2026 Best Software Awards are here!See the list

Top Free Endpoint Protection Platforms

Check out our list of free Endpoint Protection Platforms. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Endpoint Protection Platforms to ensure you get the right product.

View Free Endpoint Protection Platforms

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
23 Endpoint Protection Platforms Products Available
(1,049)4.5 out of 5
8th Easiest To Use in Endpoint Protection Platforms software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine Endpoint Central is an all-in-one unified endpoint management and security (UEMS) solution that delivers end-to-end life cycle management and endpoint protection. From automated multi-OS

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 65% Mid-Market
    • 23% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Endpoint Central features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VK
    Endpoint Central is a reliable, cost-effective and user-friendly solution. Great visibility into endpoint inventory, easy remote access with audit... Read review
    Avnish P.
    AP
    Configration Remote Session Deployment Inventory Management Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zoho
    Year Founded
    1996
    HQ Location
    Austin, TX
    Twitter
    @Zoho
    136,993 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    29,794 employees on LinkedIn®
    Phone
    +1 (888) 900-9646
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine Endpoint Central is an all-in-one unified endpoint management and security (UEMS) solution that delivers end-to-end life cycle management and endpoint protection. From automated multi-OS

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 65% Mid-Market
  • 23% Enterprise
ManageEngine Endpoint Central features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
VK
Endpoint Central is a reliable, cost-effective and user-friendly solution. Great visibility into endpoint inventory, easy remote access with audit... Read review
Avnish P.
AP
Configration Remote Session Deployment Inventory Management Read review
Seller Details
Seller
Zoho
Year Founded
1996
HQ Location
Austin, TX
Twitter
@Zoho
136,993 Twitter followers
LinkedIn® Page
www.linkedin.com
29,794 employees on LinkedIn®
Phone
+1 (888) 900-9646
(1,069)4.6 out of 5
Optimized for quick response
3rd Easiest To Use in Endpoint Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – to protect people, devices, and dat

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Small-Business
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatDown features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Compliance
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 9.0
    8.9
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HH
    Very simple and user friendly, does exactly what it says it does. quick to roll out to staff. quick support as well. Read review
    Verified User in Computer & Network Security
    CC
    Ease of use, sophistication of service for price, central portal for management. I use this on client servers/pc's along side Windows Defender... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Santa Clara, CA
    Twitter
    @Malwarebytes
    86,315 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    613 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – to protect people, devices, and dat

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Small-Business
  • 42% Mid-Market
ThreatDown features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
9.1
Compliance
Average: 8.9
9.0
Endpoint Intelligence
Average: 9.0
8.9
Behavioral Analysis
Average: 8.7
HH
Very simple and user friendly, does exactly what it says it does. quick to roll out to staff. quick support as well. Read review
Verified User in Computer & Network Security
CC
Ease of use, sophistication of service for price, central portal for management. I use this on client servers/pc's along side Windows Defender... Read review
Seller Details
Company Website
Year Founded
2008
HQ Location
Santa Clara, CA
Twitter
@Malwarebytes
86,315 Twitter followers
LinkedIn® Page
www.linkedin.com
613 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(820)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Endpoint Protection Platforms software
View top Consulting Services for Sophos Endpoint
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sophos Endpoint is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Sophos Endpoint has been proven to prevent even the most advanced ransomwar

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Mid-Market
    • 18% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sophos Endpoint features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Compliance
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 9.0
    9.2
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • PD
    I love how Sophos Endpoint offers easy deployment through Group Policy Object (GPO), which streamlines the installation process across multiple... Read review
    KJ
    This is a very good and cost-effective solution. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Company Website
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,735 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,477 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sophos Endpoint is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Sophos Endpoint has been proven to prevent even the most advanced ransomwar

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Mid-Market
  • 18% Enterprise
Sophos Endpoint features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 8.9
9.3
Compliance
Average: 8.9
9.4
Endpoint Intelligence
Average: 9.0
9.2
Behavioral Analysis
Average: 8.7
PD
I love how Sophos Endpoint offers easy deployment through Group Policy Object (GPO), which streamlines the installation process across multiple... Read review
KJ
This is a very good and cost-effective solution. Read review
Seller Details
Seller
Sophos
Company Website
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,735 Twitter followers
LinkedIn® Page
www.linkedin.com
5,477 employees on LinkedIn®
(926)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Endpoint Protection Platforms software
View top Consulting Services for ESET PROTECT
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 46% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Compliance
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 9.0
    8.8
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • SG
    I use ESET PROTECT for software and device protection as it safeguards files, folders, and scans them for threats. It ensures a stable and reliable... Read review
    ES
    It simply finds the nasty stuff. Since I implemented this solution we’ve had no significant ransomware attacks and this means it’s working properly... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    276,980 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,944 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 46% Mid-Market
ESET PROTECT features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
9.2
Compliance
Average: 8.9
9.2
Endpoint Intelligence
Average: 9.0
8.8
Behavioral Analysis
Average: 8.7
SG
I use ESET PROTECT for software and device protection as it safeguards files, folders, and scans them for threats. It ensures a stable and reliable... Read review
ES
It simply finds the nasty stuff. Since I implemented this solution we’ve had no significant ransomware attacks and this means it’s working properly... Read review
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
276,980 Twitter followers
LinkedIn® Page
www.linkedin.com
1,944 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    It’s the digital armor protecting you and your business from devastating, multi-layered cyberattacks. The truth is, antivirus just isn't enough anymore. Today’s cybercriminals layer their attack met

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 54% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Webroot Business Endpoint Protection features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    8.8
    Compliance
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 9.0
    8.8
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Joshua M.
    JM
    Lightweight software that doesn't slow down our daily users. Doesn't interfere with any programs we use in our company. The cost vs dependability... Read review
    AA
    By choosing a managed Webroot Business Endpoint Protection solution, companies no longer have to worry about malware protection. The managed... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Webroot
    Year Founded
    1997
    HQ Location
    Broomfield, CO
    Twitter
    @Webroot
    60,453 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    253 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

It’s the digital armor protecting you and your business from devastating, multi-layered cyberattacks. The truth is, antivirus just isn't enough anymore. Today’s cybercriminals layer their attack met

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 54% Small-Business
  • 41% Mid-Market
Webroot Business Endpoint Protection features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
8.8
Compliance
Average: 8.9
9.0
Endpoint Intelligence
Average: 9.0
8.8
Behavioral Analysis
Average: 8.7
Joshua M.
JM
Lightweight software that doesn't slow down our daily users. Doesn't interfere with any programs we use in our company. The cost vs dependability... Read review
AA
By choosing a managed Webroot Business Endpoint Protection solution, companies no longer have to worry about malware protection. The managed... Read review
Seller Details
Seller
Webroot
Year Founded
1997
HQ Location
Broomfield, CO
Twitter
@Webroot
60,453 Twitter followers
LinkedIn® Page
www.linkedin.com
253 employees on LinkedIn®
(294)4.8 out of 5
7th Easiest To Use in Endpoint Protection Platforms software
View top Consulting Services for ThreatLocker Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatLocker is a comprehensive cybersecurity solution designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This s

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 62% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Compliance
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 9.0
    8.5
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • DF
    ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
    Verified User in Transportation/Trucking/Railroad
    AT
    We are highly impressed with ThreatLocker’s ability to quickly deploy their solution in critical situations, such as during the CDK breach. Their... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,693 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    658 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatLocker is a comprehensive cybersecurity solution designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This s

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 62% Small-Business
  • 32% Mid-Market
ThreatLocker Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 8.9
9.2
Compliance
Average: 8.9
9.0
Endpoint Intelligence
Average: 9.0
8.5
Behavioral Analysis
Average: 8.7
DF
ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
Verified User in Transportation/Trucking/Railroad
AT
We are highly impressed with ThreatLocker’s ability to quickly deploy their solution in critical situations, such as during the CDK breach. Their... Read review
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,693 Twitter followers
LinkedIn® Page
www.linkedin.com
658 employees on LinkedIn®
(231)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Endpoint Protection Platforms software
Save to My Lists
Entry Level Price:Starting at $9.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 57% Mid-Market
    • 36% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro is a cybersecurity product that provides protection for small businesses, with features such as flagging potential spam and phishing, and offering a dashboard for easy administration.
    • Reviewers appreciate the product's high success rate in capturing threats, its intuitive platform, and the responsive and helpful support team that makes the onboarding process easy.
    • Users experienced issues with the product being particular about the version of Outlook for the Coro add-in, the inability to interact directly with the Bitdefender agent on local machines, and unclear instructions on how to resolve errors.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    9.7
    Compliance
    Average: 8.9
    9.8
    Endpoint Intelligence
    Average: 9.0
    9.7
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,905 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    324 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 57% Mid-Market
  • 36% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro is a cybersecurity product that provides protection for small businesses, with features such as flagging potential spam and phishing, and offering a dashboard for easy administration.
  • Reviewers appreciate the product's high success rate in capturing threats, its intuitive platform, and the responsive and helpful support team that makes the onboarding process easy.
  • Users experienced issues with the product being particular about the version of Outlook for the Coro add-in, the inability to interact directly with the Bitdefender agent on local machines, and unclear instructions on how to resolve errors.
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
9.7
Compliance
Average: 8.9
9.8
Endpoint Intelligence
Average: 9.0
9.7
Behavioral Analysis
Average: 8.7
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,905 Twitter followers
LinkedIn® Page
www.linkedin.com
324 employees on LinkedIn®
(381)4.7 out of 5
Optimized for quick response
5th Easiest To Use in Endpoint Protection Platforms software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

    Users
    • Security Analyst
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Enterprise
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Compliance
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 9.0
    9.3
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Bibek M.
    BM
    The best part is definitely the single, lightweight agent. Unlike our old antivirus, which used to slow down laptops and require constant reboots... Read review
    MN
    CrowdStrike Falcon endpoint protection platform and it is could native architecture real time threat detection and response. CrowdStrike provides... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    109,192 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,831 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

Users
  • Security Analyst
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Enterprise
  • 42% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.2
Compliance
Average: 8.9
9.4
Endpoint Intelligence
Average: 9.0
9.3
Behavioral Analysis
Average: 8.7
Bibek M.
BM
The best part is definitely the single, lightweight agent. Unlike our old antivirus, which used to slow down laptops and require constant reboots... Read review
MN
CrowdStrike Falcon endpoint protection platform and it is could native architecture real time threat detection and response. CrowdStrike provides... Read review
Seller Details
Company Website
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
109,192 Twitter followers
LinkedIn® Page
www.linkedin.com
10,831 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Delivered from the cloud or on-premises, Kaspersky Endpoint Security for Business provides flexible security for mixed environments, incorporating a full stack of ‘building blocks’ to deliver automate

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaspersky Next Optimum features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.9
    Compliance
    Average: 8.9
    8.9
    Endpoint Intelligence
    Average: 9.0
    8.7
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VIDYASAGARREDDY K.
    VK
    Security and Cost-efficient easy to use, blocking USB ports installation process is very simple. Read review
    Verified User in Transportation/Trucking/Railroad
    AT
    price, security and support are top notch Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaspersky
    Year Founded
    1997
    HQ Location
    Moscow
    Twitter
    @kasperskylabind
    1,297 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,494 employees on LinkedIn®
    Phone
    1-866-328-5700
Product Description
How are these determined?Information
This description is provided by the seller.

Delivered from the cloud or on-premises, Kaspersky Endpoint Security for Business provides flexible security for mixed environments, incorporating a full stack of ‘building blocks’ to deliver automate

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Mid-Market
  • 33% Small-Business
Kaspersky Next Optimum features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 8.9
8.9
Compliance
Average: 8.9
8.9
Endpoint Intelligence
Average: 9.0
8.7
Behavioral Analysis
Average: 8.7
VIDYASAGARREDDY K.
VK
Security and Cost-efficient easy to use, blocking USB ports installation process is very simple. Read review
Verified User in Transportation/Trucking/Railroad
AT
price, security and support are top notch Read review
Seller Details
Seller
Kaspersky
Year Founded
1997
HQ Location
Moscow
Twitter
@kasperskylabind
1,297 Twitter followers
LinkedIn® Page
www.linkedin.com
4,494 employees on LinkedIn®
Phone
1-866-328-5700
(201)4.2 out of 5
Optimized for quick response
View top Consulting Services for IBM MaaS360
Save to My Lists
Entry Level Price:$4.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its

    Users
    • IT Manager
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Mid-Market
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM MaaS360 features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Compliance
    Average: 8.9
    7.5
    Endpoint Intelligence
    Average: 9.0
    6.7
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Yash K.
    YK
    I like it becasue it has features like easy device enrollment that makes it ease of use, one can manage application and also deploy policies... Read review
    Verified User in Information Technology and Services
    UI
    - easy device management -UI is great and easy to use - security is also good - also I liked that we can integrate with other apps well Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    708,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its

Users
  • IT Manager
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Mid-Market
  • 34% Enterprise
IBM MaaS360 features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 8.9
9.6
Compliance
Average: 8.9
7.5
Endpoint Intelligence
Average: 9.0
6.7
Behavioral Analysis
Average: 8.7
Yash K.
YK
I like it becasue it has features like easy device enrollment that makes it ease of use, one can manage application and also deploy policies... Read review
Verified User in Information Technology and Services
UI
- easy device management -UI is great and easy to use - security is also good - also I liked that we can integrate with other apps well Read review
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
708,873 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
(247)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Endpoint Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynet is the unified, AI-powered cybersecurity platform that delivers robust and comprehensive protection for security teams while maximizing operational efficiency for managed service providers (MSPs

    Users
    • SOC Analyst
    • Technical Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 58% Mid-Market
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynet features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Compliance
    Average: 8.9
    9.5
    Endpoint Intelligence
    Average: 9.0
    9.4
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AT
    The platform is user friendly and easy to use, there are several protection engines to ensure the security of devices where antivirus is installed.... Read review
    GI
    Cynet is a Leader in Cynersecurity and with this platform i find all that i need, deploy agent with centralized console, fully cloud system so i... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynet
    Company Website
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @Cynet360
    1,128 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cynet is the unified, AI-powered cybersecurity platform that delivers robust and comprehensive protection for security teams while maximizing operational efficiency for managed service providers (MSPs

Users
  • SOC Analyst
  • Technical Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 58% Mid-Market
  • 30% Small-Business
Cynet features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 8.9
9.3
Compliance
Average: 8.9
9.5
Endpoint Intelligence
Average: 9.0
9.4
Behavioral Analysis
Average: 8.7
AT
The platform is user friendly and easy to use, there are several protection engines to ensure the security of devices where antivirus is installed.... Read review
GI
Cynet is a Leader in Cynersecurity and with this platform i find all that i need, deploy agent with centralized console, fully cloud system so i... Read review
Seller Details
Seller
Cynet
Company Website
Year Founded
2014
HQ Location
Boston, MA
Twitter
@Cynet360
1,128 Twitter followers
LinkedIn® Page
www.linkedin.com
317 employees on LinkedIn®
(122)4.4 out of 5
Optimized for quick response
View top Consulting Services for WatchGuard Endpoint Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WatchGuard Endpoint Security solutions help you safeguard devices against cyber threats. WatchGuard EPDR and Advanced EPDR, our AI-powered flagship endpoint solutions, enhance your security posture by

    Users
    • Software Developer
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 55% Small-Business
    • 34% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WatchGuard Endpoint Security features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 8.9
    8.8
    Compliance
    Average: 8.9
    9.3
    Endpoint Intelligence
    Average: 9.0
    8.7
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Steven D.
    SD
    It is a quality antivirus, with its EP and EDR solutions, it quickly detects with a thorough analysis any threat that may be lurking in my work... Read review
    Verified User in Construction
    AC
    I have been using Adaptive Defense for over three years now across over 200 devices and its an excellent product, prior to moving to it I had... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1996
    HQ Location
    Seatle, WA
    Twitter
    @watchguard
    19,492 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,201 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

WatchGuard Endpoint Security solutions help you safeguard devices against cyber threats. WatchGuard EPDR and Advanced EPDR, our AI-powered flagship endpoint solutions, enhance your security posture by

Users
  • Software Developer
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 55% Small-Business
  • 34% Mid-Market
WatchGuard Endpoint Security features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 8.9
8.8
Compliance
Average: 8.9
9.3
Endpoint Intelligence
Average: 9.0
8.7
Behavioral Analysis
Average: 8.7
Steven D.
SD
It is a quality antivirus, with its EP and EDR solutions, it quickly detects with a thorough analysis any threat that may be lurking in my work... Read review
Verified User in Construction
AC
I have been using Adaptive Defense for over three years now across over 200 devices and its an excellent product, prior to moving to it I had... Read review
Seller Details
Company Website
Year Founded
1996
HQ Location
Seatle, WA
Twitter
@watchguard
19,492 Twitter followers
LinkedIn® Page
www.linkedin.com
1,201 employees on LinkedIn®
(198)4.7 out of 5
Optimized for quick response
View top Consulting Services for SentinelOne Singularity Endpoint
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 37% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Endpoint features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.8
    Compliance
    Average: 8.9
    9.5
    Endpoint Intelligence
    Average: 9.0
    9.6
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AB
    Proactive Hunting: The platform provides tools for security teams to proactively hunt for threats hidden within their network. This proactive... Read review
    Verified User in Computer & Network Security
    AC
    Easy to roll out and install Not resource intensive on machines Console is easy to use and configure/troubelshoot issues. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    57,148 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,146 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 37% Enterprise
SentinelOne Singularity Endpoint features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
8.8
Compliance
Average: 8.9
9.5
Endpoint Intelligence
Average: 9.0
9.6
Behavioral Analysis
Average: 8.7
AB
Proactive Hunting: The platform provides tools for security teams to proactively hunt for threats hidden within their network. This proactive... Read review
Verified User in Computer & Network Security
AC
Easy to roll out and install Not resource intensive on machines Console is easy to use and configure/troubelshoot issues. Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
57,148 Twitter followers
LinkedIn® Page
www.linkedin.com
3,146 employees on LinkedIn®
(93)4.6 out of 5
15th Easiest To Use in Endpoint Protection Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    • Owner
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 73% Small-Business
    • 8% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    7.5
    Compliance
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 9.0
    10.0
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    One software agent to easily turn on and off needed features. Logical web manage portal, good frequent updates and roadmap. Support team quick to... Read review
    Dakarai B.
    DB
    The best part of Todyl is that it is a single agent to deploy for all features. That simplies deployment and minimizes complexity. The ease of... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
  • Owner
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 73% Small-Business
  • 8% Mid-Market
Todyl Security Platform features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
7.5
Compliance
Average: 8.9
10.0
Endpoint Intelligence
Average: 9.0
10.0
Behavioral Analysis
Average: 8.7
Verified User in Information Technology and Services
AI
One software agent to easily turn on and off needed features. Logical web manage portal, good frequent updates and roadmap. Support team quick to... Read review
Dakarai B.
DB
The best part of Todyl is that it is a single agent to deploy for all features. That simplies deployment and minimizes complexity. The ease of... Read review
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 43% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    10.0
    Endpoint Intelligence
    Average: 9.0
    10.0
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Malcolm T.
    MT
    It's seamless, manageable and barely impacts resources. The management console is clear and support is good when it's (rarely) needed. Read review
    Timothy D.
    TD
    Centrally managed control panel and easy to deploy Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,316 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    225 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 43% Mid-Market
VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
10.0
Endpoint Intelligence
Average: 9.0
10.0
Behavioral Analysis
Average: 8.7
Malcolm T.
MT
It's seamless, manageable and barely impacts resources. The management console is clear and support is good when it's (rarely) needed. Read review
Timothy D.
TD
Centrally managed control panel and easy to deploy Read review
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,316 Twitter followers
LinkedIn® Page
www.linkedin.com
225 employees on LinkedIn®