2026 Best Software Awards are here!See the list

Top Free Endpoint Protection Platforms

Check out our list of free Endpoint Protection Platforms. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Endpoint Protection Platforms to ensure you get the right product.

View Free Endpoint Protection Platforms

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
23 Endpoint Protection Platforms Products Available
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine Endpoint Central is an all-in-one unified endpoint management and security (UEMS) solution that delivers end-to-end life cycle management and endpoint protection. From automated multi-OS

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 65% Mid-Market
    • 23% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Endpoint Central features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Banking
    CB
    Ease of Integration, Ease of Implementation Read review
    LL
    I use ManageEngine Endpoint Central for patching endpoints, mobile device management, remote assistance for employees, and pushing software to... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zoho
    Year Founded
    1996
    HQ Location
    Austin, TX
    Twitter
    @Zoho
    137,088 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    29,794 employees on LinkedIn®
    Phone
    +1 (888) 900-9646
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine Endpoint Central is an all-in-one unified endpoint management and security (UEMS) solution that delivers end-to-end life cycle management and endpoint protection. From automated multi-OS

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 65% Mid-Market
  • 23% Enterprise
ManageEngine Endpoint Central features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Banking
CB
Ease of Integration, Ease of Implementation Read review
LL
I use ManageEngine Endpoint Central for patching endpoints, mobile device management, remote assistance for employees, and pushing software to... Read review
Seller Details
Seller
Zoho
Year Founded
1996
HQ Location
Austin, TX
Twitter
@Zoho
137,088 Twitter followers
LinkedIn® Page
www.linkedin.com
29,794 employees on LinkedIn®
Phone
+1 (888) 900-9646
(1,071)4.6 out of 5
Optimized for quick response
3rd Easiest To Use in Endpoint Protection Platforms software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – to protect people, devices, and dat

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Small-Business
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatDown features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Compliance
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 9.0
    8.9
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HH
    Very simple and user friendly, does exactly what it says it does. quick to roll out to staff. quick support as well. Read review
    Verified User in Computer & Network Security
    CC
    Ease of use, sophistication of service for price, central portal for management. I use this on client servers/pc's along side Windows Defender... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Santa Clara, CA
    Twitter
    @Malwarebytes
    86,636 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    613 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatDown solutions simplify endpoint security by combining Malwarebytes’ award-winning detection and remediation with quick deployment in an easy user-interface – to protect people, devices, and dat

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Small-Business
  • 42% Mid-Market
ThreatDown features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
9.1
Compliance
Average: 8.9
9.0
Endpoint Intelligence
Average: 9.0
8.9
Behavioral Analysis
Average: 8.7
HH
Very simple and user friendly, does exactly what it says it does. quick to roll out to staff. quick support as well. Read review
Verified User in Computer & Network Security
CC
Ease of use, sophistication of service for price, central portal for management. I use this on client servers/pc's along side Windows Defender... Read review
Seller Details
Company Website
Year Founded
2008
HQ Location
Santa Clara, CA
Twitter
@Malwarebytes
86,636 Twitter followers
LinkedIn® Page
www.linkedin.com
613 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(821)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Endpoint Protection Platforms software
View top Consulting Services for Sophos Endpoint
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sophos Endpoint is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Sophos Endpoint has been proven to prevent even the most advanced ransomwar

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Mid-Market
    • 18% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sophos Endpoint features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Compliance
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 9.0
    9.2
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • PD
    I love how Sophos Endpoint offers easy deployment through Group Policy Object (GPO), which streamlines the installation process across multiple... Read review
    KJ
    This is a very good and cost-effective solution. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Company Website
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,754 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,477 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sophos Endpoint is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Sophos Endpoint has been proven to prevent even the most advanced ransomwar

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Mid-Market
  • 18% Enterprise
Sophos Endpoint features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 8.9
9.3
Compliance
Average: 8.9
9.4
Endpoint Intelligence
Average: 9.0
9.2
Behavioral Analysis
Average: 8.7
PD
I love how Sophos Endpoint offers easy deployment through Group Policy Object (GPO), which streamlines the installation process across multiple... Read review
KJ
This is a very good and cost-effective solution. Read review
Seller Details
Seller
Sophos
Company Website
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,754 Twitter followers
LinkedIn® Page
www.linkedin.com
5,477 employees on LinkedIn®
(933)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Endpoint Protection Platforms software
View top Consulting Services for ESET PROTECT
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Small-Business
    • 46% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Compliance
    Average: 8.9
    9.2
    Endpoint Intelligence
    Average: 9.0
    8.8
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • FP
    It's a very reliable platform that works flawlessly. It allows you to easily manage all your devices from a single console. The best feature I've... Read review
    SG
    I use ESET PROTECT for software and device protection as it safeguards files, folders, and scans them for threats. It ensures a stable and reliable... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    276,921 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,944 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Small-Business
  • 46% Mid-Market
ESET PROTECT features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
9.3
Compliance
Average: 8.9
9.2
Endpoint Intelligence
Average: 9.0
8.8
Behavioral Analysis
Average: 8.7
FP
It's a very reliable platform that works flawlessly. It allows you to easily manage all your devices from a single console. The best feature I've... Read review
SG
I use ESET PROTECT for software and device protection as it safeguards files, folders, and scans them for threats. It ensures a stable and reliable... Read review
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
276,921 Twitter followers
LinkedIn® Page
www.linkedin.com
1,944 employees on LinkedIn®
(472)4.8 out of 5
7th Easiest To Use in Endpoint Protection Platforms software
View top Consulting Services for ThreatLocker Platform
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatLocker is a comprehensive cybersecurity solution designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This s

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Compliance
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 9.0
    8.5
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • DS
    I like the ThreatLocker Platform because of its intuitiveness and ease of use. Setting it up was super easy for my team. Also, we switched from... Read review
    AT
    I like the price and scalability of ThreatLocker Platform, as well as the reporting and management aspects. It's great that I used to have multiple... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,721 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    677 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatLocker is a comprehensive cybersecurity solution designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This s

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Small-Business
  • 33% Mid-Market
ThreatLocker Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 8.9
9.3
Compliance
Average: 8.9
9.0
Endpoint Intelligence
Average: 9.0
8.5
Behavioral Analysis
Average: 8.7
DS
I like the ThreatLocker Platform because of its intuitiveness and ease of use. Setting it up was super easy for my team. Also, we switched from... Read review
AT
I like the price and scalability of ThreatLocker Platform, as well as the reporting and management aspects. It's great that I used to have multiple... Read review
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,721 Twitter followers
LinkedIn® Page
www.linkedin.com
677 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    It’s the digital armor protecting you and your business from devastating, multi-layered cyberattacks. The truth is, antivirus just isn't enough anymore. Today’s cybercriminals layer their attack met

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 54% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Webroot Business Endpoint Protection features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 8.9
    8.8
    Compliance
    Average: 8.9
    9.0
    Endpoint Intelligence
    Average: 9.0
    8.8
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Joshua M.
    JM
    Lightweight software that doesn't slow down our daily users. Doesn't interfere with any programs we use in our company. The cost vs dependability... Read review
    AA
    By choosing a managed Webroot Business Endpoint Protection solution, companies no longer have to worry about malware protection. The managed... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Webroot
    Year Founded
    1997
    HQ Location
    Broomfield, CO
    Twitter
    @Webroot
    60,439 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    251 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

It’s the digital armor protecting you and your business from devastating, multi-layered cyberattacks. The truth is, antivirus just isn't enough anymore. Today’s cybercriminals layer their attack met

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 54% Small-Business
  • 41% Mid-Market
Webroot Business Endpoint Protection features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 8.9
8.8
Compliance
Average: 8.9
9.0
Endpoint Intelligence
Average: 9.0
8.8
Behavioral Analysis
Average: 8.7
Joshua M.
JM
Lightweight software that doesn't slow down our daily users. Doesn't interfere with any programs we use in our company. The cost vs dependability... Read review
AA
By choosing a managed Webroot Business Endpoint Protection solution, companies no longer have to worry about malware protection. The managed... Read review
Seller Details
Seller
Webroot
Year Founded
1997
HQ Location
Broomfield, CO
Twitter
@Webroot
60,439 Twitter followers
LinkedIn® Page
www.linkedin.com
251 employees on LinkedIn®
(231)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Endpoint Protection Platforms software
Entry Level Price:Starting at $9.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 57% Mid-Market
    • 36% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro Cybersecurity is a product that provides a variety of cybersecurity functions through a single dashboard, including end user security, email security, and device security.
    • Users frequently mention the ease of use, the intuitive design, the quick setup, and the dedicated customer support as standout features of Coro Cybersecurity.
    • Users reported issues with the sensitivity of detection leading to false positives, compatibility issues with some macOS versions, and a desire for more individual configuration options and additional features.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    9.7
    Compliance
    Average: 8.9
    9.8
    Endpoint Intelligence
    Average: 9.0
    9.7
    Behavioral Analysis
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,900 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    295 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 57% Mid-Market
  • 36% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro Cybersecurity is a product that provides a variety of cybersecurity functions through a single dashboard, including end user security, email security, and device security.
  • Users frequently mention the ease of use, the intuitive design, the quick setup, and the dedicated customer support as standout features of Coro Cybersecurity.
  • Users reported issues with the sensitivity of detection leading to false positives, compatibility issues with some macOS versions, and a desire for more individual configuration options and additional features.
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
9.7
Compliance
Average: 8.9
9.8
Endpoint Intelligence
Average: 9.0
9.7
Behavioral Analysis
Average: 8.7
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,900 Twitter followers
LinkedIn® Page
www.linkedin.com
295 employees on LinkedIn®
(384)4.7 out of 5
Optimized for quick response
5th Easiest To Use in Endpoint Protection Platforms software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

    Users
    • Security Analyst
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Enterprise
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Compliance
    Average: 8.9
    9.4
    Endpoint Intelligence
    Average: 9.0
    9.3
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Bibek M.
    BM
    The best part is definitely the single, lightweight agent. Unlike our old antivirus, which used to slow down laptops and require constant reboots... Read review
    MN
    CrowdStrike Falcon endpoint protection platform and it is could native architecture real time threat detection and response. CrowdStrike provides... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    109,523 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,831 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Organizations today face a serious challenge: managing numerous security vendors and tools while confronting an ever-evolving threat landscape. Sophisticated adversaries are becoming smarter, faster,

Users
  • Security Analyst
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Enterprise
  • 42% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.2
Compliance
Average: 8.9
9.4
Endpoint Intelligence
Average: 9.0
9.3
Behavioral Analysis
Average: 8.7
Bibek M.
BM
The best part is definitely the single, lightweight agent. Unlike our old antivirus, which used to slow down laptops and require constant reboots... Read review
MN
CrowdStrike Falcon endpoint protection platform and it is could native architecture real time threat detection and response. CrowdStrike provides... Read review
Seller Details
Company Website
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
109,523 Twitter followers
LinkedIn® Page
www.linkedin.com
10,831 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Delivered from the cloud or on-premises, Kaspersky Endpoint Security for Business provides flexible security for mixed environments, incorporating a full stack of ‘building blocks’ to deliver automate

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kaspersky Next Optimum features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.9
    Compliance
    Average: 8.9
    8.9
    Endpoint Intelligence
    Average: 9.0
    8.7
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VIDYASAGARREDDY K.
    VK
    Security and Cost-efficient easy to use, blocking USB ports installation process is very simple. Read review
    Verified User in Transportation/Trucking/Railroad
    AT
    price, security and support are top notch Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaspersky
    Year Founded
    1997
    HQ Location
    Moscow
    Twitter
    @kasperskylabind
    1,294 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,494 employees on LinkedIn®
    Phone
    1-866-328-5700
Product Description
How are these determined?Information
This description is provided by the seller.

Delivered from the cloud or on-premises, Kaspersky Endpoint Security for Business provides flexible security for mixed environments, incorporating a full stack of ‘building blocks’ to deliver automate

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Mid-Market
  • 33% Small-Business
Kaspersky Next Optimum features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 8.9
8.9
Compliance
Average: 8.9
8.9
Endpoint Intelligence
Average: 9.0
8.7
Behavioral Analysis
Average: 8.7
VIDYASAGARREDDY K.
VK
Security and Cost-efficient easy to use, blocking USB ports installation process is very simple. Read review
Verified User in Transportation/Trucking/Railroad
AT
price, security and support are top notch Read review
Seller Details
Seller
Kaspersky
Year Founded
1997
HQ Location
Moscow
Twitter
@kasperskylabind
1,294 Twitter followers
LinkedIn® Page
www.linkedin.com
4,494 employees on LinkedIn®
Phone
1-866-328-5700
(201)4.2 out of 5
Optimized for quick response
View top Consulting Services for IBM MaaS360
Entry Level Price:$4.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its

    Users
    • IT Manager
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Mid-Market
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM MaaS360 features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Compliance
    Average: 8.9
    7.5
    Endpoint Intelligence
    Average: 9.0
    6.7
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Yash K.
    YK
    I like it becasue it has features like easy device enrollment that makes it ease of use, one can manage application and also deploy policies... Read review
    Verified User in Information Technology and Services
    UI
    - easy device management -UI is great and easy to use - security is also good - also I liked that we can integrate with other apps well Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,081 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its

Users
  • IT Manager
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Mid-Market
  • 34% Enterprise
IBM MaaS360 features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 8.9
9.6
Compliance
Average: 8.9
7.5
Endpoint Intelligence
Average: 9.0
6.7
Behavioral Analysis
Average: 8.7
Yash K.
YK
I like it becasue it has features like easy device enrollment that makes it ease of use, one can manage application and also deploy policies... Read review
Verified User in Information Technology and Services
UI
- easy device management -UI is great and easy to use - security is also good - also I liked that we can integrate with other apps well Read review
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,081 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
(247)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Endpoint Protection Platforms software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynet is the unified, AI-powered cybersecurity platform that delivers robust and comprehensive protection for security teams while maximizing operational efficiency for managed service providers (MSPs

    Users
    • SOC Analyst
    • Technical Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 58% Mid-Market
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynet features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Compliance
    Average: 8.9
    9.5
    Endpoint Intelligence
    Average: 9.0
    9.4
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AT
    The platform is user friendly and easy to use, there are several protection engines to ensure the security of devices where antivirus is installed.... Read review
    GI
    Cynet is a Leader in Cynersecurity and with this platform i find all that i need, deploy agent with centralized console, fully cloud system so i... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynet
    Company Website
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @Cynet360
    1,129 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    329 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cynet is the unified, AI-powered cybersecurity platform that delivers robust and comprehensive protection for security teams while maximizing operational efficiency for managed service providers (MSPs

Users
  • SOC Analyst
  • Technical Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 58% Mid-Market
  • 30% Small-Business
Cynet features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 8.9
9.3
Compliance
Average: 8.9
9.5
Endpoint Intelligence
Average: 9.0
9.4
Behavioral Analysis
Average: 8.7
AT
The platform is user friendly and easy to use, there are several protection engines to ensure the security of devices where antivirus is installed.... Read review
GI
Cynet is a Leader in Cynersecurity and with this platform i find all that i need, deploy agent with centralized console, fully cloud system so i... Read review
Seller Details
Seller
Cynet
Company Website
Year Founded
2014
HQ Location
Boston, MA
Twitter
@Cynet360
1,129 Twitter followers
LinkedIn® Page
www.linkedin.com
329 employees on LinkedIn®
(122)4.4 out of 5
Optimized for quick response
View top Consulting Services for WatchGuard Endpoint Security
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WatchGuard Endpoint Security solutions help you safeguard devices against cyber threats. WatchGuard EPDR and Advanced EPDR, our AI-powered flagship endpoint solutions, enhance your security posture by

    Users
    • IT Manager
    • Software Developer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 55% Small-Business
    • 34% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WatchGuard Endpoint Security features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 8.9
    8.8
    Compliance
    Average: 8.9
    9.3
    Endpoint Intelligence
    Average: 9.0
    8.7
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Steven D.
    SD
    It is a quality antivirus, with its EP and EDR solutions, it quickly detects with a thorough analysis any threat that may be lurking in my work... Read review
    Verified User in Construction
    AC
    I have been using Adaptive Defense for over three years now across over 200 devices and its an excellent product, prior to moving to it I had... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1996
    HQ Location
    Seatle, WA
    Twitter
    @watchguard
    19,499 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,217 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

WatchGuard Endpoint Security solutions help you safeguard devices against cyber threats. WatchGuard EPDR and Advanced EPDR, our AI-powered flagship endpoint solutions, enhance your security posture by

Users
  • IT Manager
  • Software Developer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 55% Small-Business
  • 34% Mid-Market
WatchGuard Endpoint Security features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 8.9
8.8
Compliance
Average: 8.9
9.3
Endpoint Intelligence
Average: 9.0
8.7
Behavioral Analysis
Average: 8.7
Steven D.
SD
It is a quality antivirus, with its EP and EDR solutions, it quickly detects with a thorough analysis any threat that may be lurking in my work... Read review
Verified User in Construction
AC
I have been using Adaptive Defense for over three years now across over 200 devices and its an excellent product, prior to moving to it I had... Read review
Seller Details
Company Website
Year Founded
1996
HQ Location
Seatle, WA
Twitter
@watchguard
19,499 Twitter followers
LinkedIn® Page
www.linkedin.com
1,217 employees on LinkedIn®
(198)4.7 out of 5
Optimized for quick response
View top Consulting Services for SentinelOne Singularity Endpoint
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 37% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Endpoint features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.8
    Compliance
    Average: 8.9
    9.5
    Endpoint Intelligence
    Average: 9.0
    9.6
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AB
    Proactive Hunting: The platform provides tools for security teams to proactively hunt for threats hidden within their network. This proactive... Read review
    Verified User in Computer & Network Security
    AC
    Easy to roll out and install Not resource intensive on machines Console is easy to use and configure/troubelshoot issues. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    57,276 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,171 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 37% Enterprise
SentinelOne Singularity Endpoint features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
8.8
Compliance
Average: 8.9
9.5
Endpoint Intelligence
Average: 9.0
9.6
Behavioral Analysis
Average: 8.7
AB
Proactive Hunting: The platform provides tools for security teams to proactively hunt for threats hidden within their network. This proactive... Read review
Verified User in Computer & Network Security
AC
Easy to roll out and install Not resource intensive on machines Console is easy to use and configure/troubelshoot issues. Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
57,276 Twitter followers
LinkedIn® Page
www.linkedin.com
3,171 employees on LinkedIn®
(93)4.6 out of 5
15th Easiest To Use in Endpoint Protection Platforms software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    • President
    • Owner
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 73% Small-Business
    • 8% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    7.5
    Compliance
    Average: 8.9
    10.0
    Endpoint Intelligence
    Average: 9.0
    10.0
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    One software agent to easily turn on and off needed features. Logical web manage portal, good frequent updates and roadmap. Support team quick to... Read review
    Dakarai B.
    DB
    The best part of Todyl is that it is a single agent to deploy for all features. That simplies deployment and minimizes complexity. The ease of... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
  • President
  • Owner
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 73% Small-Business
  • 8% Mid-Market
Todyl Security Platform features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
7.5
Compliance
Average: 8.9
10.0
Endpoint Intelligence
Average: 9.0
10.0
Behavioral Analysis
Average: 8.7
Verified User in Information Technology and Services
AI
One software agent to easily turn on and off needed features. Logical web manage portal, good frequent updates and roadmap. Support team quick to... Read review
Dakarai B.
DB
The best part of Todyl is that it is a single agent to deploy for all features. That simplies deployment and minimizes complexity. The ease of... Read review
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 43% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    10.0
    Endpoint Intelligence
    Average: 9.0
    10.0
    Behavioral Analysis
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Malcolm T.
    MT
    It's seamless, manageable and barely impacts resources. The management console is clear and support is good when it's (rarely) needed. Read review
    Timothy D.
    TD
    Centrally managed control panel and easy to deploy Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,315 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    228 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 43% Mid-Market
VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
10.0
Endpoint Intelligence
Average: 9.0
10.0
Behavioral Analysis
Average: 8.7
Malcolm T.
MT
It's seamless, manageable and barely impacts resources. The management console is clear and support is good when it's (rarely) needed. Read review
Timothy D.
TD
Centrally managed control panel and easy to deploy Read review
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,315 Twitter followers
LinkedIn® Page
www.linkedin.com
228 employees on LinkedIn®