has pushed Cylance to improve its unified endpoint management capabilities.

Download this Directory and get our Free Endpoint Security Buyers Guide.

More Detail

Blackberry Cylance’s signatureless anti-malware provides an alternative to traditional, signature-based technology. It benefits from easy deployment and management, low-performance impact, and high detection rates against new threat variants. The company is a good pick for organizations of all sizes looking to shore-up its existing defenses, or for an alternative to traditional anti-malware. BlackBerry Cylance is a Strong Performer by Forrester in its Cybersecurity Incident Response Forrester Wave report and appeared in The Forrester Wave: Enterprise Detection and Response, Q1 2020.

Contact

400 Spectrum Center Dr
Irvine, CA
United States
+1 (888) 802-9358
www.cylance.com



Link to broadcom
Solutions Overview

Broadcom’s Symantec Cyber Security offers a deep bench of endpoint security technologies spanning a range of prevention, detection, and remediation capabilities. Cloud-based, Broadcom is regarded as a thorough anti-malware solution globally. Prior to its acquisition in 2019, Symantec announced a new Managed Endpoint Detection and Response solution, and they have been recognized as a Leader in Data Security Portfolio Vendors by the Forrester Wave. In its new form, it focuses on emerging and evolving threats.

Download this Directory and get our Free Endpoint Security Buyers Guide.

More Detail

Broadcom continues to receive high industry praise; they were named to the Gartner Magic Quadrant in 2021 as a Visionary for its improved EDR capability with better visualization. Additionally, it received a Strong Performer position in the Forrester Wave for Email Security in 2021. It’s solution is well-regarded even after the acquisition of Symantec, and Broadcom is clearly investing heavily to fortify and improve its security provisions.

Contact

1320 Ridder Park Dr
San Jose, California
United States
+1 (408) 433-8000
www.broadcom.com



Link to Check Point Software
Solutions Overview

California-based Check Point Software provides an endpoint security solution that combines data and network security with threat prevention technologies, including remote access VPN for both Windows and Mac software. Check Point’s Sandblast Zero Day Attack Protection prevents potential security threats at the initial stages, which can help prevent significant damage before it occurs. Check Point also offers anti-bot technology to block command and control technologies and a managed security service option.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Check Point is ideal for SMBs without a dedicated IT department with its offer of a fully managed endpoint security service—Check Point will handle all endpoint security for clients. This feature is also ideal for companies looking to outsource its security. Check Point’s tools are easy-to-use and functional. Check Point appeared in the 2019 EPP Gartner Magic Quadrant as a Niche Player and the Forrester Wave for Endpoint Security Suites as a Leader.

Contact

959 Skyway Rd
San Carlos, CA
United States
+1 (800) 429-4391
www.checkpoint.com



Link to Comodo
Solutions Overview

Comodo’s endpoint security solutions provide a centrally managed, 7-layered suite protecting end user devices and their applications against malware and other digital threats. System administrators can terminate suspicious network connections, force-close processes, stop malicious services, and uninstall applications directly. Enterprise administrators can also resolve processes causing CPU or RAM saturation, quickly establishing the largest files on the endpoint’s hard-drive and selectively deleting them if necessary.

Download this Directory and get our Free EndpointSecurity Solutions Buyers Guide.

More Detail

If you or your IT security team are seeking a default-deny approach to their endpoint protection without the need for manual approval, Comodo might prove a good fit. Comodo’s features vary based on operating system; its Windows protection is perfect for small businesses or mid-sized businesses, as its hands-off style will help overwhelmed IT teams. Its quarterly Global Threat Reports place them at the forefront of endpoint security threat intelligence.

Contact

1255 Broad St
Clifton, NJ
United States
+1 (888) 266-6361
www.comodo.com



Link to crowdstrike
Solutions Overview

CrowdStrike Falcon Host offers visibility in real-time and detects attacks within your enterprise software. Falcon Host integrates into your current environment and enables your IT security team to detect and block suspicious activity to prevent damage to your business. It covers Windows desktop and servers as well as Mac computers and combines EDR and anti-malware into a single agent. In 2020, CrowdStrike released enhancement to its platform’s visibility, detection and response capabilities across Windows, macOS and Linux operating systems and new customization capabilities.

Download this Directory and get our Free EndpointSecurity Solutions Buyers Guide.

More Detail

Most organizations will find Crowdstrike’s features beneficial, especially with the ability to combine EDR and antimalware in a single agent. It also offers a managed threat hunting service for those concerned about ongoing issues and unable to divert IT resources to them. CrowdStrike offers a large degree of customization in its security options and parameters. The 2019 Gartner EPP Magic Quadrant and the The Forrester Wave: Enterprise Detection and Response, Q1 2020 recognized CrowdStrike as a Leader. Also, it appeared in the Gartner Peer Insights Customers’ Choice for EDR 2020.

Contact

15440 Laguna Canyon Rd
Irvine, CA
United States
+1 (888) 512-8906
www.crowdstrike.com



Link to cynet
Solutions Overview

Cynet 360 is the world’s first Autonomous Breach Protection platform that natively integrates XDR attack prevention and detection capabilities (including NGAV, EDR, Deception and more) with automated investigation and remediation, via a single lightweight agent with zero operational effort. Cynet 360 technology is complemented by a 24/7 MDR service free of charge, placing end to end breach protection within reach for any organization regardless of its security team size and skill.

Download this Directory and get our Free EndpointSecurity Solutions Buyers Guide.

More Detail

By natively bringing together all the security technologies needed to protect the internal environment of organization from breaches into a single, easy to deploy and simple to use platform, automating the manual process of investigation and remediation of threats, and providing a proactive MDR service that monitors customers’ environments and assists them 24/7 at no cost, Cynet enables even the smallest security teams to get complete security for their internal environment.

Contact

17 State St
New York NY
United States
www.cynet.com



Link to druva
Solutions Overview

Druva inSync is a unified data protection and information governance solution that delivers a single pane of glass for protecting and managing dispersed data across endpoints and cloud applications, ensuring that data is protected and governable by IT. With inSync, customers can dramatically increase the availability and visibility of business-critical data, while reducing costs, risk and complexity. It combines SaaS application and endpoint backup to protect end-user data and can allow for the provisioning of data protection.

Download this Directory and get our Free EndpointSecurity Solutions Buyers Guide.

More Detail

Druva’s inSync offers a unique mixture of endpoint security, backup, and identity governance features, representing a cost-effective endpoint solution for complex data infrastructures. Druva offers a pay-as-you-go pricing model and is a good fit for small to mid-sized enterprises. Customer reviews widely praise Druva, with only a smattering of concerns about updates and visibility on certain platforms.

Contact

150 Mathilda Pl
Sunnyvale, CA
United States
+1 (800) 375-0160
www.druva.com



Link to fireeye
Solutions Overview

FireEye utilizes a purpose-built, virtual machine-based security platform providing real-time threat protection to enterprises. FireEye incorporates firewalls, IPS, antivirus, and gateways as a means of supplementing signature-based detection methods. The FireEye platform uses a virtual execution engine with threat intelligence to expose and obstruct cyber-attacks in real time. In 2019, they announced the availability of the FireEye Cyber Physical Threat Intelligence subscription service which provides context, data and actionable analysis on threats.

Download this Directory and get our Free EndpointSecurity Solutions Buyers Guide.

More Detail

FireEye offers cybersecurity solution architecture with a wide range of capabilities to help security teams detect, analyze, and protect against the advanced threats targeting enterprises today. Their solution is accommodating to businesses of all sizes, offering specially tailored solutions for small-and-medium sized businesses. FireEye as a Managed Service means small-and-mid-sized businesses could even outsource many of their IT security issues to FireEye, saving on HR and payroll costs—a service many large organizations might equally enjoy given the cybersecurity staffing crisis.

Contact

601 McCarthy Blvd
Milpitas, CA
United States
+1 (408) 321-6300
www.fireeye.com



Link to GoSecure
Solutions Overview

GoSecure leverages big data and behavioral analytics with a next-generation endpoint security solution called GoSecure EDR. Obviously, this uses EDR, machine learning, and behavioral analysis to recognize threat context and increase endpoint visibility. This allows their solution to catch threats missed by legacy signature-based detection methods. GoSecure software distinguishes between unknown and known threats via signatureless scanning and responses to both proportionally so that malware diversion tactics will not fool it.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

GoSecure is best suited to larger enterprises with dedicated IT departments. These larger IT security teams can make the most of the depth the GoSecure products offer; GoSecure emphasizes deep threat knowledge in their products and services. GoSecure can provide comprehensive anti-malware to mid-sized and large corporations and integrates well other cybersecurity solutions. Its innovations in Next Generation Antivirus are notable.

Contact

100 5th Ave
Waltham, MA
United States
+1 (855) 893-5428
www.gosecure.net



Link to Ivanti
Solutions Overview

Ivanti, headquartered just outside Salt Lake City, combines the technologies of Heat Software and LANDesk. More specifically, Ivanti seeks to combine Heat’s cloud solutions with LANDESK’s IT systems management to deliver simplified service management processes, real-time visibility across enterprise services and infrastructure, and facilitate productive interactions in your business. Its solution can also implement application control for all your endpoints that does not disrupt users in their work. Its solutions thus balance endpoint security with business process facilitation.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Ivanti’s solutions should appeal to small-to-midsize businesses without a dedicated IT team looking for easy deployment and maintenance. With its visibility options and remote capabilities, it is ideal for mobile workforces or for data-transfer heavy industries. Ivanti is still using Heat’s fully automated software, which should be ideal for those looking for thoroughness in their operational endpoint security. In 2020, Ivanti acquired Mobileiron and Pulse Secure.

Contact

698 West 10000 South
South Jordan, UT
United States
+1 (888) 253-6201
www.ivanti.com



Link to Kaspersky Lab
Solutions Overview

Kaspersky is renowned for its threat intelligence software and for their network of security experts located around the world. Its mission statement dedicates them to fighting cybercrime and to innovating new techniques to stopping attacks. It focus on internal innovations rather than on acquisitions. They possess an industry reputation of accurate malware detection and management for the layperson. Kaspersky appeared in the 2019 Magic Quadrant for Endpoint Protection Platforms as a Visionary, and the Forrester Wave for Endpoint Security Suites as a Strong Performer.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Kaspersky’s products are well-regarded for their simple deployment and the thoroughness of its detection capabilities. Kaspersky offers a range of solutions and products for SMBs and large enterprises alike. The endpoint security vendor is well-known for their focus on internal innovations over external acquisitions. Given previous controversies surrounding Kaspersky, enterprises may wish to do additional research before selecting it as their solution.

Contact

500 Unicorn Park
Woburn, MA
United States
+1 (866) 328-5700
www.kaspersky.com



Link to LogMeIn Central
Solutions Overview

LogMeIn Central is a cloud-based endpoint management solution designed to enable IT professionals to effectively monitor, manage, and secure their endpoint infrastructure. Their expertise in remote technologies supports enterprises with remote employees or endpoints scattered across the globe, allowing for centralized management. In addition, LogMeIn Central provides IT organizations with actionable security and workflow insights which can help increase productivity, reduce IT costs, and mitigate risk. Central also allows security teams to monitor the health of each LogMeIn host.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

The LogMeIn Central security portfolio includes anti-virus, patch management, proactive alerts, software inventory, and computer health monitoring, thereby providing a comprehensive package for enterprises struggling with perimeter security gaps or visibility issues. The solution is designed to automate manual processes and optimize resource allocation, both of which will benefit enterprises dealing with security staff shortages and limited security resources. Central emphasizes endpoint security as an integrated business process, which may be of interest to enterprises looking for a smooth deployment and adoption experience.

Contact

320 Summer St
Boston, MA
United States
+1 (866) 478-1805
www.logmein.com/central



Link to McAfee
Solutions Overview

First founded in 1987, the Santa Clara based security giant promotes their McAfee Endpoint Security. With this platform they are signalling a transition away from the signature-based malware detection they helped innovate to one oriented to more machine learning, behavioral analysis detection and prevention endpoint security methods with low user impact. McAfee offers machine learning behavioral analysis, real-time scanning, cloud analytics, application containment, and automated EDR. McAfee’s research has uncovered recent surges in malware attacks and ransomware.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

McAfee is a well-respected name in security, and their interface should be recognizable to most professionals even outside the IT fields. As such, SMBs will find it easy to transition to and deploy McAfee. They have labored to put themselves at the forefront of the endpoint security marketplace, resulting in them being named as a Visionary in the Gartner Magic Quadrant for Endpoint Protection Platforms and a Strong Performer in the Forrester Wave for Endpoint Security Suites. In early 2020, McAfee acquired Light Point Security for an undisclosed amount.

Contact

2821 Mission College Blvd
Santa Clara, CA
United States
+1 (888) 847-8766
www.mcafee.com/



Link to Microsoft
Solutions Overview

Technology giant Microsoft should need no introduction to either the layperson or the technical expert. In addition to their PCs and operating systems, Microsoft also offer the Window’s Enterprise Mobility and Security, a software endpoint security suite. This offers an integrated set of solutions designed to work with Microsoft’s operating system smoothly without needing to interrupt workflow with a complex deployment. It even provides a cloud-based management system. Microsoft has received high customer approval rates, as evidenced by their position as Leader in the 2019 Magic Quadrant for EPP.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Given the ubiquity of PCs and Windows operating systems, implementation of Window’s Enterprise Mobility and Security will most likely prove straightforward. SMBs and large enterprises via PCs will find this easy to work with. Microsoft is no longer reliant on signature-based detection as it was when it first stepped onto the endpoint security scene. It appeared in Gartner and Forrester Wave reports in 2019 and the 2020 Gartner Peer Insights Customers’ Choice for EDR.

Contact

One Microsoft Way
Redmond, WA
United States
+1 (425) 882-8080
www.microsoft.com/



Link to Palo Alto Networks
Solutions Overview

Based in Santa Clara, California and founded in 2005, Palo Alto Networks has combined network, cloud and endpoint security into one integrated platform that delivers automated prevention against cyberattacks. Palo Alto’s Traps endpoint solution focuses on the attacker’s core techniques and when the attacker’s path becomes known, the program blocks advanced attacks originating from executables, data files or network-based exploits. It is multimethod and completes a platform centric approach to prevention.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Palo Alto’s Traps requires a Wi-Fi connection to the Palo Alto Network to operate at its full capacity. However, with enterprises undergoing digital transformations, this is not a true limitation. It may be best suited as part of a hybrid security system for those with Windows security holes in their current platforms. In 2020, Palo Alto Networks appeared in The Forrester Wave: Enterprise Detection and Response, Q1 2020 and The Forrester Wave: Enterprise Firewalls, Q3 2020.

Contact

3000 Tannery Way
Santa Clara, CA
United States
+1 (866) 320-4788
www.paloaltonetworks.com/



Link to RSA
Solutions Overview

Massachusetts based RSA, a division of Dell Technologies since 2016, offers RSA NetWitness Endpoint as their threat detection and response solution. The RSA NetWitness Endpoint exposes targeted, advanced malware, highlights suspicious activity for investigation, and instantly determines the scope of a compromise to help security teams stop advanced threats faster. NetWitness Endpoint’s unique behavioral-based detection identifies unknown, zero-day malware and compromises missed by traditional signature-based detection methods.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

RSA offers lots of solutions, which means that some SMBs and larger enterprises might find them an all-in-one solution for their endpoint security needs. IT professionals will find RSA functional and straightforward; it will provide good protection for all endpoints on your network. RSA’s threat detection capabilities are more than capable of fulfilling enterprise needs, given the solution provider’s SIEM prowess. RSA delivers a clear endpoint security product, ideal for enterprises looking for a broad but reliable solution. In early 2020, RSA was acquired by Symphony Technology Group.

Contact

174 Middlesex Tpke
Bedford, MA
United States
+ 1 (781) 515-5000
www.rsa.com



Link to SentinelOne
Solutions Overview

Founded in 2012 in Mountain View, California, SentinelOne provides behavior based anti-malware, anti-exploit and EDR capabilities as an integrated endpoint solution; in other words, it incorporates prevention, detection and remediation capabilities in one program, which can be deployed on-premises or via the cloud. SentinelOne offers real-time forensics to deliver investigative capabilities and multiple behavior detection methods. It can predict malicious behavior across multiple threat vectors and close vulnerability gaps.

Download this Directory and get our Endpoint Security Solutions Buyers Guide.

More Detail

SentinelOne aims to block malicious activity during the initial download phases rather than serve as a complete solution. SentinelOne is a good prospect to replace or augment existing EPP solutions with a solution with comprehensive EDR capabilities. It might be a good choice for enterprises looking for a solution and are willing to invest in future updates or new programs. SentinelOne appeared in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms as a Visionary. Recently, SentinelOne raised $200 million in Series E funding.

Contact

605 Fairchild Dr
Mountain View, CA
Unites States
+1 (855) 868-3733
www.sentinelone.com



Link to Sophos
Solutions Overview

Headquartered in the United Kingdom with offices around the globe, Sophos released Sophos Intercept X — a set of signatureless detection and prevention technologies designed to protect against endpoint attacks —in 2016. Intercept X targets exploits in applications and operating systems and provides specific countermeasures to ransomware. Since the release, Sophos has continued to be a enterprise-driven endpoint protection solution globally. In 2019, Sophos acquired Rook Security for their Managed Detection and Response capabilities.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Sophos is specifically targeted to enterprises rather than SMBs. Sophos can provide a cloud-based administration, unified endpoint and gateway integration and protection against next-generation threats. Therefore enterprises will find Sophos ideal for their full EPP or supplemental needs. They received the position of Leader in the Magic Quadrant for EPP and in the Forrester Wave for ESS. Also, they are a Strong Performer in Email Security in the relevant Forrester Wave report. Recently, Sophos launched Intercept X for Mobile.

Contact

3 Van de Gaaff Dr
Burlington, MA
United States
+1 (781) 494-5800
www.sophos.com/



Link to Trend Micro
Solutions Overview

Trend Micro, Inc.’s endpoint security solutions ensure mobile and desktop protection against everything from traditional threats to the latest sophisticated, targeted attacks. Focusing on multi-layered security, exploitation protection, and machine learning, Trend Micro’s full suite of EDR and EPP solutions. They have received praise for its fully featured with adaptive preventative capabilities and for their patching capabilities and managed detection services. Trend Micro also offers its team of security threat experts and researchers, who work to identify millions of threats and secure the Internet of Things.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

In 2019, Trend Micro was named a Leader in both the Gartner Magic Quadrant for Endpoint Protection Platforms and the Forrester Wave for Endpoint Security Suites. It is also a Leader in the Forrester Wave for Email Security. All of this speaks to Trend Micro’s comprehensiveness and its innovation. It should fit with the needs of any buyer, SMB and large company alike, for endpoint security, data protection, and cloud security needs.

Contact

225 E. John Carpenter Fwy
Irving, TX
United States
+1 (800) 864-6027
www.trendmicro.com/



Link to carbonblack
Solutions Overview

VMware Carbon Black’s endpoint security software, Cb Defense, offers streaming malware protection and EDR to detect and prevent bad actors from attacking your organization in real time. Cb Defense consistently records all endpoint activity making it easy to track potential security threats and determine their root causes. VMware Carbon Black offers custom API’s, giving IT teams the ability to integrate security capabilities from a variety of solutions. Cb LiveOps builds off the Carbon Black Predictive Security Cloud for real-time threat remediation.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Large enterprises looking for a full range of protection, detection, and response capabilities will find VMware Carbon Black a good candidate to replace or augment its legacy endpoint protection platforms; VMware’s cloud, networking and security, and digital workspace capabilities could contribute to Carbon Black’s threat monitoring and anti-virus capabilities. Carbon Black was named a Visionary in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms, as well as in Gartner Peer Insights Customers’ Choice for EDR 2020 and The Forrester Wave: Enterprise Detection and Response, Q1 2020.

Contact

1100 Winter St
Waltham, MA
United States
+1 (617) 393-7400
www.carbonblack.com



Link to Webroot
Solutions Overview

Webroot’s EPP Solution—SecureAnywhere Business Endpoint Protection—utilizes behavioral analysis, machine learning, and contextual threat intelligence. It allows Webroot to protect enterprises’ networks while remaining lightweight and unobtrusive to business processes. Its solution provides multi-vector protection for all stages of endpoint attacks, mitigating long-term damage. Its cloud-based architecture classified a majority of the Internet—no small feat—for risks to evaluate browser safety for both on and off-premises devices.

Download this Directory and get our Free Endpoint Security Solutions Buyers Guide.

More Detail

Webroot’s lightweight nature means it can serve as an additional tool for larger companies interested in adding a new layer of protection to their existing endpoint security solutions. It can also be a main EPP for SMBs looking for more lightweight solutions to their malware protection. Webroot has OEM relationships with third parties that leverage its threat intelligence. Webroot’s browser security may appeal to enterprises dealing with high volumes of internet communication or research.

Contact

385 Interlocken Crescent
Broomfield, CO
United States
+1 (800) 772-9383
www.webroot.com