# Best Endpoint Security Services Providers - Page 3

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Endpoint security services assist in the protection of employee devices, including laptops and smartphones, from cyberattacks and other external threats. Endpoint security is designed specifically to protect devices that can access a company network remotely and is used in conjunction with [network security](https://www.g2.com/categories/network-security-services), which protects devices connected via a secure, in-house network infrastructure. Businesses can work with endpoint security providers to ensure that all outside access to a company network is safe from potential issues such as breaches, viruses, ransomware, and data theft. These services can also ensure that remote devices are checked should they attempt connecting to an in-house network.

Endpoint security services go hand in hand with [data security](https://www.g2.com/categories/data-security-services), [email security](https://www.g2.com/categories/email-security-services), and other [cybersecurity services](https://www.g2.com/categories/cybersecurity-services) to keep companies aware of threats, safe from attacks, and prepared to respond in the event of an incident. Businesses can deploy [endpoint protection](https://www.g2.com/categories/endpoint-protection) and [mobile data security](https://www.g2.com/categories/mobile-data-security) software to supplement endpoint security services and maximize protection efforts.





## Category Overview

**Total Products under this Category:** 58


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 300+ Authentic Reviews
- 58+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Top-Rated Products (Ranked by G2 Score)
  ### 1. [Stealth - ISS Group](https://www.g2.com/products/stealth-iss-group/reviews)
  Stealth – ISS Group® Inc. (est. 2002) is your extended IT, cyber security, risk and compliance team and provides strategic guidance, engineering and audit services, along with technical remediation and security operations. We pride ourselves on the quality and professionalism of our workforce, collaborative relationships with our clients, and our ability to bring you innovative, customized but affordable vendor-agnostic solutions based on your immediate needs while aligning with your business strategy and operations. We are a Woman Owned, Service-Disabled Veteran Owned Small Business (SDVO) passionate about protecting companies and agencies from all facets of cyber-crime, protecting your people and company data, reducing your information and financial losses, and protecting your reputation. Governance, Risk &amp; Compliance Guidance: PCI-DSS, ISO 27001/2, NIST-800, FISMA, HIPAA, SSAE 18, GDPR, SOX, GLBA, COBIT, FFIEC, CMMC, RMF and more. Cybersecurity Consulting Services: Third-Party Assessments, Penetration Testing, Ethical Hacking, Cloud Security, Policies &amp; Procedures, Security Strategy, Regulatory Compliance, Virtual CISO, Web Security, Application Security and more. Security Operations: SOC, Incident Response, Digital Forensics, Vulnerability Assessments, Threat Hunting and more. Infrastructure Security: Network Security, SCADA &amp; ICS, IDS / IPS / Load Balancers / Firewalls and more. IT Security Consulting: Disaster Recovery &amp; Business Continuity, IT Process Improvement, Transitions &amp; Transformations, Strategic Consulting, Interim Senior Management, PMO, IT Program Management, Technology to Market Consulting, Target Operating Model and more. Thinking Forwards: Blockchain Security, IoT Security, Dark Web Security, Zero-Day and more. Managed Services: Data Risk Intelligence, Threat Monitoring, Managed Detection and Response, SOC-as-a-Service, Simulated Security Testing, Dark Web Assessments, Network Security, and Incident Response.




**Seller Details:**

- **Seller:** [Stealth - ISS Group](https://www.g2.com/sellers/stealth-iss-group)
- **Year Founded:** 2002
- **HQ Location:** Arlington, US
- **LinkedIn® Page:** https://www.linkedin.com/company/stealth-issgroup (10 employees on LinkedIn®)



  ### 2. [Tapestry Technologies](https://www.g2.com/products/tapestry-technologies/reviews)
  The basic foundation of Tapestry Technologies is built on our cyber defense capabilities. Tapestry personnel have provided support to key cyber programs that have evolved how the DoD handles security.




**Seller Details:**

- **Seller:** [Tapestry Technologies](https://www.g2.com/sellers/tapestry-technologies)
- **Year Founded:** 2005
- **HQ Location:** Chambersburg, US
- **Twitter:** @tapestrytech (69 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/371770 (31 employees on LinkedIn®)



  ### 3. [Techvera](https://www.g2.com/products/techvera/reviews)
  Techvera helps your small to medium organization optimize for maximum growth and efficiency using the power of modern technology




**Seller Details:**

- **Seller:** [Electric AI](https://www.g2.com/sellers/electric-ai)
- **Year Founded:** 2016
- **HQ Location:** New York, NY
- **Twitter:** @Electric_AI (1,552 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/15212511/ (432 employees on LinkedIn®)



  ### 4. [TPx](https://www.g2.com/products/tpx/reviews)
  TPx Managed Services is a flexible portfolio of IT services designed to help organizations design, operate, and optimize secure, reliable, and high-performance technology environments. TPx supports customers across the full IT lifecycle, offering advisory services, professional services, co-managed options, and fully managed services based on each organization’s needs. Rather than delivering one-size-fits-all outsourcing, TPx Managed Services is built to meet organizations where they are: whether they need guidance on strategy, help implementing new technologies, or ongoing management and monitoring of critical systems. Services are commonly used by organizations with distributed locations, hybrid workforces, and growing security or operational complexity. TPx Managed Services spans multiple technology domains, allowing customers to consolidate vendors while maintaining visibility and control. Key capabilities include: Managed Networking and Connectivity Design, deployment, monitoring, and management of SASE, business internet, WAN, LAN, SD-WAN, and edge environments to support performance and reliability across locations. Managed Security Services Ongoing management of security technologies and controls, including endpoint security, managed detection and response (MDR), DNS protection, firewall, and secure access frameworks (SSE). Managed Collaboration and Communications Support for unified communications, contact center solutions, and Microsoft 365 environments to enable secure collaboration and productivity. Advisory and Professional Services Compliance guidance, assessments, architecture design, implementation support, and project-based services to help organizations modernize IT environments without disrupting existing systems. Flexible Engagement Models Options for advisory-only, co-managed, or fully managed services, allowing internal IT teams to retain control while extending their capabilities. TPx Managed Services includes 24/7 monitoring, ongoing optimization, and access to technical expertise, helping organizations reduce operational burden while maintaining alignment with business goals. By combining guidance, implementation, and long-term management, TPx supports organizations as their technology needs evolve over time. Learn more at www.tpx.com.


  **Average Rating:** 3.5/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [TPx](https://www.g2.com/sellers/tpx)
- **Company Website:** https://www.tpx.com/
- **Year Founded:** 1998
- **HQ Location:** Austin, Texas, United States
- **Twitter:** @TPxComm (3,209 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/tpx-communications (1,013 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Enterprise


  ### 5. [Transparity](https://www.g2.com/products/transparity/reviews)
  As a trusted pureplay Microsoft partner, we are at the forefront of the latest technology. We have one simple goal: to partner with you to ensure that your technology investment truly makes a difference to your organisation. Our technical expertise is just one part of what makes Transparity great. Transparity stands for “transformation, partnership and clarity”, and we pride ourselves in the ability to work with you to enable business transformation. As your trusted partner, we deliver solutions based on what will work best for your organisation and users, moving you away from old technology and old thinking into the digital and AI age. Through careful consultation, we work with you to strategise, design and deliver solutions that will streamline efficiencies, improve communications, enhance collaboration and empower your workforce. Technology Powerhouse Here at Transparity we pride ourselves in being unashamedly technical. We hold all 6 Microsoft Partner Designations, Azure Expert MSP status and an incredible 18 specialisations. - Digital &amp; App Innovation - Data &amp; AI - Azure Infrastructure - Security - Modern Work - Business Applications We adhere to a number of elite standards, giving you confidence that you are working with a partner who strives to be the very best.




**Seller Details:**

- **Seller:** [Transparity](https://www.g2.com/sellers/transparity)
- **HQ Location:** London, GB
- **LinkedIn® Page:** https://www.linkedin.com/company/transparity (272 employees on LinkedIn®)



  ### 6. [UltraViolet Cyber](https://www.g2.com/products/ultraviolet-cyber/reviews)
  UltraViolet is an industry-leading tech-enabled managed security services company. Founded and operated by security practitioners from the national intelligence community, and currently providing services to the Global 2000 and Federal Government. UltraViolet transforms your security program through connecting offensive security, detection and response, and security engineering. Instead of complex operational silos, you get integrated, unified security response. Meeting you where you are in your cyber program journey, we manage existing enterprise platforms you have invested in or provide all necessary tooling through our security-as-a-service solution, UV Lens. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.




**Seller Details:**

- **Seller:** [UltraViolet Cyber](https://www.g2.com/sellers/ultraviolet-cyber)
- **HQ Location:** McLean, US
- **LinkedIn® Page:** https://www.linkedin.com/company/uvcyber (405 employees on LinkedIn®)



  ### 7. [UST](https://www.g2.com/products/ust/reviews)
  UST is a global technology and consulting firm that specializes in providing transformative solutions to businesses across various industries. Established in 1999, UST leverages advanced technologies, including artificial intelligence, to help organizations navigate complex challenges and drive meaningful change. The firm partners with clients from the initial design phase through to operational execution, ensuring that every aspect of the transformation journey is aligned with their strategic goals. Targeting a diverse range of industries, UST caters to businesses seeking to enhance their operational efficiency, innovate their product offerings, and improve customer experiences. The firm’s comprehensive suite of services includes AI-driven digital solutions, proprietary platforms, engineering, research and development, and an innovation ecosystem designed to address core business challenges. This multifaceted approach enables organizations to not only adapt to the rapidly changing market landscape but also to thrive within it, making UST a valuable ally in the pursuit of business excellence. UST’s key features include a deep understanding of industry dynamics, a commitment to innovation, and a focus on agility. By infusing these elements into client organizations, UST helps to create sustainable value and foster positive change. The firm’s expertise allows it to tailor solutions that meet the unique needs of each client, ensuring that the strategies implemented are both effective and impactful. This personalized approach is a significant differentiator in the competitive landscape of technology consulting, setting UST apart as a leader in the field. The benefits of partnering with UST extend beyond immediate operational improvements. By harnessing the power of technology and AI, UST empowers organizations to make data-driven decisions, streamline processes, and enhance customer engagement. The firm’s commitment to building a future-ready mindset within client organizations helps them stay ahead of industry trends and anticipate changes in consumer behavior. With a workforce of over 30,000 employees across more than 30 countries, UST is well-positioned to deliver solutions that resonate on a global scale, ultimately touching billions of lives. Through its collaborative approach and extensive expertise, UST stands out as a trusted partner for organizations looking to embark on their transformation journeys. By focusing on measurable outcomes and fostering a culture of innovation, UST not only addresses immediate business needs but also lays the groundwork for long-term success and resilience in an ever-evolving marketplace. The firm’s dedication to understanding and responding to the unique challenges faced by its clients ensures that UST remains a pivotal player in the technology consulting sector.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 6


**Seller Details:**

- **Seller:** [UST](https://www.g2.com/sellers/ust)
- **Company Website:** https://www.ust.com/
- **Year Founded:** 1999
- **HQ Location:** Aliso Viejo, California, United States
- **Twitter:** @USTGlobal (16,491 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/ustglobal (38,088 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Enterprise, 17% Mid-Market


#### Pros & Cons

**Pros:**

- Efficiency (3 reviews)
- Reliability (3 reviews)
- Technical Expertise (3 reviews)
- Knowledge (2 reviews)
- Quality (2 reviews)

**Cons:**

- Expensive (2 reviews)
- Complexity (1 reviews)
- Dependency Issues (1 reviews)
- Performance Issues (1 reviews)
- Staff Turnover (1 reviews)

  ### 8. [Veuz Endpoint Security](https://www.g2.com/products/veuz-endpoint-security/reviews)
  Kaspersky Endpoint Security Cloud is a versatile cybersecurity solution offering real-time protection and remote management for businesses. It scales to fit different organizations, ensuring data and endpoint security.




**Seller Details:**

- **Seller:** [Veuz Concepts](https://www.g2.com/sellers/veuz-concepts)
- **Year Founded:** 2008
- **HQ Location:** Kozhikode, IN
- **LinkedIn® Page:** https://www.linkedin.com/company/veuzconcepts/ (77 employees on LinkedIn®)





## Parent Category

[Security and Privacy Services Providers](https://www.g2.com/categories/security-and-privacy-services)





