Best Endpoint Security Services Providers

Comparing 19 vendors in Endpoint Security Solutions across 123 criteria.
  • Symantec helps organizations in avoiding security breaches even before the incidents occur. With the help of precise attack analytics, automated investigation playbooks, and innovative lateral movement, Symantec delivers precise threat detections and handles persistent threats in real time. The solution helps in fine tuning detection engines on the go to enhance the user's security posture and it effectively shields endpoints from malicious Wi-Fi networks.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • Kaspersky Endpoint Protection solutions do no require any additional server or software deployment costs. The solution provides protection for any endpoint and it offers quick protection with predefined security policies. The solution also saves time by automating OS and software deployment tasks. It streamlines security management fucntion with the help of unified web console.

    Read More
    • Enterprise
    • Moscow, Russia
    • Founded: 1997
    • $500MN to $1BN
    • 1,001 to 5,000
  • Sophos Next-Gen Endpoint Security is one of the leading providers of network protection, end-user protection, and server protection solutions. The company’s major products are spread across a wide range of environment, which includes mainframe, distributed, cloud, and mobile. The company's major business revenue products include encryption, endpoint security, web, email, mobile, and network security solutions. Some of the OEMs include Cisco, IBM, Blue Coat, Trustwave, FireEye, and Webroot. . Sophos Next-Gen Endpoint Security is one of the leading providers of network protection, end-user protection, and server protection solutions.

    Read More
    • Enterprise
    • Oxfordshire, UK
    • Founded: 1985
    • $500MN to $1BN
    • 1,001 to 5,000
  • Cisco Endpoint Security solution provides businesses with a highly secure access to the enterprise network irrespective of the device, time or location. It facilitates organizations with a consistent user experience across both on and off premises. Cisco offers a broad level view of the endpoints, offering a deeper visibility, context, and control of servers and endpoints. Businesses can easily deploy Cisco end point solutions through an enterprise mobility management solution such as Cisco Meraki Systems Manager, IBM MaaS360 etc.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1984
    • $10BN to $50BN
    • 50,001 to 75,000
  • Trend Micro's Apex One solution provides threat detection, response, and investigation all consolidated in a single agent. It enables users to eliminate multiple vendors and helps them acjieve deployment flexibility via both SaaS and on-premises deployment options. The solution also secures users with simplified security that provides businesses with an enhanced visibility and a faster response to attacks. 

    Read More
    • Enterprise
    • Tokyo, Japan
    • Founded: 1988
    • $1BN to $5BN
    • 5,001 to 10,000
  • Panda Endpoint Security is one of the premium providers of cloud-based security and on-premises security solutions for enterprises and home users. The company provides SaaS protection for endpoints, web, and email security. The company helps organizations by providing unparalleled protection against malware and other unknown threats. It automates infrastructure management systems and provides users with a centralized control. Panda offers one of the best support experience in amongst its competitors by conducting proactive troubleshooting and remote, non-intrusive access to devices, irrespective of their locations.

    Read More
    • Startup
    • Bilbao, Spain
    • Founded: 1990
    • $51MN to $100MN
    • 501 to 1,000
  • ESET specializes in providing anti-virus and firewall products. ESET Endpoint solutions are easy to set up, as they offers straightforward deployment, simplified navigation and effortless updates. The company's Set-and-forget protection feature secures users, systems and data and alloes professionals to focus on other business priorities. ESET endpoint protection delivers unparalleled protection across multiple platforms and processes. ESET offers Push Authentication with its solutions which provides users with a single-touch authentication via mobile devices for maximum convenience and it runs on iOS, Android and Windows 10 mobile devices.

    Read More
    • Enterprise
    • Bratislava, Slovakia
    • Founded: 1987
    • $500MN to $1BN
    • 501 to 1,000
  • Webroot Business Endpoint Protection is a cloud-based endpoint security solution that leverages ML to consistently track and adapt endpoint threat detection, protection, and prevention. It protects physical and virtual systems and their users against modern, multi-vector threats. The company offers its solution through the software-as-a-service (SaaS) model which is fully cloud-based and offers various benefits. The software, which provides administrators with full security visibility, requires only half a minute to install without requiring the interruption of the existing security software. 

    Read More
    • SME
    • Colorado, USA
    • Founded: 1997
    • $101MN to $500MN
    • 101 to 500
  • F-Secure Protection Service for Business is a cloud based, consolidated security solution that secures the organization's computers, mobile devices servers, and passwords. It does not require any server hardware and it provides automatic patch management feature. The solutions provide enhanced security through browsing controls that minimize human error. One of the best functions is that the solution allows users to manage both physical and virtual environments with a single tool.

    Read More
    • SME
    • Helsinki, Finland
    • Founded: 1988
    • $101MN to $500MN
    • 1,001 to 5,000
  • Bitdefender's Endpoint solutions recognize and prevent threats earlier in the attack chain, thereby securing the organization's security posture, by leveraging its latest Advanced Prevention Capabilities and Network Attack Defense technology. The company has created over 30 layers of protection for all the organization's endpoints and it provides the world’s most effective protection integrated with low overhead EDR and Endpoint Risk Analytics (ERA). 

    Read More
    • SME
    • Bucharest, Romania
    • Founded: 2001
    • $101MN to $500MN
    • 1,001 to 5,000
  • Microsoft end point protection solutions identify and analyze threat intelligence from the cloud and on-premises. The solution has built-in adaptive intelligence, which provides insights into advanced threats both, on-premises and in the cloud. The solution also safeguards every device with seven properties of highly secured, internet-connected devices. Microsoft's Cloud App Security collaborates with leading Microsoft solutions. It has been created to provide simple deployment, centralized management, and innovative automation capabilities.

    Read More
    • Enterprise
    • Washington, USA
    • Founded: 1975
    • More than $100 BN
    • 1,00,001 to 5,00,000
  • 8K Miles Secure Cloud Framework creates a Virtual Private Cloud in the public cloud that complies with the (FISMA) moderate security level, (PCI) security standard,(SOC) 1 standard, and HIPAA standards. Their Secure Cloud Framework also automates and enables movement to the cloud easier for businesses. The cloud templates created by 8k Miles, their configuration management tools and protected scripts can be deployed in a short time. The company also provides tools that help organizations encrypt their Cloud VM volumes.

    Read More
    • SME
    • California, USA
    • Founded: 2007
    • $51MN to $100MN
    • 1,00,001 to 5,00,000
  • Avast specializes in providing security solution for personal computers, Apple MAC, mobiles, and tablets. Avast Business Endpoint Protection Solutions provide unparalleled, enterprise-level protection that secures small and medium businesses from threats. The company's 400 million+ active users provide a consistent stream of data that enables Avast to instantly identify and destroy any threat and predict the future ones. 

    Read More
    • Enterprise
    • Prague, Czech Republic
    • Founded: 1988
    • $500MN to $1BN
  • By leveraging it hardware telemetry and acceleration capabilities, Intel helps organizations to identify threats and anomalous activity. Intel Hardware Shield allows organizations to minimize the attack surface of the BIOS, in order to avoid malicious software injection by locking down BIOS memory. The solution also provides ready-made protection to enables professionals to secure their systems against firmware attacks, including dynamic OS visibility.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1968
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • Oracle Cloud Infrastructure enables organizations develop a logical extension of their on-premises infrastructure and data centers in Oracle Cloud Infrastructure. Oracle provides customer isolation by allowing them to deploy their applications and data assets. The company also provides detailed log data and security analytics which are useful in auditing and tracking actions on their resources. Oracle also provides data encryption that enables businesses to secure their customer and allows them to meet their security and compliance requirements.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1977
    • $10BN to $50BN
    • 1,00,001 to 5,00,000
  • PC Connection's Unified Security Stack assists organizations in collaborating security management and providing them with real-time visibility. It minimizes operational security costs by leveraging flexible licensing models and decreasing the number of dashboards, by offering a consolidated view. The company also performs security assessments which help mitigate security risks to ensure that the technology, procedures, and controls remain compliant with industry regulations.

    Read More
    • Enterprise
    • Merrimack, USA
    • Founded: 1982
    • $1BN to $5BN
    • 1,001 to 5,000
  • PLDT's endpoint security solutions provide end-to-end IT asset support, whether on-premise, hosted externally, or in a cloud. This helps reduce system downtime and enables organizations to prevent potential damage to their businesses. The solutions perform in-depth threat analysis and recommends users with concrete actions to mitigate security risks. PLDT's Multi Threat Secure platform provides the Next Gen Firewall, Intrusion Prevention, Gateway Antivirus, and Antibot features.

    Read More
    • Enterprise
    • Makati, Philippines
    • Founded: 1928
    • $500MN to $1BN
    • 15,001 to 20,000
  • Seqrite is a 20-year-old cyber security company that pride itself in simplifying IT security while maximizing business performance. The company provides digital securities such as Anti-virus software, firewalls, anti-spyware, data protection etc. All these products can be utilized on both personal and corporate devices to help digital identities secure.

    Read More
    • Enterprise
    • 1 to 50
  • Zensar’s Security and Threat Management Solution ensures that processes and tools are in place to detect and contain malware. The solution uses the abilities of ML and other algorithmic processes to deliver predictive analytics, which helps in detecting threats ranging from traditional cyber threats to the latest advanced persistent threats. The company's Security Information and Event Management (SIEM) products help organizations in saving costs by up to 30% in monitoring and remediation operations. Zensar’s Information Security Management Systems reduces Audit time by approximately 60%.

    Read More
    • Enterprise
    • Pune, India
    • $5BN to $10BN
    • 10,001 to 15,000

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Endpoint Security Solutions tools.
4.37
4.31
3.65
  • Insider Threat

  • Enterprise-wide Monitoring

  • Incident Response

  • Threat Hunting

  • Viability

    • Important Partnerships

    • Important Innovations

    • Marquee Clients

    • Financial Performance

      Total revenue for the last FY? | Percentage Increase | Number of End Point Security Customers | Average Customer Retention Rate YoY | Total revenue for the last FY | No. of End Point Security customers | % increase in revenue YoY for last FY | Average customer retention rate YoY |
  • Geographic Footprint

    • Geographies

      USA | Canada | Latin America | UK | Germany | Eastern Europe | Western Europe | Africa | UAE & Middle East | Israel | India & South Asia | China & HK | SEA & Singapore | Japan | Australia & New Zealand |
  • Channel Strategy and Fit

    • Source of Sales by percentage of contribution

      Direct | Distributors / VARs / OEMs | Agencies & Consultants | Managed Service Providers | System Integrators / Budlers |
    • Channels of Demand

      Web Search | Digital Marketing | Field Sales | Events |
  • Breadth of Applications Served

    • Industries

      Construction | Consumer & Commercial | Education | Energy and Utilities | Financial Services | Government | Healthcare | Industrial Control Systems | Manufacturing | Media & Communications | Military & Aerospace | Retail | Transportation |
  • Product Quality and Reliability

    • Deployment Type

      Web-Based | Installed | iOS | Android |
    • Deployment Model

      On-Premises | Cloud | Hybrid |
  • Product Features and Functionality

    • Respond

      Automated Malware Removal | Synchronized Security Heartbeat | Root Cause Analysis | Block targeted attacks |
    • Prevention

      Web Security | Web Control / Category-based URL Blocking | Peripheral Control (e.g. USB) | Application Control | Client Firewal | Deep Learning malware detection | Anti-Malware File Scanning | Live Protection | Pre-execution Behavior Analysis (HIPS) | Potentially Unwanted Application (PUA) Blocking | Stop fileless attacks | Prevent data breaches | Exploit Prevention |
    • Licensing

      Business | Enterprise |
    • Detection

      Runtime Behavior Analysis (HIPS) | Malicious Traffic Detection (MTD) | Active Adversary Mitigations | Ransomware File Protection (CryptoGuard) | Disk and Boot Record Protection (WipeGuard) | Man-in-the-Browser Protection (Safe Browsing) |
    • Data Security

      Segregation of Network | Encryption of Data | Prevent Data Loss | Control File Integrity | Monitor the Data access |
    • Costs & Units

      $ per Month/Yearly | $ per license |
  • Breadth and Depth of Product Offering

    • Use Cases

      Insider Threat | Enterprise-wide Monitoring | Incident Response | Threat Hunting |
    • Services

      Technical Support | Virus & Threat Help | Renewals & Registration | Education & Certification | Free Downloads | Free Clean-up Tools |

TOP REVIEWS

Looking for Endpoint Security Solutions? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.