168 results
Why Capterra is free
Enables endpoint security control providing behavior-based detection and analysis of malware.
Enables endpoint security control providing behavior-based detection and analysis of malware.
Enables endpoint security control providing behavior-based detection and analysis of malware.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Hypori is a highly secure virtual BYOD smartphone solution with 100% separation of personal and enterprise data and zero footprint.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of personal and enterprise data. Hypori is centrally managed, cost-effective, and keeps all apps running in the data center. Hypori makes truly secure BYOD a reality.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Enable administrator to oversee and centrally manage inventory, software distribution, settings and security for Macintoshes.
OS-Easy MMS is a comprehensive management system for iMac and Macbook. With MMS, IT Technicians can manage the software environment of all macOS computers. This includes deploying and maintaining software, enabling different system environment for various teaching scenarios, eliminating security threats, distributing settings, and analyzing inventory data etc. It enables administrators to oversee and centrally manage up to 1000 Macintoshes at one time.
OS-Easy MMS is a comprehensive management system for iMac and Macbook. With MMS, IT Technicians can manage the software environment of all macOS computers. This includes deploying and maintaining...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Reduce the challenges of todays IT environment and improve working practices to protect critical information with Endpoint DLP.
The Clearswift Endpoint Data Loss Prevention (DLP) solution offers three key components that can be deployed together or individually. The first is to gain visibility and control of what removable devices can connect to a company network. The second is to regulate what company data (or files) can be copied to removable media, and encrypt it (if necessary). The third is a data at rest scanning capability which locates where critical information is stored across a network.
The Clearswift Endpoint Data Loss Prevention (DLP) solution offers three key components that can be deployed together or individually. The first is to gain visibility and control of what removable...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console.
Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console.
Identify threats and enforce mobile policy in the enterprise environment with Mobile Defense Enterprise Console.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Network security platform that helps businesses prevent malware, ransomware, and other network attacks from impacting firms.
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running.
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer.
Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer.
Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
The best choice for enterprises or SMB/SMEs looking for an all-inclusive, high-performing, and GDPR-compliant encryption solution
MyDiamo is a comprehensive encryption solution for opensource databases like MySQL, MariaDB, Percona, and PostgreSQL. The free version, as well as commercial license, are both available for enterprises and even non-profit organizations. MyDiamo column-level encryption comes with access control functions, allowing users to monitor and audit data easily, without any code modification required.
MyDiamo is a comprehensive encryption solution for opensource databases like MySQL, MariaDB, Percona, and PostgreSQL. The free version, as well as commercial license, are both available for...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Absolute

Absolute

(0) Local product Local product
Cloud-based platform that provides visibility, control, and security of all your endpoints, data, and users.
Cloud-based platform that provides visibility, control, and security of all your endpoints, data, and users.
Cloud-based platform that provides visibility, control, and security of all your endpoints, data, and users.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing.
Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing.
Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device.
End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device.
End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Silverbolt

Silverbolt

(0) Local product Local product
AI cybersecurity service and endpoint protection.
AI cybersecurity service and endpoint protection.
AI cybersecurity service and endpoint protection.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
REVE Endpoint Security software provides advanced protection for all endpoints of an organization.
REVE Endpoint Security software provides advanced protection for all endpoints of an organization, which are the Launchpad of malware attacks.
REVE Endpoint Security software provides advanced protection for all endpoints of an organization, which are the Launchpad of malware attacks.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing. 3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted. 4. Operation History: Records every detailed user and program action on all PCs.
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection,...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
The most secure cybersecurity software for enterprise companies.
The most secure cybersecurity software for enterprise companies. With a refreshingly new approach, Securden offers complete control over privileged access, visibility without barriers, and superior access governance across cloud, physical, virtual environments.
The most secure cybersecurity software for enterprise companies. With a refreshingly new approach, Securden offers complete control over privileged access, visibility without barriers, and superior...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Instart Web Security provides advanced protection from sophisticated cyber attacks to secure your web apps.
Instart Web Security is designed to secure your web apps from the dangers of the public web. All entry points into your application servers, whether it be your website, your APIs, or your web apps can be protected and secured with Instart Web Security. Instart provides protection across the entire traffic path for your application from inside the browser where customers and attackers interact with your site, to the edge, all the way to your cloud or physical application infrastructure.
Instart Web Security is designed to secure your web apps from the dangers of the public web. All entry points into your application servers, whether it be your website, your APIs, or your web apps...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Multi-layer endpoint solution, enabling manufacturers to secure and monitor high-value IoT devices, including 3rd party components.
Like the Sternum bone in the human body, Sternum's goal is to provide reliable on-device and real-time protection to IoT endpoint devices. Sternum's EIV (Embedded Integrity Verification) prevents cyber-attacks instantly with detecting vulnerability exploitation, including ones originated in 3rd party components. With seamless integration to a variety of development environments, EIV is a highly scalable solution that gives manufacturers the ability to secure their IoT devices from end-to-end.
Like the Sternum bone in the human body, Sternum's goal is to provide reliable on-device and real-time protection to IoT endpoint devices. Sternum's EIV (Embedded Integrity Verification) prevents...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Ideal for small to large enterprises, Morphisec Guard makes breach prevention easy for IT teams of any size in any company.
Ideal for small to large enterprises, Morphisec Guard makes breach prevention easy for IT teams of any size in any company. We are a proactive, prevention-first solution designed to deterministically block evasive, in-memory malware that bypasses detection-based tools.
Ideal for small to large enterprises, Morphisec Guard makes breach prevention easy for IT teams of any size in any company. We are a proactive, prevention-first solution designed to deterministically...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response.
Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response.
Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Endpoint management suite that helps businesses manage device data, automate deployments and resolve user issues on a unified platform.
Endpoint management suite that helps businesses manage device data, automate deployments and resolve user issues on a unified platform.
Endpoint management suite that helps businesses manage device data, automate deployments and resolve user issues on a unified platform.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Security and risk management software to find solutions.
Security and risk management software to find solutions.
Security and risk management software to find solutions.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Password lock your USB Drive on Android & Windows computers.
Password lock your USB Drive on Android & Windows computers.
Password lock your USB Drive on Android & Windows computers.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Cloud-hosted managed service for monitoring and threat hunting
Discover and react to cyber risks that have bypassed other layers of defense with tiered managed services. Instant Response protects intellectual property, customers, employees and stakeholders with unparalleled digital security, forensic investigation capabilities and trained investigators who continuously scan for suspicious activity and provide a hands-on analysis of potential threats undetectable by automated tools.
Discover and react to cyber risks that have bypassed other layers of defense with tiered managed services. Instant Response protects intellectual property, customers, employees and stakeholders with...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
The first software-only solution for high-trust operations from insecure IoT devices. Secure any key, anywhere.
Unbounds CoT protects any local key on an endpoint device by eliminating the single point of compromise. Key material is never whole; each key exists as two random key shares one on the device and one on a remote server. This ensures that keys on endpoint devices always remain secure -- even in the presence of malware or a malicious actor fully controlling the device.
Unbounds CoT protects any local key on an endpoint device by eliminating the single point of compromise. Key material is never whole; each key exists as two random key shares one on the device and...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Helps to protect routers from unauthorized use with virtual hot-patching.
Helps to protect routers from unauthorized use with virtual hot-patching.
Helps to protect routers from unauthorized use with virtual hot-patching.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
zIPS secures BYOD and corporate-owned mobile devices while protecting user privacy so that employees can safely access enterprise data.
Zimperium zIPS is a Mobile Threat Defense (MTD) platform that helps enterprises ensure that mobile devices and mobile apps accessing their data and systems are safe and secure. It provides comprehensive protection against Devices, Networks, Applications, and Phishing vectors. It provides visibility into and protection against vulnerabilities, threats, and attacks on mobile devices. KEY PARTNERS: Google, Microsoft, Oracle, McAfee, MobileIron, Samsung, Motorola, VMWare, Blackberry.
Zimperium zIPS is a Mobile Threat Defense (MTD) platform that helps enterprises ensure that mobile devices and mobile apps accessing their data and systems are safe and secure. It provides...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Enables IT admins to implement Group Policy Objects in a more reliable and efficient manner.
Enables IT admins to implement Group Policy Objects in a more reliable and efficient manner.
Enables IT admins to implement Group Policy Objects in a more reliable and efficient manner.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
ConfigOS is a domain-independent software application for authoring, remediating, & reporting on STIG and CIS compliance policies.
ConfigOS is a domain-independent software application for authoring, remediating, & reporting on STIG and CIS compliance policies.
ConfigOS is a domain-independent software application for authoring, remediating, & reporting on STIG and CIS compliance policies.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Web application security software product to protect web sites and web applications from attacks.
Web application security software product to protect web sites and web applications from attacks.
Web application security software product to protect web sites and web applications from attacks.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
It is an endpoint protection solution that helps users detect malware, block applications, identify phishing activities and more.
It is an endpoint protection solution that helps users detect malware, block applications, identify phishing activities and more.
It is an endpoint protection solution that helps users detect malware, block applications, identify phishing activities and more.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Web isolation platform that offers local IP address access, data collection, data policy embeds, secure web access, and more.
Web isolation platform that offers local IP address access, data collection, data policy embeds, secure web access, and more.
Web isolation platform that offers local IP address access, data collection, data policy embeds, secure web access, and more.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Behavioral-based In-App Protection solution designed to protect web and mobile apps from the inside.
SEAP (Smart Endpoint Application Protection) is the XTN's Behavioral-based In-App Protection solution. Extending anti-fraud controls at the endpoint level for both web and mobile channels, SEAP provides a unique, integrated powerful solution to manage fraud and security risks of online digital services. The solution aims to collect information, identify security threats by analyzing the context, the user interaction with the device, and the environment within the application.
SEAP (Smart Endpoint Application Protection) is the XTN's Behavioral-based In-App Protection solution. Extending anti-fraud controls at the endpoint level for both web and mobile channels, SEAP...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Fully-automated patch management, software deployment, and endpoint security solution for Microsoft networks.
Fully-automated patch management, software deployment, and endpoint security solution for Microsoft networks.
Fully-automated patch management, software deployment, and endpoint security solution for Microsoft networks.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor.
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor.
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Web-based security solution that helps businesses monitor devices, create event logs, set security parameters for entire VPN & more.
Web-based security solution that helps businesses monitor devices, create event logs, set security parameters for entire VPN & more.
Web-based security solution that helps businesses monitor devices, create event logs, set security parameters for entire VPN & more.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Endpoint protection solution that helps create whitelists, block malicious applications, and provide temporary access to certain apps.
Endpoint protection solution that helps create whitelists, block malicious applications, and provide temporary access to certain apps.
Endpoint protection solution that helps create whitelists, block malicious applications, and provide temporary access to certain apps.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Endpoint protection solution that enables businesses to guard official data and protect it against viruses and spyware.
Endpoint protection solution that enables businesses to guard official data and protect it against viruses and spyware.
Endpoint protection solution that enables businesses to guard official data and protect it against viruses and spyware.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
CrowdSec is a security automation engine, using local IP behavior detection & leveraging our community-driven IP reputation database.
CrowdSec is a free & open-source massively multiplayer firewall, relying on both IP behavior analysis and IP reputation. CrowdSec analyzes visitor behavior & provides an adapted response to all kinds of attacks. The solution also enables users to protect each other. Each time an IP is blocked, all community members are informed so they can also block it. The solution is being used in 100+ countries across all 6 continents.
CrowdSec is a free & open-source massively multiplayer firewall, relying on both IP behavior analysis and IP reputation. CrowdSec analyzes visitor behavior & provides an adapted response to all kinds...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
SIW

SIW

(0) Local product Local product
System information tool that analyzes the computer and gathers system information based on software, hardware, network, and more.
System information tool that analyzes the computer and gathers system information based on software, hardware, network, and more.
System information tool that analyzes the computer and gathers system information based on software, hardware, network, and more.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Endpoint OS for simple, smart, secure access to cloud workspaces.
Endpoint device OS for simple, smart, secure access to virtualized apps, desktops, and cloud workspaces. Linux based, modular, read-only next-gen edge operating system that is easy for end-users to use and for the IT team to manage and control. IGEL OS is designed for secure, high-fidelity user access to cloud workspaces from any compatible x86-64 device located anywhere -- on the corporate LAN, from home, or anyplace else via an Internet connection.
Endpoint device OS for simple, smart, secure access to virtualized apps, desktops, and cloud workspaces. Linux based, modular, read-only next-gen edge operating system that is easy for end-users to...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Protect & monitor endpoints anywhere your users work. Enterprise-grade cybersecurity built exclusively for Managed Service Providers.
Protect & monitor endpoints anywhere your users work. Enterprise-grade cybersecurity built exclusively for Managed Service Providers.
Protect & monitor endpoints anywhere your users work. Enterprise-grade cybersecurity built exclusively for Managed Service Providers.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Workplace by OS33 empowers employees to securely log in and work anytime and anywhere, with any app or device.
Workplace by OS33 empowers employees to securely log in and work anytime and anywhere, with any app or device. It’s the freedom for a company to enable a flexible workforce - without compromising data security or regulatory compliance. Our Workplace solution is the world’s most turnkey secure unified workspace, designed for regulated and security-minded organizations with networks of independent reps and agents.
Workplace by OS33 empowers employees to securely log in and work anytime and anywhere, with any app or device. It’s the freedom for a company to enable a flexible workforce - without compromising...

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management
Endpoint protection solution that helps businesses control encryption keys and secure data to prevent decryption of files.
Endpoint protection solution that helps businesses control encryption keys and secure data to prevent decryption of files.
Endpoint protection solution that helps businesses control encryption keys and secure data to prevent decryption of files.

Features

  • Encryption Software
  • Whitelisting/Blacklisting
  • Activity Tracking
  • Device Management