Best Software for 2025 is now live!

Top Free Endpoint Protection Software

Check out our list of free Endpoint Protection Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Endpoint Protection Software to ensure you get the right product.

View Free Endpoint Protection Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
78 Endpoint Protection Products Available
(1,828)4.7 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 49% Mid-Market
    • 47% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • NinjaOne is a remote monitoring and management tool that provides detailed information about hardware configuration, software installed, and patch levels, and offers remote access to the file system, registry, services, and command line access for system and Powershell to run individual commands or scripts.
    • Reviewers frequently mention the ease of use, intuitive layout, quick deployment, and the ability to manage multiple clients' computers within one login/screen as some of the positive aspects of NinjaOne.
    • Reviewers mentioned issues with the interface taking time to learn, reports being difficult to configure, limitations on some operating systems, and problems with duplicate devices during deployment as some of the negative aspects of NinjaOne.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NinjaOne features and usability ratings that predict user satisfaction
    8.1
    Security Validation
    Average: 8.7
    8.4
    Endpoint Intelligence
    Average: 8.7
    8.4
    Compliance
    Average: 8.7
    9.0
    Device Control
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NinjaOne
    Company Website
    Year Founded
    2013
    HQ Location
    Austin, Texas
    Twitter
    @NinjaOne
    3,139 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,319 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 49% Mid-Market
  • 47% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • NinjaOne is a remote monitoring and management tool that provides detailed information about hardware configuration, software installed, and patch levels, and offers remote access to the file system, registry, services, and command line access for system and Powershell to run individual commands or scripts.
  • Reviewers frequently mention the ease of use, intuitive layout, quick deployment, and the ability to manage multiple clients' computers within one login/screen as some of the positive aspects of NinjaOne.
  • Reviewers mentioned issues with the interface taking time to learn, reports being difficult to configure, limitations on some operating systems, and problems with duplicate devices during deployment as some of the negative aspects of NinjaOne.
NinjaOne features and usability ratings that predict user satisfaction
8.1
Security Validation
Average: 8.7
8.4
Endpoint Intelligence
Average: 8.7
8.4
Compliance
Average: 8.7
9.0
Device Control
Average: 8.7
Seller Details
Seller
NinjaOne
Company Website
Year Founded
2013
HQ Location
Austin, Texas
Twitter
@NinjaOne
3,139 Twitter followers
LinkedIn® Page
www.linkedin.com
1,319 employees on LinkedIn®
(1,016)4.6 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – with one agent and one console -- t

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatDown features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.7
    8.9
    Endpoint Intelligence
    Average: 8.7
    8.9
    Compliance
    Average: 8.7
    8.6
    Device Control
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Legal Services
    AL
    It offers robust, real-time protection against a wide array of threats, including malware, ransomware, and other advanced cyber attacks. It runs... Read review
    Yuri K.
    YK
    Light footprint on Windows OS, comes with deployement tool that allows to easy push agent to small network. With a little effort can be intgrated... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Santa Clara, CA
    Twitter
    @Malwarebytes
    81,210 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    698 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – with one agent and one console -- t

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Small-Business
  • 41% Mid-Market
ThreatDown features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.7
8.9
Endpoint Intelligence
Average: 8.7
8.9
Compliance
Average: 8.7
8.6
Device Control
Average: 8.7
Verified User in Legal Services
AL
It offers robust, real-time protection against a wide array of threats, including malware, ransomware, and other advanced cyber attacks. It runs... Read review
Yuri K.
YK
Light footprint on Windows OS, comes with deployement tool that allows to easy push agent to small network. With a little effort can be intgrated... Read review
Seller Details
Company Website
Year Founded
2008
HQ Location
Santa Clara, CA
Twitter
@Malwarebytes
81,210 Twitter followers
LinkedIn® Page
www.linkedin.com
698 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
By ESET
(834)4.6 out of 5
Optimized for quick response
View top Consulting Services for ESET PROTECT
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 44% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.7
    9.1
    Endpoint Intelligence
    Average: 8.7
    8.9
    Compliance
    Average: 8.7
    8.8
    Device Control
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • GI
    Esect protect offers a cloud console to manage all of protection of endpoint, offers different license to protect device like EDR or only AV solution Read review
    IA
    ESET Protect is the simplest and most secure security system I've ever used. It's features like. - ESET Password Manager, securely storing... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    290,407 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,840 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 44% Mid-Market
ESET PROTECT features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.7
9.1
Endpoint Intelligence
Average: 8.7
8.9
Compliance
Average: 8.7
8.8
Device Control
Average: 8.7
GI
Esect protect offers a cloud console to manage all of protection of endpoint, offers different license to protect device like EDR or only AV solution Read review
IA
ESET Protect is the simplest and most secure security system I've ever used. It's features like. - ESET Password Manager, securely storing... Read review
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
290,407 Twitter followers
LinkedIn® Page
www.linkedin.com
1,840 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Endpoint Central is a Unified Endpoint Management (UEM) solution that helps in managing servers, desktops, laptops, smartphones, tablets and POS devices from a central location. Automate your regular

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 66% Mid-Market
    • 23% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Endpoint Central features and usability ratings that predict user satisfaction
    8.1
    Security Validation
    Average: 8.7
    8.2
    Endpoint Intelligence
    Average: 8.7
    8.3
    Compliance
    Average: 8.7
    8.7
    Device Control
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • BD
    A very comprehensive and granular solution that allows for the automation of a large number of patches regardless of the IT systems! Read review
    Ishan P.
    IP
    We can manage all of our endpoints , settings from a one dashboard. Such as we can manage BitLocker , Remote Control and Configurations. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,655 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    418 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Endpoint Central is a Unified Endpoint Management (UEM) solution that helps in managing servers, desktops, laptops, smartphones, tablets and POS devices from a central location. Automate your regular

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 66% Mid-Market
  • 23% Enterprise
ManageEngine Endpoint Central features and usability ratings that predict user satisfaction
8.1
Security Validation
Average: 8.7
8.2
Endpoint Intelligence
Average: 8.7
8.3
Compliance
Average: 8.7
8.7
Device Control
Average: 8.7
BD
A very comprehensive and granular solution that allows for the automation of a large number of patches regardless of the IT systems! Read review
Ishan P.
IP
We can manage all of our endpoints , settings from a one dashboard. Such as we can manage BitLocker , Remote Control and Configurations. Read review
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,655 Twitter followers
LinkedIn® Page
www.linkedin.com
418 employees on LinkedIn®
(716)4.8 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Huntress is a comprehensive cybersecurity solution designed specifically for the Fortune 5,000,000 and the managed service providers (MSPs) that support them. This platform combines advanced technolog

    Users
    • Owner
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 81% Small-Business
    • 16% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntress Managed EDR features and usability ratings that predict user satisfaction
    9.3
    Security Validation
    Average: 8.7
    9.3
    Endpoint Intelligence
    Average: 8.7
    8.9
    Compliance
    Average: 8.7
    8.2
    Device Control
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • YG
    I've only ever had to contact Huntress Support twice off the back of security incidents that came about due to a historical breach however they... Read review
    SF
    What I love most about Huntress Managed EDR is how it reduces the likelihoods of security gaps. It puts reports of threats into action, preventing... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Ellicott City, US
    Twitter
    @HuntressLabs
    34,350 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    541 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Huntress is a comprehensive cybersecurity solution designed specifically for the Fortune 5,000,000 and the managed service providers (MSPs) that support them. This platform combines advanced technolog

Users
  • Owner
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 81% Small-Business
  • 16% Mid-Market
Huntress Managed EDR features and usability ratings that predict user satisfaction
9.3
Security Validation
Average: 8.7
9.3
Endpoint Intelligence
Average: 8.7
8.9
Compliance
Average: 8.7
8.2
Device Control
Average: 8.7
YG
I've only ever had to contact Huntress Support twice off the back of security incidents that came about due to a historical breach however they... Read review
SF
What I love most about Huntress Managed EDR is how it reduces the likelihoods of security gaps. It puts reports of threats into action, preventing... Read review
Seller Details
Company Website
Year Founded
2015
HQ Location
Ellicott City, US
Twitter
@HuntressLabs
34,350 Twitter followers
LinkedIn® Page
www.linkedin.com
541 employees on LinkedIn®
(788)4.6 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Atera is transforming IT management for enterprise IT departments and MSPs with our all-in-one Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation platform, now powered by Acti

    Users
    • Owner
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 60% Small-Business
    • 36% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Atera is an IT management platform that combines remote monitoring, ticket management, and task automation, aiming to simplify IT operations.
    • Users frequently mention the platform's ease of use, cost-effective per-technician pricing model, and its automation features that enhance productivity by reducing manual tasks.
    • Users reported performance issues such as the Atera Agent being slow or crashing, basic SNMP monitoring feature, and concerns over recent price increases.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Atera features and usability ratings that predict user satisfaction
    7.5
    Security Validation
    Average: 8.7
    7.8
    Endpoint Intelligence
    Average: 8.7
    7.7
    Compliance
    Average: 8.7
    8.4
    Device Control
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Atera
    Company Website
    Year Founded
    2011
    HQ Location
    Tel Aviv
    Twitter
    @AteraCloud
    1,592 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    386 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Atera is transforming IT management for enterprise IT departments and MSPs with our all-in-one Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation platform, now powered by Acti

Users
  • Owner
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 60% Small-Business
  • 36% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Atera is an IT management platform that combines remote monitoring, ticket management, and task automation, aiming to simplify IT operations.
  • Users frequently mention the platform's ease of use, cost-effective per-technician pricing model, and its automation features that enhance productivity by reducing manual tasks.
  • Users reported performance issues such as the Atera Agent being slow or crashing, basic SNMP monitoring feature, and concerns over recent price increases.
Atera features and usability ratings that predict user satisfaction
7.5
Security Validation
Average: 8.7
7.8
Endpoint Intelligence
Average: 8.7
7.7
Compliance
Average: 8.7
8.4
Device Control
Average: 8.7
Seller Details
Seller
Atera
Company Website
Year Founded
2011
HQ Location
Tel Aviv
Twitter
@AteraCloud
1,592 Twitter followers
LinkedIn® Page
www.linkedin.com
386 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    It’s the digital armor protecting you and your business from devastating, multi-layered cyberattacks. The truth is, antivirus just isn't enough anymore. Today’s cybercriminals layer their attack met

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 54% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Webroot Business Endpoint Protection features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.7
    9.0
    Endpoint Intelligence
    Average: 8.7
    9.2
    Compliance
    Average: 8.7
    8.8
    Device Control
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Joshua M.
    JM
    Lightweight software that doesn't slow down our daily users. Doesn't interfere with any programs we use in our company. The cost vs dependability... Read review
    AA
    By choosing a managed Webroot Business Endpoint Protection solution, companies no longer have to worry about malware protection. The managed... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Webroot
    Year Founded
    1997
    HQ Location
    Broomfield, CO
    Twitter
    @Webroot
    62,878 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    276 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

It’s the digital armor protecting you and your business from devastating, multi-layered cyberattacks. The truth is, antivirus just isn't enough anymore. Today’s cybercriminals layer their attack met

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 54% Small-Business
  • 41% Mid-Market
Webroot Business Endpoint Protection features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.7
9.0
Endpoint Intelligence
Average: 8.7
9.2
Compliance
Average: 8.7
8.8
Device Control
Average: 8.7
Joshua M.
JM
Lightweight software that doesn't slow down our daily users. Doesn't interfere with any programs we use in our company. The cost vs dependability... Read review
AA
By choosing a managed Webroot Business Endpoint Protection solution, companies no longer have to worry about malware protection. The managed... Read review
Seller Details
Seller
Webroot
Year Founded
1997
HQ Location
Broomfield, CO
Twitter
@Webroot
62,878 Twitter followers
LinkedIn® Page
www.linkedin.com
276 employees on LinkedIn®
(645)4.5 out of 5
View top Consulting Services for Datto RMM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Datto RMM is a secure, cloud-based platform for IT Managed Service Providers (MSPs) to remotely monitor, manage and support endpoints across their customer base. It provides a multi-tenant view, autom

    Users
    • Owner
    • IT Technician
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 62% Small-Business
    • 34% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Datto RMM is a cloud-based solution for remote monitoring and management, designed to streamline IT infrastructure operations, enhance security, and improve productivity.
    • Users like the comprehensive automation capabilities, real-time monitoring, and seamless integration with other tools, which make managing multiple clients efficient and the software's flexibility to automate routine tasks, deploy software updates, and manage endpoints from a single platform.
    • Reviewers noted that while Datto RMM is powerful, its user interface could benefit from a more streamlined design and navigating through multiple layers to find specific features can be cumbersome for new users, and some tasks might feel a bit technical for non-advanced users.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Datto RMM features and usability ratings that predict user satisfaction
    7.5
    Security Validation
    Average: 8.7
    8.2
    Endpoint Intelligence
    Average: 8.7
    8.0
    Compliance
    Average: 8.7
    8.8
    Device Control
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,686 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,835 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Datto RMM is a secure, cloud-based platform for IT Managed Service Providers (MSPs) to remotely monitor, manage and support endpoints across their customer base. It provides a multi-tenant view, autom

Users
  • Owner
  • IT Technician
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 62% Small-Business
  • 34% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Datto RMM is a cloud-based solution for remote monitoring and management, designed to streamline IT infrastructure operations, enhance security, and improve productivity.
  • Users like the comprehensive automation capabilities, real-time monitoring, and seamless integration with other tools, which make managing multiple clients efficient and the software's flexibility to automate routine tasks, deploy software updates, and manage endpoints from a single platform.
  • Reviewers noted that while Datto RMM is powerful, its user interface could benefit from a more streamlined design and navigating through multiple layers to find specific features can be cumbersome for new users, and some tasks might feel a bit technical for non-advanced users.
Datto RMM features and usability ratings that predict user satisfaction
7.5
Security Validation
Average: 8.7
8.2
Endpoint Intelligence
Average: 8.7
8.0
Compliance
Average: 8.7
8.8
Device Control
Average: 8.7
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,686 Twitter followers
LinkedIn® Page
www.linkedin.com
4,835 employees on LinkedIn®
(447)4.6 out of 5
Optimized for quick response
View top Consulting Services for Sophos Intercept X: Next-Gen Endpoint
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware

    Users
    • IT Manager
    • IT Director
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Mid-Market
    • 21% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sophos Intercept X: Next-Gen Endpoint features and usability ratings that predict user satisfaction
    9.1
    Security Validation
    Average: 8.7
    9.3
    Endpoint Intelligence
    Average: 8.7
    9.2
    Compliance
    Average: 8.7
    9.1
    Device Control
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Utilities
    AU
    I really like that Sophos Intercept-X is simple to deploy but very powerful. It is not an application that sends out lots of noise and alerts - it... Read review
    FS
    We are very satisfied with the product. The overall package compared to the price is coherent. The administration, especially in our environment,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Company Website
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,989 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,763 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware

Users
  • IT Manager
  • IT Director
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Mid-Market
  • 21% Enterprise
Sophos Intercept X: Next-Gen Endpoint features and usability ratings that predict user satisfaction
9.1
Security Validation
Average: 8.7
9.3
Endpoint Intelligence
Average: 8.7
9.2
Compliance
Average: 8.7
9.1
Device Control
Average: 8.7
Verified User in Utilities
AU
I really like that Sophos Intercept-X is simple to deploy but very powerful. It is not an application that sends out lots of noise and alerts - it... Read review
FS
We are very satisfied with the product. The overall package compared to the price is coherent. The administration, especially in our environment,... Read review
Seller Details
Seller
Sophos
Company Website
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,989 Twitter followers
LinkedIn® Page
www.linkedin.com
4,763 employees on LinkedIn®
(472)4.4 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Built with security in mind, N-central provides the visibility a

    Users
    • President
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 61% Small-Business
    • 34% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • N-able N-central features and usability ratings that predict user satisfaction
    7.0
    Security Validation
    Average: 8.7
    7.5
    Endpoint Intelligence
    Average: 8.7
    7.3
    Compliance
    Average: 8.7
    8.7
    Device Control
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Electrical/Electronic Manufacturing
    AE
    Simple to use, setup and once implemented, it runs almost maintenance free. It's a set and forget system which i really like. It was easy to... Read review
    BG
    The interface is intuitive and makes finding devices and indepth info on them very easy. Filtering system is very robust and really helps target... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-able
    Company Website
    HQ Location
    Morrisville, North Carolina
    Twitter
    @Nable
    16,352 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,807 employees on LinkedIn®
    Ownership
    NYSE: NABL
Product Description
How are these determined?Information
This description is provided by the seller.

Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Built with security in mind, N-central provides the visibility a

Users
  • President
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 61% Small-Business
  • 34% Mid-Market
N-able N-central features and usability ratings that predict user satisfaction
7.0
Security Validation
Average: 8.7
7.5
Endpoint Intelligence
Average: 8.7
7.3
Compliance
Average: 8.7
8.7
Device Control
Average: 8.7
Verified User in Electrical/Electronic Manufacturing
AE
Simple to use, setup and once implemented, it runs almost maintenance free. It's a set and forget system which i really like. It was easy to... Read review
BG
The interface is intuitive and makes finding devices and indepth info on them very easy. Filtering system is very robust and really helps target... Read review
Seller Details
Seller
N-able
Company Website
HQ Location
Morrisville, North Carolina
Twitter
@Nable
16,352 Twitter followers
LinkedIn® Page
www.linkedin.com
1,807 employees on LinkedIn®
Ownership
NYSE: NABL
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Action1 is an autonomous endpoint management platform that is cloud-native, infinitely scalable, highly secure, and configurable in 5 minutes—it just works and is always free for the first 200 endpoin

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 55% Mid-Market
    • 42% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Action1 is a patch management and vulnerability scanning software that helps keep workstations updated and secure.
    • Users frequently mention the ease of use, the ability to deploy updates and run custom scripts, and the efficient patch management as key benefits of Action1.
    • Users mentioned limitations such as the inability to remove old profiles from workstations, limited support for macOS, and the need for improved remote control functions.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Action1 features and usability ratings that predict user satisfaction
    8.9
    Security Validation
    Average: 8.7
    8.8
    Endpoint Intelligence
    Average: 8.7
    9.1
    Compliance
    Average: 8.7
    8.6
    Device Control
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Action1
    Company Website
    Year Founded
    2018
    HQ Location
    Houston, Texas
    Twitter
    @Action1corp
    424 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    53 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Action1 is an autonomous endpoint management platform that is cloud-native, infinitely scalable, highly secure, and configurable in 5 minutes—it just works and is always free for the first 200 endpoin

Users
  • IT Manager
  • Systems Administrator
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 55% Mid-Market
  • 42% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Action1 is a patch management and vulnerability scanning software that helps keep workstations updated and secure.
  • Users frequently mention the ease of use, the ability to deploy updates and run custom scripts, and the efficient patch management as key benefits of Action1.
  • Users mentioned limitations such as the inability to remove old profiles from workstations, limited support for macOS, and the need for improved remote control functions.
Action1 features and usability ratings that predict user satisfaction
8.9
Security Validation
Average: 8.7
8.8
Endpoint Intelligence
Average: 8.7
9.1
Compliance
Average: 8.7
8.6
Device Control
Average: 8.7
Seller Details
Seller
Action1
Company Website
Year Founded
2018
HQ Location
Houston, Texas
Twitter
@Action1corp
424 Twitter followers
LinkedIn® Page
www.linkedin.com
53 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    8.9
    Security Validation
    Average: 8.7
    9.1
    Endpoint Intelligence
    Average: 8.7
    8.9
    Compliance
    Average: 8.7
    9.0
    Device Control
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer & Network Security
    AC
    Easy to deploy Easy to manage Less resources One platform more services Best in the market Well updated and upgraded Great support Read review
    RB
    The best i like is it has lightweight agent than other vendor. Easy to use, no difficulties in console. Easy to implementation agent and make... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    106,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,641 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 39% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
8.9
Security Validation
Average: 8.7
9.1
Endpoint Intelligence
Average: 8.7
8.9
Compliance
Average: 8.7
9.0
Device Control
Average: 8.7
Verified User in Computer & Network Security
AC
Easy to deploy Easy to manage Less resources One platform more services Best in the market Well updated and upgraded Great support Read review
RB
The best i like is it has lightweight agent than other vendor. Easy to use, no difficulties in console. Easy to implementation agent and make... Read review
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
106,406 Twitter followers
LinkedIn® Page
www.linkedin.com
9,641 employees on LinkedIn®
Ownership
NASDAQ: CRWD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 60% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.7
    8.9
    Endpoint Intelligence
    Average: 8.7
    9.4
    Compliance
    Average: 8.7
    9.2
    Device Control
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    We've used ThreatLocker now for over 2 years. We primarily work with micro and small businesses who just expect us to take care of their cyber... Read review
    DF
    ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    1,966 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    528 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 60% Small-Business
  • 33% Mid-Market
ThreatLocker features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.7
8.9
Endpoint Intelligence
Average: 8.7
9.4
Compliance
Average: 8.7
9.2
Device Control
Average: 8.7
Verified User in Information Technology and Services
AI
We've used ThreatLocker now for over 2 years. We primarily work with micro and small businesses who just expect us to take care of their cyber... Read review
DF
ThreatLocker has the best customer service we have experienced. VERY fast to respond and assist with support request. Super knowledgeable and... Read review
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
1,966 Twitter followers
LinkedIn® Page
www.linkedin.com
528 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Central is a secure, cloud-based remote monitoring and management solution enabling IT professionals to effectively monitor, manage, and safeguard their endpoint infrastructure. ​Whether you have rem

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Small-Business
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogMeIn Central features and usability ratings that predict user satisfaction
    8.2
    Security Validation
    Average: 8.7
    8.2
    Endpoint Intelligence
    Average: 8.7
    8.5
    Compliance
    Average: 8.7
    9.2
    Device Control
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Chemicals
    IC
    Proper categorization for all kinds of softwares with number of reviews easily visible to gage the interest of industry users. Read review
    Verified User in Computer Networking
    CC
    One of the better remote access / unattended access providers. Of the ones I tested, this one had the fewest issues reconnecting on restart... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    GoTo
    Year Founded
    2003
    HQ Location
    Boston, MA
    Twitter
    @goto
    46,486 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,144 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Central is a secure, cloud-based remote monitoring and management solution enabling IT professionals to effectively monitor, manage, and safeguard their endpoint infrastructure. ​Whether you have rem

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Small-Business
  • 38% Mid-Market
LogMeIn Central features and usability ratings that predict user satisfaction
8.2
Security Validation
Average: 8.7
8.2
Endpoint Intelligence
Average: 8.7
8.5
Compliance
Average: 8.7
9.2
Device Control
Average: 8.7
Verified User in Chemicals
IC
Proper categorization for all kinds of softwares with number of reviews easily visible to gage the interest of industry users. Read review
Verified User in Computer Networking
CC
One of the better remote access / unattended access providers. Of the ones I tested, this one had the fewest issues reconnecting on restart... Read review
Seller Details
Seller
GoTo
Year Founded
2003
HQ Location
Boston, MA
Twitter
@goto
46,486 Twitter followers
LinkedIn® Page
www.linkedin.com
1,144 employees on LinkedIn®
(183)4.7 out of 5
Optimized for quick response
View top Consulting Services for SentinelOne Singularity
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity features and usability ratings that predict user satisfaction
    9.0
    Security Validation
    Average: 8.7
    9.1
    Endpoint Intelligence
    Average: 8.7
    9.0
    Compliance
    Average: 8.7
    8.8
    Device Control
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • EC
    Sentinel One provides best endpoint protection and also Sentinel allows the user to revert their machine to the previous version of a certain... Read review
    Henri H.
    HH
    Between the quality of the analyses and the price, it is a good alternative to protect your computer. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    54,520 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,802 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 38% Enterprise
SentinelOne Singularity features and usability ratings that predict user satisfaction
9.0
Security Validation
Average: 8.7
9.1
Endpoint Intelligence
Average: 8.7
9.0
Compliance
Average: 8.7
8.8
Device Control
Average: 8.7
EC
Sentinel One provides best endpoint protection and also Sentinel allows the user to revert their machine to the previous version of a certain... Read review
Henri H.
HH
Between the quality of the analyses and the price, it is a good alternative to protect your computer. Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
54,520 Twitter followers
LinkedIn® Page
www.linkedin.com
2,802 employees on LinkedIn®