Best Endpoint Protection Platforms - Page 3

BS
Researched and written by Brandon Summers-Miller

Endpoint protection platforms (EPP) combine a number of endpoint security and management capabilities to deliver an all-in-one solution for securing endpoint devices. These tools facilitate endpoint management through remote control, monitoring, and inventory management. Endpoint protection platforms also provide some level of endpoint detection and remediation to identify and remove causes of web-based threats. Lastly, they offer antivirus capabilities to prevent malicious software from infecting endpoint devices.

Companies often choose solution suites because of their all-encompassing nature and to centralize control and maintain consistency of security operations related to endpoint devices. While these tools possess the capabilities of other endpoint security software, they also accomplish much more. By combining at least three key components of endpoint security, endpoint security vendors are excellent choices for companies looking to consolidate security solutions.

To qualify for the Endpoint Protection Platforms category, a platform or product suite must offer the following core features:

Facilitate control over disparate endpoints
Provide endpoint malware and antivirus protection
Facilitate the detection and remediation of web-based threats

In some cases, endpoint protection and security platforms may contain features of antivirus software, endpoint detection and response (EDR) software, and endpoint management software, including:

Possession of anti-malware and malware identification or removal features
Ability to distribute updates as new virus signatures are detected
Features for showing the health status of individual devices and alerting administrators when devices have been compromised
Ability to manage endpoint assets connected to a network and patch updates and ensure device compliance
Detecting new network assets, endpoints, and anomalies to trigger remediation
Installing new operating systems or applications to an endpoint device
Product Suite
This category contains both product suites and products. Product suites represent a grouping of multiple products from a single vendor, including aggregated scoring. These products are marked with this icon and will highlight the most-reviewed products within that product suite. To read more about G2’s platform definitions, view the Standard Definitions page.
The following products include these core categories: Endpoint Protection Suites

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
47 Listings in Endpoint Protection Platforms Available
Product
(21)4.5 out of 5
View top Consulting Services for Cisco Secure Endpoints

Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR)

Save to My Lists
Product
(18)4.4 out of 5
View top Consulting Services for Cybereason Defense Platform

Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Mos

Save to My Lists

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
Product
(16)4.8 out of 5

𝗧𝗵𝗲 𝗖𝗼𝗺𝗽𝗮𝗻𝘆 Admin By Request is a leading vendor of SaaS-based enterprise security solutions delivered via our award-winning Admin By Request Zero Trust Platform. Our global team can be found in offi

Save to My Lists
Product
(11)4.6 out of 5

Morphisec fortifies your organization by diminishing the blast radius of attacks, to preemptively reduce the organization’s exposure to cyber risk, pro-actively prevent advanced threats, and ensure op

Save to My Lists
Product
(4)4.8 out of 5

DeepArmor leverages the power of big data and patented machine learning algorithms to predict and prevent the most advanced attacks in a simple, lightweight solution. Security operations teams can use

Save to My Lists
Product
(3)5.0 out of 5

Deceptive Bytes' patented malware prevention technology is provided as part of its Active Endpoint Deception platform that dynamically responds to attacks as they evolve and change their outcome, by c

Save to My Lists
Product
(3)4.2 out of 5

Guardio covers your security blind spots. When you work in a business, one click can take the whole team down, along with your customer base. That one click can quickly lead to company data and custom

Save to My Lists
Product
(2)4.3 out of 5
Optimized for quick response

Deep Instinct is the only preemptive data security solution that PREVENTS >99% of UNKNOWN and ZERO-DAY threats, including ransomware and AI generated malware before they breach your environment, wh

Save to My Lists
Product
(1)5.0 out of 5

Protecting data from human error, malware and theft gets infinitely more complicated when protection is spread across wide geographic distances and complex network topologies. Designed to simplify the

Save to My Lists
Product
(1)5.0 out of 5

With a user-friendly interface, cloud or on-prem based management options and a central control panel, you can easily manage all your endpoint devices (Computer, Mobile Device, Smart TV) from one plac

Save to My Lists
Product
0 ratings

AhnLab EPP unifies modern endpoint security tools across anti-malware, security assessment, patch management, personal data protection, and endpoint detection & response (EDR) to accelerate dynami

Save to My Lists
Product
0 ratings

CatchPulse protects Windows home devices, enterprises, and governments across the globe from the increasing number of security threats, without forcing anyone to become a cybersecurity expert. What ma

Save to My Lists
Entry Level Price:$36.00
Product
0 ratings

INLYSE Malware.AI is revolutionary visual AI-based malware detection solution that utilizes cutting-edge technology to convert files into graphical representations and analyze them comprehensively for

Save to My Lists