Endpoint security is a policy-based client/server security approach to protect enterprise network when accessed via endpoint devices, such as smartphones, tablets, desktops, laptops, and other remote devices. A centrally managed server hosts the security program and the client program in installed on each endpoint devices. The endpoint security solution monitors the activities on connected devices to identify intrusions or threats and mitigate the potential risks.

COMPETITIVE LEADERSHIP MAPPING TERMINOLOGY

The vendors have been placed into 4 categories based on their performance in each criterion: visionary leaders, innovators, emerging, and dynamic.

VISIONARY LEADERS

The visionary leaders receive high scores for most of the evaluation criteria. They have an established product portfolio and a very strong market presence.

INNOVATORS

Innovators have innovative portfolio of services and a strong potential to build robust business strategies for their business growth, to be at par with the Vanguards. Moreover, a strong and dedicated direct and indirect sales channel is one of the key factors influencing the brand position of the firm.

DYNAMIC Differentiators

The dynamic differentiators are established vendors with very strong business strategies. However, they have a low product portfolio. They focus on a specific type of technology related to the product.

EMERGING COMPANIES

The emerging companies have niche product offerings and are starting to gain their position in the market. They do not have much strong business strategies as compared to other established vendors. They might be new entrants in the market and require some more time before getting significant traction in the market.

TOP VENDORS
In Endpoint Security Solutions

  1. SYMANTEC CORPORATION
    0 Reviews
    4.4
  2. KASPERSKY LAB
    0 Reviews
    4.3
  3. SOPHOS LTD
    0 Reviews
    3.7

Find the best Endpoint Security Solutions solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

Endpoint Security Solutions Quadrant

Comparing [object Object] vendors in Endpoint Security Solutions across 119 criteria.

KEY BUYING CRITERIA

Below criteria are most commonly used for comparing Endpoint Security Solutions tools.
Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
0.0
0.0
0.0
Product Quality and Reliability
3.50
4.15
3.50
Product Features and Functionality
4.05
5.00
3.35
Breadth and Depth of Product Offering
5.00
4.15
4.15
LEAST IMPORTANT LESS IMPORTANT

TOP VENDORS

  • BUYERS
    VENDORS
    EXPERTS
    4.4
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • BUYERS
    VENDORS
    EXPERTS
    4.3
    ANALYSTS
     
    • Enterprise
    • Moscow, Russia
    • Founded: 1997
    • $500MN to $1BN
    • 1,001 to 5,000
  • BUYERS
    VENDORS
    EXPERTS
    3.7
    ANALYSTS
     
    • Enterprise
    • Oxfordshire, UK
    • Founded: 1985
    • $500MN to $1BN
    • 1,001 to 5,000
  • BUYERS
    VENDORS
    EXPERTS
    3.0
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1984
    • S10BN to $50BN
    • 50,001 to 75,000
  • BUYERS
    VENDORS
    EXPERTS
    2.5
    ANALYSTS
     
    • SME
    • Tokyo, Japan
    • Founded: 1988
    • $101MN to $500MN
    • 1,001 to 5,000
  • BUYERS
    VENDORS
    EXPERTS
    2.3
    ANALYSTS
     
    • Enterprise
    • Bratislava, Slovak Republic
    • Founded: 1992
    • $500MN to $1BN
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    2.3
    ANALYSTS
     
    • Startup
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    2.1
    ANALYSTS
     
    • SME
    • Colorado, US
    • Founded: 1997
    • $101MN to $500MN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    1.5
    ANALYSTS
     
    • SME
    • Helsinki, Finland
    • Founded: 1988
    • $101MN to $500MN
    • 1,001 to 5,000
  • BUYERS
    VENDORS
    EXPERTS
    1.5
    ANALYSTS
     
    • SME
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    1.1
    ANALYSTS
     
    • Enterprise
    • Washington, US
    • Founded: 1975
    • 1,00,001 to 5,00,000
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1977
    • S10BN to $50BN
    • 1,00,001 to 5,00,000

POTENTIAL BUYERS AND THEIR PROBLEMS

 

Questions & Answers

1. Endpoint Security Market is a vast market and is connected to many others. How do I track down its dependencies and effects on other markets?

2. How do I find out the best emerging usecases in Endpoint Security Market that can be advantageous for my industry?

3. Different parameters are considered while analysing the companies in  Endpoint Security Market. What is the criteria to find out the ones that are most important?

TOP REVIEWS

Looking for Endpoint Security Solutions? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.